Results 111 to 120 of about 283,565 (299)
Evaluating Mixing Methods: Anonymity, Long-Term Information Leakage, and Cost
Mix-nets are essential tools for safeguarding user privacy in communication networks. When deploying systems, two well-known mixing methods, batch (e.g., Timed Mix) and continuous mixing (e.g., Stop-and-Go Mix), are commonly used in real-world Mix-nets ...
Alperen Aksoy, Dogan Kesdogan
doaj +1 more source
CIDPro: Custom Instructions for Dynamic Program Diversification
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar +4 more
core +1 more source
This study develops a self‐powered permeable electronic dressing (SPED) that synergistically integrates exudate management, electrical stimulation, and on‐demand drug delivery. The dressing effectively absorbs exudate while demonstrating potent antibacterial activity and accelerated tissue regeneration in diabetic mouse models, thereby promoting ...
Jiaheng Liang +12 more
wiley +1 more source
Handling leakage with subsystem codes
Leakage is a particularly damaging error that occurs when a qubit state falls out of its two-level computational subspace. Compared to independent depolarizing noise, leaked qubits may produce many more configurations of harmful correlated errors during ...
Natalie C Brown +2 more
doaj +1 more source
ABSTRACT Breathable membranes that reject chemical warfare agents (CWAs) are required for next‐generation protective apparel. A dual‐function graphene oxide (GO)‐polyamine architecture is introduced that addresses the long‐standing tradeoff between vapor transmission and CWA selectivity.
Hyungjun Kim +6 more
wiley +1 more source
Molecularly engineered memristors integrating Ag nanoparticle–embedded synthetic DNA with quasi‐2D halide perovskites enable ultra‐low‐operational voltage, forming‐free resistive switching, and record‐low power density. This synergistic integration of customized DNA and 2D OHP in bio‐hybrid architecture enhances charge transport, reduces variability ...
Kavya S. Keremane +9 more
wiley +1 more source
Controlling near shore nonlinear surging waves through bottom boundary conditions
Instead of taking the usual passive view for warning of near shore surging waves including extreme waves like tsunamis, we aim to study the possibility of intervening and controlling nonlinear surface waves through the feedback boundary effect at the ...
Janaki, M. S +2 more
core +1 more source
An Engineered Living Material With Pro‐Angiogenic Activity Inducible by Near‐Infrared Light
NIR‐responsive engineered living materials (ELMs) for controlled angiogenesis: Near‐infrared (800 nm) light activates engineered probiotic bacteria within alginate‐based living materials to secrete a blood vessel‐regenerating protein. The released protein promotes pro‐angiogenic effects in endothelial networks and chick chorioallantoic membranes.
Anwesha Chatterjee +4 more
wiley +1 more source
Ferroelectric memcapacitors enable non‐volatile, voltage‐programmable capacitance tuning for adaptive electronics. A TiN/HfZrO/TiN device stack demonstrates more than eight stable capacitance states within a 24 pF memory window in compact 60 ×$\times$ 60 μm2$\umu{\rm m}^{2}$ devices at low operating voltages.
Deepika Yadav +6 more
wiley +1 more source
RISKS OF INFORMATION LEAKAGE USING ONLINE MACHINE TRANSLATION SERVICES
The article is devoted to the analysis of the risks of information leakage when using online machine translation services and suggests methods for minimizing these risks.
Леся Матвієнко +1 more
doaj +1 more source

