Results 31 to 40 of about 570,203 (330)

A Close Companion Search Around L Dwarfs Using Aperture Masking Interferometry and Palomar Laser Guide Star Adaptive Optics [PDF]

open access: yes, 2010
We present a close companion search around 16 known early L dwarfs using aperture masking interferometry with Palomar laser guide star adaptive optics (LGS AO).
Angione, John   +24 more
core   +3 more sources

Perception of Water-Based Masking Sounds—Long-Term Experiment in an Open-Plan Office

open access: yesFrontiers in Psychology, 2017
A certain level of masking sound is necessary to control the disturbance caused by speech sounds in open-plan offices. The sound is usually provided with evenly distributed loudspeakers.
Valtteri Hongisto   +7 more
doaj   +1 more source

Side-Channel Attacks on Masked Bitsliced Implementations of AES

open access: yesCryptography, 2022
In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool.
Anca Rădulescu, Marios O. Choudary
doaj   +1 more source

Pixelating Familiar People in the Media: Should Masking Be Taken at Face Value? [PDF]

open access: yes, 2007
This study questions the effectiveness of masking faces by means of pixelation on television or in newspapers. Previous studies have shown that masking just the face leads to unacceptably high recognition levels, making it likely that participants also ...
Demanet, Jelle   +4 more
core   +2 more sources

Squeeziness: An information theoretic measure for avoiding fault masking [PDF]

open access: yes, 2012
Copyright @ 2012 ElsevierFault masking can reduce the effectiveness of a test suite. We propose an information theoretic measure, Squeeziness, as the theoretical basis for avoiding fault masking.
Apiwattanapong   +12 more
core   +1 more source

Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this work, we perform an extensive investigation and construct a portfolio of S-boxes suitable for secure lightweight implementations, which aligns well with the ongoing NIST Lightweight Cryptography competition.
Begül Bilgin   +4 more
doaj   +1 more source

Recrystallized parylene as a mask for silicon chemical etching [PDF]

open access: yes, 2008
This paper presents the first use of recrystallized parylene as masking material for silicon chemical etch. Recrystallized parylene was obtained by melting parylene C at 350°C for 2 hours.
Kuo, Wen-Cheng   +3 more
core   +2 more sources

Development of Auditory Selective Attention: Why Children Struggle to Hear in Noisy Environments [PDF]

open access: yes, 2015
Children’s hearing deteriorates markedly in the presence of unpredictable noise. To explore why, 187 school-age children (4–11 years) and 15 adults performed a tone-in-noise detection task, in which the masking noise varied randomly between every ...
Amitay, S., Jones, P. R., Moore, D.
core   +1 more source

Saccadic Suppression of Displacement Does Not Reflect a Saccade-Specific Bias to Assume Stability

open access: yesVision, 2019
Across saccades, small displacements of a visual target are harder to detect and their directions more difficult to discriminate than during steady fixation.
Sabine Born
doaj   +1 more source

Higher order color mechanisms : Evidence from noise-masking experiments in cone contrast space [PDF]

open access: yes, 2013
This study addresses a fundamental question concerning the number of cortical, i.e., higher order mechanisms in color vision. The initial subcortical stages in color vision can be described by three cone mechanisms, S, M, L, and three pairs of second ...
Gegenfurtner, Karl R., Hansen, Thorsten
core   +2 more sources

Home - About - Disclaimer - Privacy