Results 11 to 20 of about 189,996 (174)

Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities

open access: yesJournal of Interior Design, EarlyView., 2022
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +2 more sources

Description of the approach to development of the obfuscating compiler

open access: yesТруды Института системного программирования РАН, 2018
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev   +2 more
doaj   +1 more source

Radiometric Constraints on the Timing, Tempo, and Effects of Large Igneous Province Emplacement

open access: yesGeophysical Monograph Series, Page 27-82., 2021

Exploring the links between Large Igneous Provinces and dramatic environmental impact

An emerging consensus suggests that Large Igneous Provinces (LIPs) and Silicic LIPs (SLIPs) are a significant driver of dramatic global environmental and biological changes, including mass extinctions.
Jennifer Kasbohm   +2 more
wiley  

+1 more source

Nombres y predicados

open access: yesCrítica, 2018
Predicates and proper names have been traditionally treated under different semantic categories. Proper names are considered as singular noncomplex terms whereas predicates are taken as general ones.
Alfonso García Suárez
doaj   +1 more source

DNNobfus: a study on obfuscation-based edge-side model protection framework

open access: yes网络与信息安全学报
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang   +6 more
doaj   +3 more sources

A Program Logic for Verifying Secure Routing Protocols [PDF]

open access: yes, 2014
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen   +5 more
core   +4 more sources

A Comparative Study of Coq and HOL [PDF]

open access: yes, 1997
This paper illustrates the differences between the style of theory mechanisation of Coq and of HOL. This comparative study is based on the mechanisation of fragments of the theory of computation in these systems.
A. Church, C. Paulin-Mohring
core   +3 more sources

Is the Quality of Numerical Subroutine Code Improving? [PDF]

open access: yes, 1997
We begin by using a software metric tool to generate a number of software complexity measures and we investigate how these values may be used to determine subroutines which are likely to be of substandard quality.
Hopkins, Tim
core   +4 more sources

Bone Healing Around Implants in Normal and Medically Compromised Conditions: Osteoporosis and Diabetes

open access: yesAdvanced Healthcare Materials, EarlyView.
xx xx. ABSTRACT Osseointegration of orthopedic and dental implants is influenced by local and systemic factors, including their physicochemical surface properties and the patient's overall health status. Titanium and its alloys have been a longstanding standard for bone implants due to their innate biocompatibility and mechanical properties.
Dainelys Guadarrama Bello   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy