Results 301 to 310 of about 497,213 (338)
Some of the next articles are maybe not open access.
To Shield or Not to Shield: Application of Bismuth Breast Shields
American Journal of Roentgenology, 2013The purposes of this essay are to describe the effects of bismuth breast shielding on radiation exposure of the breast and posterior chest wall and to present arguments for and against the use of breast shields.Breast tissue may receive substantial radiation doses during CT examinations. Bismuth shields effectively reduce breast exposure at the expense
Patrick M, Colletti +2 more
openaire +2 more sources
Shielding effect of superconducting magnetically shielded room
IEEE Transactions on Magnetics, 1997A Superconducting Magnetically Shielded Room (SMSR) has been developed. Superconducting panels are soldered to form a shielding wall of which the soldered connections have normal conduction. Therefore, the Shielding Factor (SF) of the SMSR degrades especially at low frequency, which is different from a superconducting shielded room without a normal ...
K. Yamazaki +5 more
openaire +1 more source
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Software-Defined Network (SDN) is getting popular and increasingly deployed in both of academia and industry. As a result of which, its security issue is being magnified as a critical controversy, and some pioneering researchers have investigated the vulnerabilities of SDN to discover the feasibility of compromising SDN networks. Especially, they prove
Chanhee Lee, Seungwon Shin
openaire +1 more source
Software-Defined Network (SDN) is getting popular and increasingly deployed in both of academia and industry. As a result of which, its security issue is being magnified as a critical controversy, and some pioneering researchers have investigated the vulnerabilities of SDN to discover the feasibility of compromising SDN networks. Especially, they prove
Chanhee Lee, Seungwon Shin
openaire +1 more source
Dimensions of Critical Care Nursing, 2005
Unlike traditional moisturizers, shielding lotions help keep out irritants such as latex allergens and antibacterial soaps while locking in the skin's natural moisture.
openaire +2 more sources
Unlike traditional moisturizers, shielding lotions help keep out irritants such as latex allergens and antibacterial soaps while locking in the skin's natural moisture.
openaire +2 more sources
Proceedings of the 45th annual Design Automation Conference, 2008
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Previous attempts to detect code injection in MPSoCs have been burdened with significant performance overheads.
Krutartha Patel, Sri Parameswaran
openaire +1 more source
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Previous attempts to detect code injection in MPSoCs have been burdened with significant performance overheads.
Krutartha Patel, Sri Parameswaran
openaire +1 more source
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Machine learning classification has enabled many innovative services, e.g., in medicine, biometrics, and finance. Current practices of sharing sensitive input data or classification models, however, causes privacy concerns among the users and business risk among the providers. In this work, we resolve the conflict between privacy and business interests
Jan Henrik Ziegeldorf +2 more
openaire +1 more source
Machine learning classification has enabled many innovative services, e.g., in medicine, biometrics, and finance. Current practices of sharing sensitive input data or classification models, however, causes privacy concerns among the users and business risk among the providers. In this work, we resolve the conflict between privacy and business interests
Jan Henrik Ziegeldorf +2 more
openaire +1 more source
This chapter explores Marianne Moore’s understudied admiration for Haile Selassie, the last reigning emperor of the Ethiopia’s Solomonic dynasty. Moore’s archive includes numerous press clippings and literature—spanning four decades—concerning Selassie, the “Lion of Judah,” who became an international celebrity during the mid-twentieth century when, in
openaire +1 more source
openaire +1 more source
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
The openness of PS systems renders them vulnerable to malicious users that can pollute the measurement collection process, in an attempt to degrade the PS system data and, overall, its usefulness. Mitigating such adversarial behavior is hard. Cryptographic protection, authentication, authorization, and access control can help but they do not fully ...
Stylianos Gisdakis +2 more
openaire +1 more source
The openness of PS systems renders them vulnerable to malicious users that can pollute the measurement collection process, in an attempt to degrade the PS system data and, overall, its usefulness. Mitigating such adversarial behavior is hard. Cryptographic protection, authentication, authorization, and access control can help but they do not fully ...
Stylianos Gisdakis +2 more
openaire +1 more source
Shielding Effectiveness Theory of Shielding
2019The hypothesis upon which the present accepted theory of shielding consisting of the equation SE = R + A + B is based is presented. The hypothesis is based on wave theory and the analogy between transmission lines and the penetration of a wave through a barrier. A detailed analysis, comparing the value of the current delivered to a load impedance using
openaire +1 more source

