Results 21 to 30 of about 1,857,403 (288)
In this paper, we describe a model system comprised of hydrodynamic, sediment transport, heat transfer and habitat models. We used this model system to assess the ecosystem situation and investigate the impacts of two ecological restoration strategies in
Wei-Wei Yao +4 more
doaj +1 more source
The quantum capacity with symmetric side channels [PDF]
We present an upper bound for the quantum channel capacity that is both additive and convex. Our bound can be interpreted as the capacity of a channel for high-fidelity quantum communication when assisted by a family of channels that have no capacity on ...
Smith, Graeme +2 more
core +3 more sources
Liability of a Surgeon for the Extension of an Authorized Operation [PDF]
Polyunsaturated fatty acids modulate the voltage dependence of several voltage-gated ion channels, thereby being potent modifiers of cellular excitability.
Billman +43 more
core +2 more sources
Special Issue on “Side Channel Attacks”
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...]
Seokhie Hong
doaj +1 more source
ThermalBleed: A Practical Thermal Side-Channel Attack
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj +1 more source
Connectivity times in vehicular networks [PDF]
We propose an analytical model that accurately captures the service advertisement and access mechanisms in IEEE 1609.4/IEEE 802.11p multi-channel vehicular networks where road-side units announce non-safety services to passing vehicles on a dedicated ...
Fiems, Dieter, Vinel, Alexey
core +2 more sources
A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects
With advancements in chip technology, the number of cores in modern commercial processors continues to rise, leading to increased complexity in interconnects and on-chip networks.
Jie Yuan +4 more
doaj +1 more source
Passive scalar transport in rotating turbulent channel flow
Passive scalar transport in turbulent channel flow subject to spanwise system rotation is studied by direct numerical simulations. The Reynolds number $Re = U_b h/\nu$ is fixed at $20\,000$ and the rotation number $Ro = 2 \Omega h/U_b$ is varied from 0 ...
Brethouwer, Geert
core +1 more source
Multi-Leak Deep-Learning Side-Channel Analysis
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES). By utilizing deep-learning models to analyze side-channel measurements, the attacker is
Fanliang Hu, Huanyu Wang, Junnian Wang
doaj +1 more source
Entanglement distribution maximization over one-side Gaussian noisy channel
The optimization of entanglement evolution for two-mode Gaussian pure states under one-side Gaussian map is studied. Even there isn't complete information about the one-side Gaussian noisy channel, one can still maximize the entanglement distribution by ...
Jia-Zhong Hu +5 more
core +1 more source

