Results 81 to 90 of about 19,739 (264)
Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun +1 more
core
In our digitalized modern society where cyber-physical systems and internet-of-things (IoT) devices are increasingly commonplace, it is paramount that we are able to assure the cybersecurity of the systems that we rely on.
Sampsa Rauti, Samuli Laato
doaj +1 more source
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya +3 more
wiley +1 more source
Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan +3 more
core
Structural, Superconducting and Magnetic Properties of Oxygen‐Annealed Fe1+yTe Thin Films
FeTe:Ox films exhibit exchange bias below their Néel temperatures, which coexists with superconductivity. STEM analysis reveals the structural changes induced by oxygen treatment. DFT calculations indicate that interstitial oxygen suppresses antiferromagnetism and promotes superconductivity.
Miao Meng +15 more
wiley +1 more source
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj +1 more source
The current state of much of the Wuhan pneumonia virus (severe acute respiratory syndrome coronavirus 2 [SARS-CoV-2]) research shows a regrettable lack of data sharing and considerable analytical obfuscation.
Dannon Baker +17 more
doaj +1 more source
Abstract The three mammalian auditory ossicles enhance sound transmission from the tympanic membrane to the inner ear. The anterior anchoring of the malleus is one of the key characters for functional classification of the auditory ossicles. Previous studies revealed a medial outgrowth of the mallear anterior process, the processus internus ...
Franziska Fritzsche +2 more
wiley +1 more source
Helmeted hornbill cranial kinesis: Balancing mobility and stability in a high‐impact joint
Abstract Prokinesis—in which a craniofacial joint allows the rostrum to move relative to the braincase—is thought to confer diverse advantages in birds, mostly for feeding. A craniofacial joint would, however, be a weak link if cranial stability is important. Paradoxically, we have identified a craniofacial joint in helmeted hornbills (Rhinoplax vigil),
Mike Schindler +8 more
wiley +1 more source
A Tutorial on Software Obfuscation [PDF]
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity.
openaire

