Results 81 to 90 of about 19,739 (264)

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems

open access: yesData & Policy
In our digitalized modern society where cyber-physical systems and internet-of-things (IoT) devices are increasingly commonplace, it is paramount that we are able to assure the cybersecurity of the systems that we rely on.
Sampsa Rauti, Samuli Laato
doaj   +1 more source

Expanded application to plant reproductive tissues of a branched DNA probe‐based in situ hybridization method

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya   +3 more
wiley   +1 more source

Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]

open access: yes, 2018
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan   +3 more
core  

Structural, Superconducting and Magnetic Properties of Oxygen‐Annealed Fe1+yTe Thin Films

open access: yesAdvanced Physics Research, EarlyView.
FeTe:Ox films exhibit exchange bias below their Néel temperatures, which coexists with superconductivity. STEM analysis reveals the structural changes induced by oxygen treatment. DFT calculations indicate that interstitial oxygen suppresses antiferromagnetism and promotes superconductivity.
Miao Meng   +15 more
wiley   +1 more source

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj   +1 more source

No more business as usual: Agile and effective responses to emerging pathogen threats require open data and open analytics.

open access: yesPLoS Pathogens, 2020
The current state of much of the Wuhan pneumonia virus (severe acute respiratory syndrome coronavirus 2 [SARS-CoV-2]) research shows a regrettable lack of data sharing and considerable analytical obfuscation.
Dannon Baker   +17 more
doaj   +1 more source

Ontogeny of the malleus in Mesocricetus auratus (Mammalia, Rodentia): Systematic and functional implications for the muroid middle ear

open access: yesThe Anatomical Record, EarlyView.
Abstract The three mammalian auditory ossicles enhance sound transmission from the tympanic membrane to the inner ear. The anterior anchoring of the malleus is one of the key characters for functional classification of the auditory ossicles. Previous studies revealed a medial outgrowth of the mallear anterior process, the processus internus ...
Franziska Fritzsche   +2 more
wiley   +1 more source

Helmeted hornbill cranial kinesis: Balancing mobility and stability in a high‐impact joint

open access: yesThe Anatomical Record, EarlyView.
Abstract Prokinesis—in which a craniofacial joint allows the rostrum to move relative to the braincase—is thought to confer diverse advantages in birds, mostly for feeding. A craniofacial joint would, however, be a weak link if cranial stability is important. Paradoxically, we have identified a craniofacial joint in helmeted hornbills (Rhinoplax vigil),
Mike Schindler   +8 more
wiley   +1 more source

A Tutorial on Software Obfuscation [PDF]

open access: yes, 2016
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity.
openaire  

Home - About - Disclaimer - Privacy