Filters








70 Hits in 6.7 sec

Software-based Microarchitectural Attacks [article]

Daniel Gruss
2017 arXiv   pre-print
Shrinking process technology introduces effects between isolated hardware elements that can be exploited by attackers to take control of the entire system.  ...  Software-based microarchitectural attacks exploit effects of these optimizations.  ...  We then use these primitives in three different attacks. 2. We present a generic attack to infer the translation level for every virtual address to defeat ASLR. 3.  ... 
arXiv:1706.05973v1 fatcat:4hwdpe4dancmblsxasg3a75h7a

Validating Retinal Fundus Image Analysis Algorithms: Issues and a Proposal

Emanuele Trucco, Alfredo Ruggeri, Thomas Karnowski, Luca Giancardo, Edward Chaum, Jean Pierre Hubschman, Bashir al-Diri, Carol Y. Cheung, Damon Wong, Michael Abràmoff, Gilbert Lim, Dinesh Kumar (+7 others)
2013 Investigative Ophthalmology and Visual Science  
annotations by multiple experts, specific to clinical tasks, and capable of running submitted software automatically on the data stored, with clear and widely agreed-on performance criteria, to provide  ...  For reasons of space and consistency, we concentrate on the validation of algorithms processing color fundus camera images, currently the largest section of the ARIA literature.  ...  natural history of diseases (e.g., microvascular disease pathways in heart attacks).  ... 
doi:10.1167/iovs.12-10347 pmid:23794433 pmcid:PMC4597487 fatcat:ittct3figzb45j7kgcqltqiscy

Modeling of aromatics formation in fuel-rich methane oxy-combustion with an automatically generated pressure-dependent mechanism

Te-Chun Chu, Zachary J. Buras, Patrick Oßwald, Mengjie Liu, Mark Jacob Goldman, William H. Green
2019 Physical Chemistry, Chemical Physics - PCCP  
An automatic generated mechanism for methane-rich combustion captures the chemistry from small molecules to three-ring aromatic species.  ...  In Fig. 6 , the peaks of C 8 H 6 are B10% of the amplitude of peaks of C 6 H 6 .  ...  The amount of C 12 H 8 formed is similar to C 10 H 8 with the peaks appearing B20 K higher.  ... 
doi:10.1039/c8cp06097e fatcat:wwxz65tllvbc5mr62mdzqng7by

Fruits, foliage and the evolution of primate colour vision

B. C. Regan, C. Julliot, B. Simmen, F. Vienot, P. Charles-Dominique, J. D. Mollon
2001 Philosophical Transactions of the Royal Society of London. Biological Sciences  
We are grateful to Daniel Sabatier, Bernard Rie¨ra, Odile Poncy, and Pierre-Michel Forget for assistance in identifying botanical samples; and to Roger Leguen for providing us with a p hotograph of Ateles  ...  The sp ectrum p resented here is app rop riate for just one viewing angle. variance in the L/M channel was minimized when the L and M pigments had the peak sensitivities found in human cones.  ...  to the task of detecting fruits against foliage.  ... 
doi:10.1098/rstb.2000.0773 pmid:11316480 pmcid:PMC1088428 fatcat:maaogbb67jhtxacrzaabsqxkoq

Activity Determinants and Functional Specialization ofArabidopsisPEN1 Syntaxin in Innate Immunity

Simone Pajonk, Chian Kwon, Natascha Clemens, Ralph Panstruga, Paul Schulze-Lefert
2008 Journal of Biological Chemistry  
Our data indirectly support structural inferences that the four-helical coiled coil bundle in ternary SNARE complexes is formed in a sequential order from the N-to C-terminal direction.  ...  In eukaryotes, proteins of the soluble N-ethylmaleimide-sensitive factor attachment protein receptor (SNARE) family are believed to have a general role for the fusion of intracellular transport vesicles  ...  identified in each kingdom a splitting of four main branches (1, 2) .  ... 
doi:10.1074/jbc.m805236200 pmid:18678865 fatcat:7a7rtoi5q5eg5dvp4t75yglmlu

INFERENCE OF RESIDUAL ATTACK SURFACE UNDER MITIGATIONS

Kyriakos K Ispoglou
2019
Nevertheless, it is still possible for an attacker to circumvent all of the existing defenses –under certain circumstances.In this dissertation, we define and infer the Residual Attack Surface on a system  ...  It assumes an attack with three phases and proposes new techniques to infer the Residual Attack Surface on each stage.For the first part, we focus on the vulnerability discovery.  ...  the set for each dispatch; second, data-only attacks allow an attacker to influence conditional branches arbitrarily.  ... 
doi:10.25394/pgs.8041202 fatcat:smkcsjll5bf6xfl47xonzm4yza

Sorghum breeding in the genomic era: opportunities and challenges

Huaiqing Hao, Zhigang Li, Chuanyuan Leng, Cheng Lu, Hong Luo, Yuanming Liu, Xiaoyuan Wu, Zhiquan Liu, Li Shang, Hai-Chun Jing
2021 Theoretical and Applied Genetics  
We argue that the way forward is to take a genome-based approach for tailored designing of sorghum as a multi-functional crop combining excellent agricultural traits for various end uses.  ...  Future directions and opportunities for sorghum breeding are highlighted to stimulate discussion amongst sorghum academic and industrial communities.  ...  Acknowledgements This study was supported by grants from the National Key R&D Program of China (2019YFD1002701; 2018YFD1000701) and the Chinese Academy of Sciences (151111KYSB20180049; KFJ-FP-201809; KFJ-STS-ZDTP  ... 
doi:10.1007/s00122-021-03789-z pmid:33655424 pmcid:PMC7924314 fatcat:yxanpwpbw5fk5ourbwitxe7tem

Abstracts

2013 Der Ophthalmologe  
To detect possible complement depositions, cross-sections of the retina were stained with C3 and membrane attack complex (MAC) after 14 or 28 days (n=5 per group) to evaluate the activation of the complement  ...  It seems to be, that the immunization with different antigens triggers diverse immune attack mechanism.  ...  After 4 weeks cross-sections of the retina were labeled with antibodies against Brn-3a and NeuN to quantify RGC density.  ... 
doi:10.1007/s00347-013-2942-7 pmid:23949844 fatcat:q26cwwy4g5curnynotyu6uflye

Penilaian Kualiti Laporan EIA Dalam Aspek Kajian Hakisan Tanah [article]

Abdul Mahmud
2020 Figshare  
The scale of measurement 0 to 5 has been used to rating score quality for each item. 35 samples of EIA report for housing projects from the year 2012 to 2016 were evaluated.  ...  This study found about 22 of the EIA report achieve satisfactory level (3.00 ). ESCP conceptual has found very poor quality. Most of the ESCP plan fail to shows the earthwork to be conduct in stages.  ...  Each carrier signals are of 1V peak-to-peak with a frequency of 2000 Hz while the modulating signal is of 6V peak-to-peak with frequency of 50 Hz.  ... 
doi:10.6084/m9.figshare.12095736 fatcat:fzsit3wyqjc3fni4no4zzopz5e

Analysis of room transfer function and reverberant signal statistics

Eleftheria Georganti, John Mourjopoulos, Finn Jacobsen
2008 Journal of the Acoustical Society of America  
Our goal is to provide musicians with guidelines for using indirect acquisition.  ...  population density.  ...  an effective mass density of the slab is correctly defined.  ... 
doi:10.1121/1.2935346 fatcat:lxgnqr6tozajhge3ydet3xomam

A virtual auditory environment for investigating the auditory signal processing of realistic sounds

Sylvain Favrot, Jörg M. Buchholz
2008 Journal of the Acoustical Society of America  
Our goal is to provide musicians with guidelines for using indirect acquisition.  ...  population density.  ...  an effective mass density of the slab is correctly defined.  ... 
doi:10.1121/1.2936003 fatcat:ontu6yamdvgbnooet5fe36fm74

Across‐frequency processes involved in auditory detection of coloration

Jörg M. Buchholz, Paris Kerketsos
2008 Journal of the Acoustical Society of America  
This work investigates the basic gradient-equation underlying this diffusion theory: it states that the energy-flow vector is proportional to both the gradient of the acoustic energy density, and to the  ...  The intensity in a reverberant field as an acoustic energy-density gradient.  ...  Our goal is to provide musicians with guidelines for using indirect acquisition.  ... 
doi:10.1121/1.2935741 fatcat:acaporn5qvgb5coauovqkbv6lq

Temporal suppression and augmentation of click-evoked otoacoustic emissions

Sarah Verhulst, James M. Harte, Torsten Dau
2008 Hearing Research  
This work investigates the basic gradient-equation underlying this diffusion theory: it states that the energy-flow vector is proportional to both the gradient of the acoustic energy density, and to the  ...  The intensity in a reverberant field as an acoustic energy-density gradient.  ...  Our goal is to provide musicians with guidelines for using indirect acquisition.  ... 
doi:10.1016/j.heares.2008.09.008 pmid:18926894 fatcat:bijdlpxpzfcsrjeefayvvu4pl4

Temporal suppression and augmentation of click‐evoked otoacoustic emissions

Sarah Verhulst, James M. Harte, Torsten Dau
2008 Journal of the Acoustical Society of America  
This work investigates the basic gradient-equation underlying this diffusion theory: it states that the energy-flow vector is proportional to both the gradient of the acoustic energy density, and to the  ...  The intensity in a reverberant field as an acoustic energy-density gradient.  ...  Our goal is to provide musicians with guidelines for using indirect acquisition.  ... 
doi:10.1121/1.2935694 fatcat:z6yidzqqendznbmrczb3woaiv4

Hardware-Software Co-design for Practical Memory Safety

Mohamed Hassan
2022
Software-only techniques such as Google's AddressSanitizer [3] are used to detect memory errors during the testing phase before products are shipped.  ...  A vast amount of software, from low-level systems code to high-performance applications, is written in memory-unsafe languages such as C and C++.  ...  A variation of the ROP attack uses indirect branch instructions (JMP) to transfer control between gadgets. This attack technique is called jump-oriented programming (JOP) [56] .  ... 
doi:10.7916/nw2g-9t77 fatcat:dsiyir5ihzhttditywpkhe3twq
« Previous Showing results 1 — 15 out of 70 results