Browsing by Title
Now showing items 3738-3757 of 4806
-
Secular evolution of eccentricity in protoplanetary discs with gap-opening planets
(Oxford University PressMonthly Notices of the Royal Astronomical Society, 2017-06)We explore the evolution of the eccentricity of an accretion disc perturbed by an embedded planet whose mass is sufficient to open a large gap in the disc. Various methods for representing the orbit-averaged motion of an ...
-
Secure Program Execution Via Dynamic Information Flow Tracking
(2003-07-21)We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...
-
Secure quantum signatures using insecure quantum channels
(American Physical SocietyPhysical Review A, 2016-03-17)Digital signatures are widely used in modern communication to guarantee authenticity and transferability of messages. The security of currently used classical schemes relies on computational assumptions. We present a quantum ...
-
Securing Deployed RFIDs by Randomizing the Modulation and the Channel
(2013-01-12)RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...
-
Security and Modularity in Message Passing
(MIT Artificial Intelligence Laboratory, 1979-02)This paper addresses theoretical issues involved for the implementation of security and modularity in concurrent systems. It explicates the theory behind a mechanism for safely delegating messages to shared handlers in ...
-
A Security Kernel Based on the Lambda-Calculus
(1996-03-13)Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer ...
-
SEEC: A Framework for Self-aware Computing
(2010-10-13)As the complexity of computing systems increases, application programmers must be experts in their application domain and have the systems knowledge required to address the problems that arise from parallelism, power, ...
-
SEEC: A Framework for Self-aware Management of Multicore Resources
(2011-03-24)This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ...
-
SEEC: A General and Extensible Framework for Self-Aware Computing
(2011-11-07)Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...
-
Seeing 'Ghost' Solutions in Stereo Vision
(1988-09-01)A unique matching is a stated objective of most computational theories of stereo vision. This report describes situations where humans perceive a small number of surfaces carried by non-unique matching of random dot ...
-
Seeing What Your Programs Are Doing
(1982-02-01)An important skill in programming is being able to visualize the operation of procedures, both for constructing programs and debugging them. Tinker is a programming environment for Lisp that enables the programmer to ...
-
Segmentation and Alignment of Speech and Sketching in a Design Environment
(2003-02-01)Sketches are commonly used in the early stages of design. Our previous system allows users to sketch mechanical systems that the computer interprets. However, some parts of the mechanical system might be too hard or too ...
-
Segmentation of Brain Tissue from Magnetic Resonance Images
(1995-01-01)Segmentation of medical imagery is a challenging problem due to the complexity of the images, as well as to the absence of models of the anatomy that fully capture the possible deformations in each structure. Brain ...
-
A Selected Descriptor-Indexed Bibliography to the Literature on Belief Revision
(1980-02-01)This article presents an overview of research in an area loosely called belief revision. Belief revision concentrates on the issue of revising systems of beliefs to reflect perceived changes in the environment or ...
-
Selecting One Among the Many: A Simple Network Implementing Shifts in Selective Visual Attention
(1984-01-01)This study addresses the question of how simple networks can account for a variety of phenomena associated with the shift of a specialized processing focus across the visual scene. We address in particular aspects of ...
-
Selecting Refining and Evaluating Properties for Program Analysis
(2003-07-21)This research proposes and evaluates techniques for selectingpredicates for conditional program properties thatis, implications such as p ) q whose consequent must betrue whenever the predicate is true. Conditional ...
-
Selecting Relevant Genes with a Spectral Approach
(2004-01-27)Array technologies have made it possible to record simultaneouslythe expression pattern of thousands of genes. A fundamental problemin the analysis of gene expression data is the identification ofhighly relevant genes that ...
-
Selecting Relevant Genes with a Spectral Approach
(2004-01-27)Array technologies have made it possible to record simultaneously the expression pattern of thousands of genes. A fundamental problem in the analysis of gene expression data is the identification of highly relevant genes ...
-
Selection of the Right Hydraulic Fracturing Fluid for Unconventional Reservoir Engineering
(AUST, 2019-07-12)Unconventional resources are of major importance to the oil and gas industry due to its enormousness, however, due to the low permeability of these resources, there is a need for hydraulic fracturing. Hydraulic fracturing ...
-
Selective cation-exchange adsorption of the two major whey proteins
(University of CambridgeDepartment of Chemical Engineering and Biotechnology, 2010-03-16)Whey is a by-product of cheese manufacture, containing a mixture of proteins of commercial value, each having unique attributes for nutritional, biological and food ingredient applications. A tremendous amount of whey, ...