Browsing by Title

Now showing items 3738-3757 of 4806

  • Secular evolution of eccentricity in protoplanetary discs with gap-opening planets 

    Teyssandier, Jean Adrien; Ogilvie, Gordon Ian (Oxford University PressMonthly Notices of the Royal Astronomical Society, 2017-06)
    We explore the evolution of the eccentricity of an accretion disc perturbed by an embedded planet whose mass is sufficient to open a large gap in the disc. Various methods for representing the orbit-averaged motion of an ...

  • Secure Program Execution Via Dynamic Information Flow Tracking 

    Unknown author (2003-07-21)
    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  • Secure quantum signatures using insecure quantum channels 

    Amiri, Ryan; Wallden, Petros; Kent, Adrian Patrick; Andersson, Erika (American Physical SocietyPhysical Review A, 2016-03-17)
    Digital signatures are widely used in modern communication to guarantee authenticity and transferability of messages. The security of currently used classical schemes relies on computational assumptions. We present a quantum ...

  • Securing Deployed RFIDs by Randomizing the Modulation and the Channel 

    Unknown author (2013-01-12)
    RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...

  • Security and Modularity in Message Passing 

    Unknown author (MIT Artificial Intelligence Laboratory, 1979-02)
    This paper addresses theoretical issues involved for the implementation of security and modularity in concurrent systems. It explicates the theory behind a mechanism for safely delegating messages to shared handlers in ...

  • A Security Kernel Based on the Lambda-Calculus 

    Unknown author (1996-03-13)
    Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer ...

  • SEEC: A Framework for Self-aware Computing 

    Unknown author (2010-10-13)
    As the complexity of computing systems increases, application programmers must be experts in their application domain and have the systems knowledge required to address the problems that arise from parallelism, power, ...

  • SEEC: A Framework for Self-aware Management of Multicore Resources 

    Unknown author (2011-03-24)
    This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ...

  • SEEC: A General and Extensible Framework for Self-Aware Computing 

    Unknown author (2011-11-07)
    Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...

  • Seeing 'Ghost' Solutions in Stereo Vision 

    Unknown author (1988-09-01)
    A unique matching is a stated objective of most computational theories of stereo vision. This report describes situations where humans perceive a small number of surfaces carried by non-unique matching of random dot ...

  • Seeing What Your Programs Are Doing 

    Unknown author (1982-02-01)
    An important skill in programming is being able to visualize the operation of procedures, both for constructing programs and debugging them. Tinker is a programming environment for Lisp that enables the programmer to ...

  • Segmentation and Alignment of Speech and Sketching in a Design Environment 

    Unknown author (2003-02-01)
    Sketches are commonly used in the early stages of design. Our previous system allows users to sketch mechanical systems that the computer interprets. However, some parts of the mechanical system might be too hard or too ...

  • Segmentation of Brain Tissue from Magnetic Resonance Images 

    Unknown author (1995-01-01)
    Segmentation of medical imagery is a challenging problem due to the complexity of the images, as well as to the absence of models of the anatomy that fully capture the possible deformations in each structure. Brain ...

  • A Selected Descriptor-Indexed Bibliography to the Literature on Belief Revision 

    Unknown author (1980-02-01)
    This article presents an overview of research in an area loosely called belief revision. Belief revision concentrates on the issue of revising systems of beliefs to reflect perceived changes in the environment or ...

  • Selecting One Among the Many: A Simple Network Implementing Shifts in Selective Visual Attention 

    Unknown author (1984-01-01)
    This study addresses the question of how simple networks can account for a variety of phenomena associated with the shift of a specialized processing focus across the visual scene. We address in particular aspects of ...

  • Selecting Refining and Evaluating Properties for Program Analysis 

    Unknown author (2003-07-21)
    This research proposes and evaluates techniques for selectingpredicates for conditional program properties thatis, implications such as p ) q whose consequent must betrue whenever the predicate is true. Conditional ...

  • Selecting Relevant Genes with a Spectral Approach 

    Unknown author (2004-01-27)
    Array technologies have made it possible to record simultaneouslythe expression pattern of thousands of genes. A fundamental problemin the analysis of gene expression data is the identification ofhighly relevant genes that ...

  • Selecting Relevant Genes with a Spectral Approach 

    Unknown author (2004-01-27)
    Array technologies have made it possible to record simultaneously the expression pattern of thousands of genes. A fundamental problem in the analysis of gene expression data is the identification of highly relevant genes ...

  • Selection of the Right Hydraulic Fracturing Fluid for Unconventional Reservoir Engineering 

    Adjei, Gloria (AUST, 2019-07-12)
    Unconventional resources are of major importance to the oil and gas industry due to its enormousness, however, due to the low permeability of these resources, there is a need for hydraulic fracturing. Hydraulic fracturing ...

  • Selective cation-exchange adsorption of the two major whey proteins 

    El-Sayed, Mayyada (University of CambridgeDepartment of Chemical Engineering and Biotechnology, 2010-03-16)
    Whey is a by-product of cheese manufacture, containing a mixture of proteins of commercial value, each having unique attributes for nutritional, biological and food ingredient applications. A tremendous amount of whey, ...