نتایج جستجو برای: disable

تعداد نتایج: 1148  

2014
Masaya Sato Toshihiro Yamauchi

Security-critical software is open to attacks by adversaries that disable its functionality. To decrease the risk, we propose an attack avoidance method for complicating process identification. The proposed method complicates identification based on process information by dynamically replacing the information held by a kernel with dummy information. Replacing process information makes identifyi...

Journal: :CoRR 2011
Faisal Baig Saira Beg Muhammad Fahad Khan

Controlling appliances is a main part of automation. The main object of Home automation is to provide a wireless communication link of home appliances to the remote user. The main objective of this work is to make such a system which controls the home appliances remotely. This paper discusses two methods of controlling home appliances one is via voice to text SMS and other is to use the mobile ...

2002
John Garofalakis Ioannis Hatzilygeroudis George Papanikolaou Spyros Sioutas

In this paper we present a multimedia-based system that facilitates teaching chemistry to pupils of Hellenic (Greek) high schools over a LAN. The system uses a variety of multimedia objects. An important aspect of the system is the central control the teacher can have over some aspects of a lesson. So, the teacher can enable the section to be taught and disable the rest ones, and design and del...

Journal: :Computer Networks 2000
Peter Mell Donald G. Marks Mark McLarnon

As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...

2001
Ben Goldberg Krishna V. Palem

This paper describes a technique for utilizing predication to support software pipelining on EPIC architectures in the presence of dynamic memory aliasing. The essential idea is that the compiler generates an optimistic software-pipelined schedule that assumes there is no memory aliasing. The operations in the pipeline kernel are predicated, however, so that if memory aliasing is detected by a ...

2007
Sébastien Delarue Philippe Hoppenot Etienne Colle

In the assistive robotics domain, and especially for disable people, the use of mobile arm manipulator can be of a great help in the everyday life tasks. First, these systems must be reliable and fault tolerant. Secondly they must facilitate man machine co-operation. This article exposes a method based on multi agent system. This kind of distributed architecture makes possible to be fault-toler...

Journal: :Journal of the American Chemical Society 2013
Timothy A Su Jonathan R Widawsky Haixing Li Rebekka S Klausen James L Leighton Michael L Steigerwald Latha Venkataraman Colin Nuckolls

Here we demonstrate for the first time that strained silanes couple directly to gold electrodes in break-junction conductance measurements. We find that strained silicon molecular wires terminated by alkyl sulfide aurophiles behave effectively as single-molecule parallel circuits with competing sulfur-to-sulfur (low G) and sulfur-to-silacycle (high G) pathways. We can switch off the high conduc...

Journal: :IEEE Design & Test of Computers 1997
Rajesh K. Gupta Stan Y. Liao

ion. The language must provide an abstraction mechanism—that is, a means of building large systems from smaller, HDL-modeled components. The two main methods of composing large systems are procedure calls and declarative blocks. Designers typically use the latter to describe a netlist of blocks in which component instances are bound by shared variables. These blocks are useful in modeling struc...

Journal: :Journal of advanced manufacturing and processing 2023

Vaccine packaging innovations have a potential impact on the supply chain, as well acceptability and uptake by users. To better understand recent developments in innovations, we assessed benefits challenges of compact pre-filled auto-disable devices (CPADs), polymer-based primary containers (or vials), dual-chamber delivery devices. These clear public health related to ease use, improved safety...

Journal: :JNW 2009
Yogesh Chaba Yudhvir Singh Preeti Aneja

In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to overcome the malicious flooding i.e. attack of initiating / forwarding Route Requests (RREQs) that lead to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید