نتایج جستجو برای: covert index

تعداد نتایج: 400911  

2014
Ahmed Al-Haiqi Mahamod Ismail Rosdiadee Nordin

Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intr...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2001
M Carrasco B McElree

Whenever we open our eyes, we are confronted with an overwhelming amount of visual information. Covert attention allows us to select visual information at a cued location, without eye movements, and to grant such information priority in processing. Covert attention can be voluntarily allocated, to a given location according to goals, or involuntarily allocated, in a reflexive manner, to a cue t...

Journal: :Clinical neurophysiology : official journal of the International Federation of Clinical Neurophysiology 2008
Elena Gherri Martin Eimer

OBJECTIVE We investigated whether the covert preparation of saccadic eye movements results in spatially specific modulations of somatosensory processing. METHODS ERPs were recorded in a spatial cueing experiment where auditory cues preceded tactile stimuli delivered to the left or right hand. In the Saccade task, cues signalled that an eye movement towards the left or right hand had to be pre...

Sousan Sahami

This research aimed at investigating the role of social capital on the rights and duties of citizenship among master students of Marvdasht Islamic Azad University. 353 students were surveyed using cluster sampling. The study made use of two questionnaires of citizenship and social capital corporation. This instrument benefited from face and structural validity and the reliability index was repo...

Journal: :Eating behaviors 2014
Paulina Nowicka Carl-Erik Flodmark Derek Hales Myles S Faith

INTRODUCTION Overt and covert control are novel constructs representing two different parental feeding practices with regard to the child's ability to detect them. Preliminary research indicates that covert control is linked to a healthier diet and lower child weight status. In this study, we report the first psychometric validation of the original measures of overt and covert control outside t...

2012
Gilad Asharov Claudio Orlandi

We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some constant probability . The idea behind the model is that the fear of being caught cheating will be enou...

2017
Trevor Williams Cristina Virto Rosa Murillo Primitivo Caballero

Baculoviruses (Baculoviridae) are occluded DNA viruses that are lethal pathogens of the larval stages of some lepidopterans, mosquitoes, and sawflies (phytophagous Hymenoptera). These viruses have been developed as biological insecticides for control of insect pests and as expression vectors in biotechnological applications. Natural and laboratory populations frequently harbor covert infections...

Journal: :Psychological science 2017
Joshua J Foster David W Sutterer John T Serences Edward K Vogel Edward Awh

Covert spatial attention is essential for humans' ability to direct limited processing resources to the relevant aspects of visual scenes. A growing body of evidence suggests that rhythmic neural activity in the alpha frequency band (8-12 Hz) tracks the spatial locus of covert attention, which suggests that alpha activity is integral to spatial attention. However, extant work has not provided a...

2009
Kirti Chawla Westley Weimer

In a competitive business environment, RFID technology can help a business to optimize its supply chain. However, it may also enable an adversary using covert channels to surreptitiously learn sensitive information about the supply chain of a target business. We argue that the tracking of tags and the compromising of readers can create covert channels in the supply chain and cause detrimental m...

Journal: :Psychophysiology 2011
Vivian Zayas Anthony G Greenwald Lee Osterhout

The present experiment measured an EEG indicator of motor cortex activation, the lateralized readiness potential (LRP), while participants performed a speeded category classification task. The LRP data showed that visually masked words triggered covert motor activations. These prime-induced motor activations preceded motor activations by subsequent (to-be-classified) visible target words. Multi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید