نتایج جستجو برای: resilient behavior

تعداد نتایج: 633157  

2016
Marieke Huisman Herbert Bos Sjaak Brinkkemper Arie van Deursen Jan Friso Groote Patricia Lago Jaco van de Pol Eelco Visser

Software is widely used, and society increasingly depends on its reliability. However, software has become so complex and it evolves so quickly that we fail to keep it under control. Therefore, we propose intents: fundamental laws that capture a software systems’ intended behavior (resilient, secure, safe, sustainable, etc.). The realization of this idea requires novel theories, algorithms, too...

2015
James Weimer Nicola Bezzo Miroslav Pajic George J. Pappas Oleg Sokolsky Insup Lee

This work addresses the general problem of resilient control of unknown stochastic linear time-invariant (LTI) systems in the presence of sensor attacks. Motivated by a vehicle cruise control application, this work considers a first order system with multiple measurements, of which a bounded subset may be corrupted. A frequency-domain-designed resilient parameter-invariant controller is introdu...

2013
Reyadh Shaker Naoum

Network-based computer systems play increasingly vital roles in modern society; they have become the target of intrusions by our enemies and criminals. Intrusion detection system attempts to detect computer attacks by examining various data records observed in processes on the network. This paper presents a hybrid intrusion detection system models, using Learning Vector Quantization and an enha...

2011
Zvika Brakerski Yael Tauman Kalai

A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say λ bits of “leakage”). A fundamental question is whether parallel repetition amplifies leakage resilience. Namely, if we secret share our message, and encrypt the shares under two independent keys, will the resulting scheme be resilient...

2015
Raghu Meka

A Boolean function on n variables is q-resilient if for any subset of at most q variables, the function is very likely to be determined by a uniformly random assignment to the remaining n − q variables; in other words, no coalition of at most q variables has significant influence on the function. Resilient functions have been extensively studied with a variety of applications in cryptography, d...

2016
Tarek L. Rashwan Jason I. Gerhard Gavin P. Grant

A major challenge in designing resilient infrastructure is to meet the needs of sustainable development (Kennedy & Corfee-Morlot, 2013). Sustainable development requires a high degree of energy efficiency. Municipal wastewater treatment plants (WWTPs), in particular, have the potential to be much more sustainable. In the U.S., 3 – 4% of the total energy consumed is dedicated to WWTPs and drinki...

2016
Mo Li Shuai Fan

Designing self-healing into cementitious materials can open a new world of opportunities for resilient concrete infrastructure under service loading conditions. The self-healing process should be robust as well as repeatable, allowing for self-repair after multiple damage events. The repeatability poses great challenges when self-healing strategies mainly rely on the formation of low-strength c...

Journal: :Nano letters 2009
Leonardo C Campos Vitor R Manfrinato Javier D Sanchez-Yamagishi Jing Kong Pablo Jarillo-Herrero

We demonstrate anisotropic etching of single-layer graphene by thermally activated nickel nanoparticles. Using this technique, we obtain sub-10-nm nanoribbons and other graphene nanostructures with edges aligned along a single crystallographic direction. We observe a new catalytic channeling behavior, whereby etched cuts do not intersect, resulting in continuously connected geometries. Raman sp...

2009
Moisés Goldszmidt Miroslaw Malek Simin Nadjm-Tehrani Priya Narasimhan Felix Salfner Paul A. S. Ward John Wilkes

Local design and optimization of the components of a fault-management system results in sub-optimal decisions. This means that the target system will likely not meet its objectives (under-performs) or cost too much if conditions, objectives, or constraints change. We can fix this by applying a nested, management system for the fault-management system itself. We believe that doing so will produc...

2012
Sebastian Faust Krzysztof Pietrzak Joachim Schipper

Leakage resilient cryptography attempts to incorporate sidechannel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state. Unfortunately, most leakage resilient schemes are u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید