نتایج جستجو برای: isas
تعداد نتایج: 386 فیلتر نتایج به سال:
Geometrically Controlled Asymmetric Division of CD4+ T Cells Studied by Immunological Synapse Arrays
Similar to stem cells, naïve T cells undergo asymmetric division following activation. While asymmetric division of T cells has been shown to be an important mechanism for the generation of lymphocyte fate diversity during immune responses, key factors that influence whether T cells will undergo symmetric or asymmetric divisions are not completely understood. Here, we utilized immunological syn...
Low-level Inlined Reference Monitors (IRM) such as control-flow integrity and software-based fault isolation can foil numerous software attacks. Conventionally, those IRMs are implemented through binary rewriting or transformation on equivalent low-level programs that are tightly coupled with a specific Instruction Set Architecture (ISA). Resulting implementations have poor retargetability to d...
Recently, code reuse attacks (CRAs), such as returnoriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threatens. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardwarebased, have been proposed. However, softwa...
This paper presents a methodology for synthesizing customized vector ISAs for various application domains targeting high performance execution. A number of applications from the telecommunication and linear algebra domains have been studied, and custom vector instructions sets have been synthesized. Three algorithms that compute the shortest paths in a directed graph (Dijkstra, Floyd and Bellma...
Transcultural validation of a French version of the Iowa Satisfaction with Anesthesia Scale (ISAS-F)
BACKGROUND/AIM Sub-Tenon's block (STB) or topical anaesthesia alone (TOP) are popular techniques employed during cataract surgery. TOP is often preferred by healthcare providers because of financial or staffing reasons, despite existing evidence that pain during surgery is better controlled with STB. Pain is not the only consideration that determines patient preference for the anaesthesia techn...
A novel media access control (MAC) protocol named carrier sense multiple access with idle detection (CSMA/ID) is proposed to handle variable-length packets over an all-optical ring network. To evaluate optimal utilization of channel bandwidth, we study packet scheduling based on three transmitting queue discipline (TQD) architectures and four idle space allocation (ISA) algorithms with regard t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید