نتایج جستجو برای: isas

تعداد نتایج: 386  

2014
Hong-Ryul Jung Kwang Hoon Song John T. Chang Junsang Doh

Similar to stem cells, naïve T cells undergo asymmetric division following activation. While asymmetric division of T cells has been shown to be an important mechanism for the generation of lymphocyte fate diversity during immune responses, key factors that influence whether T cells will undergo symmetric or asymmetric divisions are not completely understood. Here, we utilized immunological syn...

2013
Bin Zeng Gang Tan Úlfar Erlingsson

Low-level Inlined Reference Monitors (IRM) such as control-flow integrity and software-based fault isolation can foil numerous software attacks. Conventionally, those IRMs are implemented through binary rewriting or transformation on equivalent low-level programs that are tightly coupled with a specific Instruction Set Architecture (ISA). Resulting implementations have poor retargetability to d...

Journal: :CoRR 2018
Jiliang Zhang Binhang Qi Gang Qu

Recently, code reuse attacks (CRAs), such as returnoriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threatens. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardwarebased, have been proposed. However, softwa...

2007
Cătălin Ciobanu Bogdan Spinean Georgi Kuzmanov Georgi Gaydadjiev

This paper presents a methodology for synthesizing customized vector ISAs for various application domains targeting high performance execution. A number of applications from the telecommunication and linear algebra domains have been studied, and custom vector instructions sets have been synthesized. Three algorithms that compute the shortest paths in a directed graph (Dijkstra, Floyd and Bellma...

Journal: :Canadian Journal of Anesthesia/Journal canadien d'anesthésie 2020

Journal: :The British journal of ophthalmology 2005
H Rüschen D Celaschi C Bunce C Carr

BACKGROUND/AIM Sub-Tenon's block (STB) or topical anaesthesia alone (TOP) are popular techniques employed during cataract surgery. TOP is often preferred by healthcare providers because of financial or staffing reasons, despite existing evidence that pain during surgery is better controlled with STB. Pain is not the only consideration that determines patient preference for the anaesthesia techn...

2009
Wen-Ping Chen Jih-Hsin Ho Wen-Shyang Hwang Ce-Kuen Shieh

A novel media access control (MAC) protocol named carrier sense multiple access with idle detection (CSMA/ID) is proposed to handle variable-length packets over an all-optical ring network. To evaluate optimal utilization of channel bandwidth, we study packet scheduling based on three transmitting queue discipline (TQD) architectures and four idle space allocation (ISA) algorithms with regard t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید