Results 1 - 10
of
26,991
The basic building blocks of malware
"... Many security attacks accomplish their goals by controlling the inputs to a target program. Based on this insight, we have developed a novel and highly effective approach to developing malware signatures. 1 These signatures, also called “basic building blocks ” of malware, possess the essential elem ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Many security attacks accomplish their goals by controlling the inputs to a target program. Based on this insight, we have developed a novel and highly effective approach to developing malware signatures. 1 These signatures, also called “basic building blocks ” of malware, possess the essential
Basic Building Blocks for Column-Stores
"... Abstract—A constantly increasing CPU-memory gap as well as steady growth of main memory capacities have increased interest in column store systems due to potential performance gains within the realm of database solutions. In the past, several monolithic systems have reached maturity in the commercia ..."
Abstract
- Add to MetaCart
-retrieval systems and recommenda-tion systems. The main contribution of this paper is a column-store-tool-kit, a basic building block of low-level components for constructing applications based on column store principles. We present a minimal amount of necessary structural elements and associated operations
Haptic Phonemes: Basic Building Blocks of Haptic Communication
- in Proc. of 8th International Conference on Multimodal Interfaces (ICMI 2006
, 2006
"... A haptic phoneme represents the smallest unit of a constructed haptic signal to which a meaning can be assigned. These haptic phonemes can be combined serially or in parallel to form haptic words, or haptic icons, which can hold more elaborate meanings for their users. Here, we use phonemes which co ..."
Abstract
-
Cited by 18 (9 self)
- Add to MetaCart
consist of brief (<2 seconds) haptic stimuli composed of a simple waveform at a constant frequency and amplitude. Building on previous results showing that a set of 12 such haptic stimuli can be perceptually distinguished, here we test learnability and recall of associations for arbitrarily chosen
1Abstract- The basic building blocks for Resonant Tunnel-
"... ling Diode (RTD) logic circuits are Threshold Gates (TGs) instead of the conventional Boolean gates (AND, OR, NAND, NOR) due to the fact that, when designing with RTDs, threshold gates can be implemented as efficiently as conventional ones, but realize more complex functions. Recently, RTD structure ..."
Abstract
- Add to MetaCart
ling Diode (RTD) logic circuits are Threshold Gates (TGs) instead of the conventional Boolean gates (AND, OR, NAND, NOR) due to the fact that, when designing with RTDs, threshold gates can be implemented as efficiently as conventional ones, but realize more complex functions. Recently, RTD structures implementing Multi-Threshold Threshold Gates (MTTGs) have been proposed which further increase the functionality of the original TGs while main-taining their operating principle and allowing also the implemen-tation of nanopipelining at the gate level. This paper describes the design of n-bit adders using these MTTGs. A comparison with a design based on TGs is carried out showing advantages in terms of latency, device counts and power consumption.
(PLL) as the basic building block. The simple application of the
"... This paper discusses the techniques used to optimize the performance of an off-the-shelf PLL-based clock distribution system. ..."
Abstract
- Add to MetaCart
This paper discusses the techniques used to optimize the performance of an off-the-shelf PLL-based clock distribution system.
BASIC BUILDING BLOCKS FOR EFFECTIVE SINGLE ELECTRON TUNNELING TECHNOLOGY BASED COMPUTATION
"... Single Electron Tunneling (SET) technology appears to be a promising alternative for CMOS as it exhibits excellent power consumption and scalability features. Moreover, this new technology opens up avenues for new computational paradigms, which require building blocks with unconventional behavior. I ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
. In this paper we discuss a number of basic building blocks that allow to effectively implement computational structures in those new paradigms, and analyze them in terms of area, delay, and energy consumption.
A Multichip Module, the Basic Building Block for Large Area Pixel Detectors
, 1996
"... In order to build large array pixel detectors for future experiments in High Energy Physics e.g. for experiments at the Large Hadron Collider (LHC) at CERN, one needs to construct easy to handle and manufacturable modules which can be used to put together to big detector systems. Diode- (pixel-) arr ..."
Abstract
- Add to MetaCart
-) arrays can be fabricated in wafer size dimensions (currently about 8 cm in length); read out chips have dimensions of about 1 cm 2 . A natural (but not trivial) thing would be to use the silicon diode array as the basic building block for a detector system. Several read out chips have to be bonded onto
Architecture of basic building blocks in protein and domain structural interaction networks
, 2005
"... ..."
Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity ∗
"... Using an audit data pseudonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to informally evaluate the design of a given anonymity system. As a by-product we obtain indications of the usefulness and (in)completeness of the APES building bl ..."
Abstract
- Add to MetaCart
Using an audit data pseudonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to informally evaluate the design of a given anonymity system. As a by-product we obtain indications of the usefulness and (in)completeness of the APES building
Evaluating the Design of an Audit Data Anonymizer Using Basic Building Blocks for Anonymity
, 2003
"... Using an audit data anonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to evaluate the design of a given anonymity system. As a side-product we obtain indications of the incompleteness of the APES building blocks approach. ..."
Abstract
- Add to MetaCart
Using an audit data anonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to evaluate the design of a given anonymity system. As a side-product we obtain indications of the incompleteness of the APES building blocks approach.
Results 1 - 10
of
26,991