نتایج جستجو برای: anastomostic leakage

تعداد نتایج: 30781  

2014
Thibaut Caley Frank J. C. Peeters Arne Biastoch Linda Rossignol Erik van Sebille Jonathan Durgadoo Bruno Malaizé Jacques Giraudeau Kristina Arthur Rainer Zahn

The Indian-Atlantic water exchange south of Africa (Agulhas leakage) is a key component of the global ocean circulation. No quantitative estimation of the paleo-Agulhas leakage exists. We quantify the variability in interocean exchange over the past 640,000 years, using planktic foraminiferal assemblage data from two marine sediment records to define an Agulhas leakage efficiency index. We conf...

2014
Shweta Garg Geetika Goyal

With the advancement of technology, size of transistor, supply voltage, gate oxide thickness has been decreased but the leakage in device has increased. Projecting these trends, it can be seen that the leakage power dissipation will equal to the active power dissipation within a few generations. Hence, efficient leakage power reduction methods are very critical for the deep-submicron and nanome...

2009
M. Amin S. Amin M. Ali

Electrical insulation is an important part of all electrical systems. The level of insulation safety provided by an insulator depends on the amount of leakage current flowing on its surface. Actually increased leakage current causes a part of high voltage to appear at dead end of insulator. This voltage may sometimes be of order of 1000 to 5000 Volts depending upon weather conditions. Such a le...

2009
Hao Xu Ranga Vemuri Wen-Ben Jone

Ever since the invention of various leakage power reduction techniques, leakage and dynamic power reduction techniques are categorized into two separate sets. Most of them cannot be applied together during runtime. The gap between them is due to the large energy breakeven time (EBT) and wakeup time (WUT) of conventional leakage reduction techniques. This paper proposes a new leakage reduction t...

2009
Hao Xu Ranga Vemuri Wen-Ben Jone

Ever since the invention of various leakage power reduction techniques, leakage and dynamic power reduction techniques are categorized into two separate sets. Most of them cannot be applied together during runtime. The gap between them is due to the large energy breakeven time (EBT) and wakeup time (WUT) of conventional leakage reduction techniques. This paper proposes a new leakage reduction t...

2015
Yitian Zhao Ian J. C. MacCormick David G. Parry Sophie Leach Nicholas A. V. Beare Simon P. Harding Yalin Zheng

The detection and assessment of leakage in retinal fluorescein angiogram images is important for the management of a wide range of retinal diseases. We have developed a framework that can automatically detect three types of leakage (large focal, punctate focal, and vessel segment leakage) and validated it on images from patients with malarial retinopathy. This framework comprises three steps: v...

Introduction: Leakage of cerebrospinal fluid in the skull base may be accompanied with recurrent meningitis. The site of leakage may either be anterior (in the nose and paranasal sinuses) or posterior (in the temporal bone). Various imaging techniques can be used to precisely locate the point of leakage but despite all the advances in imaging techniques there are still some rare cases in which ...

2017
Wei Yang Yuchen Cao Ke Ma Hailong Zhang

Side-channel attacks (SCAs) have been a realistic serious threat to crypto devices. Therefore, evaluating the SCAs resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric, i.e. mutual information (MI), measures the leakage amount of a crypto device. However, because the rea...

Journal: :IACR Cryptology ePrint Archive 2014
David Galindo Johann Großschädl Zhe Liu Praveen Kumar Vadnala Srinivas Vivek

Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations. The constructions and mechanisms designed on basis of this new approach inevitably suffer from an Achilles heel: a bounded leakage assumption is needed. Currently, a huge gap exists between the theory of such designs and their implementation to confi...

2016
Ilan Komargodski

Most cryptographic schemes are designed in a model where perfect secrecy of the secret key is assumed. In most physical implementations, however, some form of information leakage is inherent and unavoidable. To deal with this, a flurry of works showed how to construct basic cryptographic primitives that are resilient to various forms of leakage. Dodis et al. (FOCS ’10) formalized and constructe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید