نتایج جستجو برای: boot strop
تعداد نتایج: 3036 فیلتر نتایج به سال:
Toward the general goal ofpreventing ankle injuries in snowboarding accidents, the E. Wang objective of this project to develop a dynamic system model of a snowboarder and Assistant Professor, assess which model parameters, particularly those attributed to the boot, most Department of Mechanical Engineering, strongly influenced ankle deflections during a forward fall. To satisfy this objective,...
The aim of the present study was the examination of the boot swab sampling technique for the collection of environmental material in order to identify Mycobacterium avium ssp. paratuberculosis (MAP)-infected herds. Eight dairy herds were included into the study. Four of them had a well-known history of MAP-infection from a herd surveillance programme conducted since 2006. Cows in these herds we...
In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a computer is rebooted the memory contents are rarely fully reset; instead, after the reboot an adversary might recover a noisy image of the old memory contents and use it as a stepping stone for reconstructing secret keys. While such attacks were known for a long time, they ...
Configuring a million-core parallel system at boot time is a difficult process when the system has neither specialised hardware support for the configuration process nor a preconfigured default state that puts it in operating condition. The architecture of SpiNNaker, a parallel chip multiprocessor (CMP) system for neural network simulation, is in this class. To function as a universal neural ch...
With the extensive application of IoT techniques, devices have become ubiquitous in daily lives. Meanwhile, attacks against emerged to compromise by tampering with system pre-installed programs or injecting new malware. To mitigate these attacks, integrity enforcement systems has been proposed. The an device includes load-time and runtime integrity. In this paper, we design based on ARM TrustZo...
Internet Small Computer System Interface (iSCSI) is a proposed transport protocol for Small Computer Systems Interface (SCSI) that operates on top of TCP. This memo describes a standard mechanism for enabling clients to bootstrap themselves using the iSCSI protocol. The goal of this standard is to enable iSCSI boot clients to obtain the information to open an iSCSI session with the iSCSI boot s...
BACKGROUND Current research suggests that women married to military service members may experience difficulty during the transition to motherhood attributable to the additional stressors of military life and inability to access traditional support systems. OBJECTIVE To test the effects of a nursing intervention on prenatal and postpartum maternal role adaptation among military wives. METHOD...
What: We like minimally supervised learning (bootstrapping). Let’s convert it to unsupervised learning (“strapping”). How: If the supervision is so minimal, let’s just guess it! Lots of guesses lots of classifiers. Try to predict which one looks plausible (!?!). We can learn to make such predictions. Results (on WSD): Performance actually goes up! (Unsupervised WSD for translational senses, Eng...
In the context of High-Luminosity (HL) upgrade LHC, many custom ATCA electronics boards are being designed containing heterogeneous System-on-Chip (SoC) devices, more specifically Xilinx Zynq UltraScale+ (ZUS+) family. While application varies greatly, these devices regularly used for performing board management tasks, making them a fundamental element in correct operation board. The large numb...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید