5 resultados para Oblivious transfer

em Massachusetts Institute of Technology


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Almost 450 nuclear power plants are currently operating throughout the world and supplying about 17% of the world’s electricity. These plants perform safely, reliably, and have no free-release of byproducts to the environment. Given the current rate of growth in electricity demand and the ever growing concerns for the environment, the US consumer will favor energy sources that can satisfy the need for electricity and other energy-intensive products (1) on a sustainable basis with minimal environmental impact, (2) with enhanced reliability and safety and (3) competitive economics. Given that advances are made to fully apply the potential benefits of nuclear energy systems, the next generation of nuclear systems can provide a vital part of a long-term, diversified energy supply. The Department of Energy has begun research on such a new generation of nuclear energy systems that can be made available to the market by 2030 or earlier, and that can offer significant advances toward these challenging goals [1]. These future nuclear power systems will require advances in materials, reactor physics as well as heat transfer to realize their full potential. In this paper, a summary of these advanced nuclear power systems is presented along with a short synopsis of the important heat transfer issues. Given the nature of research and the dynamics of these conceptual designs, key aspects of the physics will be provided, with details left for the presentation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The summary from Goodson’s group on their recent work on heat transfer issues in the microelectronics and data storage industries illustrate the critical role of heat transfer for some areas of information technology. In this article, we build on their work and discuss some directions worthy of further research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report the creation of strained silicon on silicon (SSOS) substrate technology. The method uses a relaxed SiGe buffer as a template for inducing tensile strain in a Si layer, which is then bonded to another Si handle wafer. The original Si wafer and the relaxed SiGe buffer are subsequently removed, thereby transferring a strained-Si layer directly to Si substrate without intermediate SiGe or oxide layers. Complete removal of Ge from the structure was confirmed by cross-sectional transmission electron microscopy as well as secondary ion mass spectrometry. A plan-view transmission electron microscopy study of the strained-Si/Si interface reveals that the lattice-mismatch between the layers is accommodated by an orthogonal array of edge dislocations. This misfit dislocation array, which forms upon bonding, is geometrically necessary and has an average spacing of approximately 40nm, in excellent agreement with established dislocation theory. To our knowledge, this is the first study of a chemically homogeneous, yet lattice-mismatched, interface.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Memory errors are a common cause of incorrect software execution and security vulnerabilities. We have developed two new techniques that help software continue to execute successfully through memory errors: failure-oblivious computing and boundless memory blocks. The foundation of both techniques is a compiler that generates code that checks accesses via pointers to detect out of bounds accesses. Instead of terminating or throwing an exception, the generated code takes another action that keeps the program executing without memory corruption. Failure-oblivious code simply discards invalid writes and manufactures values to return for invalid reads, enabling the program to continue its normal execution path. Code that implements boundless memory blocks stores invalid writes away in a hash table to return as the values for corresponding out of bounds reads. he net effect is to (conceptually) give each allocated memory block unbounded size and to eliminate out of bounds accesses as a programming error. We have implemented both techniques and acquired several widely used open source servers (Apache, Sendmail, Pine, Mutt, and Midnight Commander).With standard compilers, all of these servers are vulnerable to buffer overflow attacks as documented at security tracking web sites. Both failure-oblivious computing and boundless memory blocks eliminate these security vulnerabilities (as well as other memory errors). Our results show that our compiler enables the servers to execute successfully through buffer overflow attacks to continue to correctly service user requests without security vulnerabilities.