17 resultados para Computer storage devices.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

We calculate the electron exchange coupling for a phosphorus donor pair in silicon perturbed by a J-gate potential and the boundary effects of the silicon host geometry. In addition to the electron-electron exchange interaction we also calculate the contact hyperfine interaction between the donor nucleus and electron as a function of the varying experimental conditions. Donor separation, depth of the P nuclei below the silicon oxide layer and J-gate voltage become decisive factors in determining the strength of both the exchange coupling and hyperfine interaction-both crucial components for qubit operations in the Kane quantum computer. These calculations were performed using an anisotropic effective-mass Hamiltonian approach. The behaviour of the donor exchange coupling as a function of the parameters varied in this work provides relevant information for the experimental design of these devices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our method uses reachability matrices to identify potentially undesirable information flows based on the fault modes of the system's components.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Novel carbon nanostructures can serve as effective storage media for methane, a source of clean energy for the future. We have used Grand Canonical Monte Carlo Simulation for the modeling of methane storage at 293 K and pressures up to 80 MPa in idealized bundles of (10,10) armchair-type single-walled carbon nanotubes and wormlike carbon pores. We have found that these carbon nanomaterials can be treated as the world's smallest high-capacity methane storage vessels. Our simulation results indicate that such novel carbon nanostructures can reach a high volumetric energy storage, exceeding the US FreedomCAR Partnership target of 2010 (5.4 MJ dm(-3)), at low to moderate pressures ranging from 1 to 7 MPa at 293 K. On the contrary, in the absence of these nanomaterials, methane needs to be compressed to approximately 13 MPa at 293 K to achieve the same target. The light carbon membranes composed of bundles of single-walled carbon nanotubes or wormlike pores efficiently physisorb methane at low to moderate pressures at 293 K, which we believe should be particularly important for automobiles and stationary devices. However, above 15-20 MPa at 293 K, all investigated samples of novel carbon nanomaterials are not as effective when compared with compression alone since the stored volumetric energy and power saturate at values below those of the bulk, compressed fluid.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Arguably, the world has become one large pervasive computing environment. Our planet is growing a digital skin of a wide array of sensors, hand-held computers, mobile phones, laptops, web services and publicly accessible web-cams. Often, these devices and services are deployed in groups, forming small communities of interacting devices. Service discovery protocols allow processes executing on each device to discover services offered by other devices within the community. These communities can be linked together to form a wide-area pervasive environment, allowing processes in one p u p tu interact with services in another. However, the costs of communication and the protocols by which this communication is mediated in the wide-area differ from those of intra-group, or local-area, communication. Communication is an expensive operation for small, battery powered devices, but it is less expensive for servem and workstations, which have a constant power supply and 81'e connected to high bandwidth networks. This paper introduces Superstring, a peer to-peer service discovery protocol optimised fur use in the wide-area. Its goals are to minimise computation and memory overhead in the face of large numbers of resources. It achieves this memory and computation scalability by distributing the storage cost of service descriptions and the computation cost of queries over multiple resolvers.