948 resultados para Execution trace
Resumo:
Brown, D.S., Nightingale, R.W., Alexander, D., Schrijver, C.J., Metcalf, T.R., Shine, R.A., Title, A.M. and Wolfson, C.J., 2003, Observations of rotating sunspots from TRACE, Solar Physics, 216, 79-108.
Resumo:
Fitzgerald, S., Simon, B., and Thomas, L. 2005. Strategies that students use to trace code: an analysis based in grounded theory. In Proceedings of the First international Workshop on Computing Education Research (Seattle, WA, USA, October 01 - 02, 2005). ICER '05. ACM, New York, NY, 69-80
Resumo:
In a recent paper (Changes in Web Client Access Patterns: Characteristics and Caching Implications by Barford, Bestavros, Bradley, and Crovella) we performed a variety of analyses upon user traces collected in the Boston University Computer Science department in 1995 and 1998. A sanitized version of the 1995 trace has been publicly available for some time; the 1998 trace has now been sanitized, and is available from: http://www.cs.bu.edu/techreports/1999-011-usertrace-98.gz ftp://ftp.cs.bu.edu/techreports/1999-011-usertrace-98.gz This memo discusses the format of this public version of the log, and includes additional discussion of how the data was collected, how the log was sanitized, what this log is and is not useful for, and areas of potential future research interest.
Resumo:
The SNBENCH is a general-purpose programming environment and run-time system targeted towards a variety of Sensor applications such as environmental sensing, location sensing, video sensing, etc. In its current structure, the run-time engine of the SNBENCH namely, the Sensorium Execution Environment (SXE) processes the entities of execution in a single thread of operation. In order to effectively support applications that are time-sensitive and need priority, it is imperative to process the tasks discretely so that specific policies can be applied at a much granular level. The goal of this project was to modify the SXE to enable efficient use of system resources by way of multi-tasking the individual components. Additionally, the transformed SXE offers the ability to classify and employ different schemes of processing to the individual tasks.
Resumo:
Transverse trace-free (TT) tensors play an important role in the initial conditions of numerical relativity, containing two of the component freedoms. Expressing a TT tensor entirely, by the choice of two scalar potentials, is not a trivial task however. Assuming the added condition of axial symmetry, expressions are given in both spherical and cylindrical coordinates, for TT tensors in flat space. A coordinate relation is then calculated between the scalar potentials of each coordinate system. This is extended to a non-flat space, though only one potential is found. The remaining equations are reduced to form a second order partial differential equation in two of the tensor components. With the axially symmetric flat space tensors, the choice of potentials giving Bowen-York conformal curvatures, are derived. A restriction is found for the potentials which ensure an axially symmetric TT tensor, which is regular at the origin, and conditions on the potentials, which give an axially symmetric TT tensor with a spherically symmetric scalar product, are also derived. A comparison is made of the extrinsic curvatures of the exact Kerr solution and numerical Bowen-York solution for axially symmetric black hole space-times. The Brill wave, believed to act as the difference between the Kerr and Bowen-York space-times, is also studied, with an approximate numerical solution found for a mass-factor, under different amplitudes of the metric.
Resumo:
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.
Resumo:
info:eu-repo/semantics/nonPublished
Resumo:
info:eu-repo/semantics/nonPublished
Resumo:
BACKGROUND: The superior colliculus (SC) has been shown to play a crucial role in the initiation and coordination of eye- and head-movements. The knowledge about the function of this structure is mainly based on single-unit recordings in animals with relatively few neuroimaging studies investigating eye-movement related brain activity in humans. METHODOLOGY/PRINCIPAL FINDINGS: The present study employed high-field (7 Tesla) functional magnetic resonance imaging (fMRI) to investigate SC responses during endogenously cued saccades in humans. In response to centrally presented instructional cues, subjects either performed saccades away from (centrifugal) or towards (centripetal) the center of straight gaze or maintained fixation at the center position. Compared to central fixation, the execution of saccades elicited hemodynamic activity within a network of cortical and subcortical areas that included the SC, lateral geniculate nucleus (LGN), occipital cortex, striatum, and the pulvinar. CONCLUSIONS/SIGNIFICANCE: Activity in the SC was enhanced contralateral to the direction of the saccade (i.e., greater activity in the right as compared to left SC during leftward saccades and vice versa) during both centrifugal and centripetal saccades, thereby demonstrating that the contralateral predominance for saccade execution that has been shown to exist in animals is also present in the human SC. In addition, centrifugal saccades elicited greater activity in the SC than did centripetal saccades, while also being accompanied by an enhanced deactivation within the prefrontal default-mode network. This pattern of brain activity might reflect the reduced processing effort required to move the eyes toward as compared to away from the center of straight gaze, a position that might serve as a spatial baseline in which the retinotopic and craniotopic reference frames are aligned.
Resumo:
In the ancient and acidic Ultisol soils of the Southern Piedmont, USA, we studied changes in trace element biogeochemistry over four decades, a period during which formerly cultivated cotton fields were planted with pine seedlings that grew into mature forest stands. In 16 permanent plots, we estimated 40-year accumulations of trace elements in forest biomass and O horizons (between 1957 and 1997), and changes in bioavailable soil fractions indexed by extractions of 0.05 mol/L HCl and 0.2 mol/L acid ammonium oxalate (AAO). Element accumulations in 40-year tree biomass plus O horizons totaled 0.9, 2.9, 4.8, 49.6, and 501.3 kg/ha for Cu, B, Zn, Mn, and Fe, respectively. In response to this forest development, samples of the upper 0.6-m of mineral soil archived in 1962 and 1997 followed one of three patterns. (1) Extractable B and Mn were significantly depleted, by -4.1 and -57.7 kg/ha with AAO, depletions comparable to accumulations in biomass plus O horizons, 2.9 and 49.6 kg/ha, respectively. Tree uptake of B and Mn from mineral soil greatly outpaced resupplies from atmospheric deposition, mineral weathering, and deep-root uptake. (2) Extractable Zn and Cu changed little during forest growth, indicating that nutrient resupplies kept pace with accumulations by the aggrading forest. (3) Oxalate-extractable Fe increased substantially during forest growth, by 275.8 kg/ha, about 10-fold more than accumulations in tree biomass (28.7 kg/ha). The large increases in AAO-extractable Fe in surficial 0.35-m mineral soils were accompanied by substantial accretions of Fe in the forest's O horizon, by 473 kg/ha, amounts that dwarfed inputs via litterfall and canopy throughfall, indicating that forest Fe cycling is qualitatively different from that of other macro- and micronutrients. Bioturbation of surficial forest soil layers cannot account for these fractions and transformations of Fe, and we hypothesize that the secondary forest's large inputs of organic additions over four decades has fundamentally altered soil Fe oxides, potentially altering the bioavailability and retention of macro- and micronutrients, contaminants, and organic matter itself. The wide range of responses among the ecosystem's trace elements illustrates the great dynamics of the soil system over time scales of decades.
Resumo:
info:eu-repo/semantics/published
Resumo:
Space-borne thermal infrared instruments working in the nadir geometry are providing spectroscopic measurements of species that impact on the chemical composition of the atmosphere and on the climate forcing: H2O, CO2, N2O, CH4, CFCs, O3, and CO. The atmospheric abundances obtained from the analysis of IMG/ADEOS measurements are discussed in order to demonstrate the potential scientific return to be expected from future missions using advanced infrared nadir sounders. Some strengths and limitations of passive infrared remote sensing from space are illustrated. © 2003 European Geosciences Union.