976 resultados para Cube attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a dynamic reordering superscalar processor, the front-end fetches instructions and places them in the issue queue. Instructions are then issued by the back-end execution core. Till recently, the front-end was designed to maximize performance without considering energy consumption. The front-end fetches instructions as fast as it can until it is stalled by a filled issue queue or some other blocking structure. This approach wastes energy: (i) speculative execution causes many wrong-path instructions to be fetched and executed, and (ii) back-end execution rate is usually less than its peak rate, but front-end structures are dimensioned to sustained peak performance. Dynamically reducing the front-end instruction rate and the active size of front-end structure (e.g. issue queue) is a required performance-energy trade-off. Techniques proposed in the literature attack only one of these effects.
In previous work, we have proposed Speculative Instruction Window Weighting (SIWW) [21], a fetch gating technique that allows to address both fetch gating and instruction issue queue dynamic sizing. SIWW computes a global weight on the set of inflight instructions. This weight depends on the number and types of inflight instructions (non-branches, high confidence or low confidence branches, ...). The front-end instruction rate can be continuously adapted based on this weight. This paper extends the analysis of SIWW performed in previous work. It shows that SIWW performs better than previously proposed fetch gating techniques and that SIWW allows to dynamically adapt the size of the active instruction queue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The influence of predation in structuring ecological communities can be informed by examining the shape and magnitude of the functional response of predators towards prey. We derived functional responses of the ubiquitous intertidal amphipod Echinogammarus marinus towards one of its preferred prey species, the isopod Jaera nordmanni. First, we examined the form of the functional response where prey were replaced following consumption, as compared to the usual experimental design where prey density in each replicate is allowed to deplete. E. marinus exhibited Type II functional responses, i.e. inversely density-dependent predation of J. nordmanni that increased linearly with prey availability at low densities, but decreased with further prey supply. In both prey replacement and non-replacement experiments, handling times and maximum feeding rates were similar. The non-replacement design underestimated attack rates compared to when prey were replaced. We then compared the use of Holling’s disc equation (assuming constant prey density) with the more appropriate Rogers’ random predator equation (accounting for prey depletion) using the prey non-replacement data. Rogers’ equation returned significantly greater attack rates but lower maximum feeding rates, indicating that model choice has significant implications for parameter estimates. We then manipulated habitat complexity and found significantly reduced predation by the amphipod in complex as opposed to simple habitat structure. Further, the functional response changed from a Type II in simple habitats to a sigmoidal, density-dependent Type III response in complex habitats, which may impart stability on the predator−prey interaction. Enhanced habitat complexity returned significantly lower attack rates, higher handling times and lower maximum feeding rates. These findings illustrate the sensitivity of the functional response to variations in prey supply, model selection and habitat complexity and, further, that E. marinus could potentially determine the local exclusion and persistence of prey through habitat-mediated changes in its predatory functional responses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Forecasting the ecological impacts of invasive species is a major challenge that has seen little progress, yet the development of robust predictive approaches is essential as new invasion threats continue to emerge. A common feature of ecologically damaging invaders is their ability to rapidly exploit and deplete resources. We thus hypothesized that the 'functional response' (the relationship between resource density and consumption rate) of such invasive species might be of consistently greater magnitude than those of taxonomically and/or trophically similar native species. Here, we derived functional responses of the predatory Ponto-Caspian freshwater 'bloody red' shrimp, Hemimysis anomala, a recent and ecologically damaging invader in Europe and N. America, in comparison to the local native analogues Mysis salemaai and Mysis diluviana in Ireland and Canada, respectively. This was conducted in a novel set of experiments involving multiple prey species in each geographic location and a prey species that occurs in both regions. The predatory functional responses of the invader were generally higher than those of the comparator native species and this difference was consistent across invaded regions. Moreover, those prey species characterized by the strongest and potentially de-stabilizing Type II functional responses in our laboratory experiments were the same prey species found to be most impacted by H. anomala in the field. The impact potential of H. anomala was further indicated when it exhibited similar or higher attack rates, consistently lower prey handling times and higher maximum feeding rates compared to those of the two Mysis species, formerly known as 'Mysis relicta', which itself has an extensive history of foodweb disruption in lakes to which it has been introduced. Comparative functional responses thus merit further exploration as a methodology for predicting severe community-level impacts of current and future invasive species and could be entered into risk assessment protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bdellovibrio bacteriovorus is a Gram-negative bacterium that preys on other Gram-negative bacteria. The lifecycle of B. bacteriovorus alternates between an extracellular flagellated and highly motile non-replicative attack-phase cell and a periplasmic non-flagellated growth-phase cell. The prey bacterium containing periplasmic bdellovibrios becomes spherical but osmotically stable, forming a structure known as the bdelloplast. After completing the growth phase, newly formed bdellovibrios regain their flagellum and escape the bdelloplast into the environment, where they encounter more prey bacteria. The obligate predatory nature of B. bacteriovorus imposes a major difficulty to introducing mutations in genes directly involved in predation, since these mutants could be non-viable. This work reports the cloning of the B. bacteriovorus 109J motAB operon, encoding proteins from the flagellar motor complex, and a genetic approach based on the expression of a motA antisense RNA fragment to downregulate motility. Periplasmic bdellovibrios carrying the plasmid expressing antisense RNA displayed a marked delay in escaping from bdelloplasts, while the released attack-phase cells showed altered motility. These observations suggest that a functionally intact flagellar motor is required for the predatory lifecycle of B. bacteriovorus. Also, the use of antisense RNA expression may be a useful genetic tool to study the Bdellovibrio developmental cycle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new model to explain animal spacing, based on a trade-off between foraging efficiency and predation risk, is derived from biological principles. The model is able to explain not only the general tendency for animal groups to form, but some of the attributes of real groups. These include the independence of mean animal spacing from group population, the observed variation of animal spacing with resource availability and also with the probability of predation, and the decline in group stability with group size. The appearance of "neutral zones" within which animals are not motivated to adjust their relative positions is also explained. The model assumes that animals try to minimize a cost potential combining the loss of intake rate due to foraging interference and the risk from exposure to predators. The cost potential describes a hypothetical field giving rise to apparent attractive and repulsive forces between animals. Biologically based functions are given for the decline in interference cost and increase in the cost of predation risk with increasing animal separation. Predation risk is calculated from the probabilities of predator attack and predator detection as they vary with distance. Using example functions for these probabilities and foraging interference, we calculate the minimum cost potential for regular lattice arrangements of animals before generalizing to finite-sized groups and random arrangements of animals, showing optimal geometries in each case and describing how potentials vary with animal spacing. (C) 1999 Academic Press.</p>

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A study undertaken at the University of Liverpool has investigated the potential for using construction and demolition waste (C&DW) derived aggregate in the manufacture of a range of precast concrete products, i.e. building and paving blocks and pavement flags. Phase III, which is reported here, investigated
concrete pavement flags. This was subsequent to studies on building and paving blocks. Recycled demolition aggregate can be used to replace newly quarried limestone aggregate, usually used in coarse (6 mm) and fine (4 mm-to-dust) gradings. The first objective was, as was the case with concrete building
and paving blocks, to replicate the process used by industry in fabricating concrete pavement flags in the laboratory. The ‘‘wet’’ casting technique used by industry for making concrete flags requires a very workable mix so that the concrete flows into the mould before it is compressed. Compression squeezes out water from the top as well as the bottom of the mould. This industrial casting procedure was successfully replicated in the laboratory by using an appropriately modified cube crushing machine and a special mould typical of what is used by industry. The mould could be filled outside of the cube crushing machine and then rolled onto a steel frame and into the machine for it to be compressed. The texture and mechanical properties of the laboratory concrete flags were found to be similar to the factory ones. The experimental work involved two main series of tests, i.e. concrete flags made with concrete- and
masonry-derived aggregate. Investigation of flexural strength was required for concrete paving flags. This is different from building blocks and paving blocks which required compressive and tensile splitting strength respectively. Upper levels of replacement with recycled demolition aggregate were determined
that produced similar flexural strength to paving flags made with newly quarried aggregates, without requiring an increase in the cement content. With up to 60% of the coarse or 40% of the fine fractions replaced with concrete-derived aggregates, the target mean flexural strength of 5.0 N/mm2 was still
achieved at the age of 28 days. There was similar detrimental effect by incorporating the fine masonry-derived aggregate. A replacement level of 70% for coarse was found to be satisfactory and also conservative. However, the fine fraction replacement could only be up to 30% and even reduced to 15% when used for mixes where 60% of the coarse fraction was also masonry-derived aggregate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This essay examines the relationship between two 'fake' editions of Shakespeare that appeared in the mid-nineteenth century: the so-called 'Perkins Folio', whose annotations were forged by the scholar J.P. Collier, and the 'Grimaldi Shakspeare', a satiric attack upon the spurious authenticity and authority of the Perkins Folio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces the discrete choice model-paradigm of Random Regret Minimisation (RRM) to the field of health economics. The RRM is a regret-based model that explores a driver of choice different from the traditional utility-based Random Utility Maximisation (RUM). The RRM approach is based on the idea that, when choosing, individuals aim to minimise their regret–regret being defined as what one experiences when a non-chosen alternative in a choice set performs better than a chosen one in relation to one or more attributes. Analysing data from a discrete choice experiment on diet, physical activity and risk of a fatal heart attack in the next ten years administered to a sample of the Northern Ireland population, we find that the combined use of RUM and RRM models offer additional information, providing useful behavioural insights for better informed policy appraisal.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chiral enamides5f-i were found to react with pyrylium ylides to give cycloadducts 6d-i in good yields with an excellent level of stereoselectivity. The chiral auxiliary was successfully removed on hydrogenolysis of compound 6f in continuous flow (H-Cube) resulting in the first asymmetric synthesis of complex amine 8.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security devices are vulnerable to Differential Power Analysis (DPA) that reveals the key by monitoring the power consumption of the circuits. In this paper, we present the first DPA attack against an FPGA implementation of the Camellia encryption algorithm with all key sizes and evaluate the DPA resistance of the algorithm. The Camellia cryptographic algorithm involves several different key-dependent intermediate operations including S-Box operations. In previous research, it was believed that the Camellia is stronger than AES due to the additional Whitening phase protecting the S-Box operation. However, we propose an attack that bypasses the Whitening phase and targets the S-Box. In this paper, we also discuss a lowcost countermeasure strategy to protect the Pre-whitening / Post-whitening and FL function of Camellia using Dual-rail Precharged Logic and to protect against attacks of the S-Box using Random Delay Insertion. © 2009 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Architects use cycle-by-cycle simulation to evaluate design choices and understand tradeoffs and interactions among design parameters. Efficiently exploring exponential-size design spaces with many interacting parameters remains an open problem: the sheer number of experiments renders detailed simulation intractable. We attack this problem via an automated approach that builds accurate, confident predictive design-space models. We simulate sampled points, using the results to teach our models the function describing relationships among design parameters. The models produce highly accurate performance estimates for other points in the space, can be queried to predict performance impacts of architectural changes, and are very fast compared to simulation, enabling efficient discovery of tradeoffs among parameters in different regions. We validate our approach via sensitivity studies on memory hierarchy and CPU design spaces: our models generally predict IPC with only 1-2% error and reduce required simulation by two orders of magnitude. We also show the efficacy of our technique for exploring chip multiprocessor (CMP) design spaces: when trained on a 1% sample drawn from a CMP design space with 250K points and up to 55x performance swings among different system configurations, our models predict performance with only 4-5% error on average. Our approach combines with techniques to reduce time per simulation, achieving net time savings of three-four orders of magnitude. Copyright © 2006 ACM.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In hypersonic flight, the prediction of aerodynamic heating and the construction of a proper thermal protection system (TPS) are significantly important. In this study, the method of a film cooling technique, which is already the state of the art in cooling of gas turbine engines, is proposed for a fully reusable and active TPS. Effectiveness of the film cooling scheme to reduce convective heating rates for a blunt-nosed spacecraft flying at Mach number 6.56 and 40 deg angle of attack is investigated numerically. The inflow boundary conditions used the standard values at an altitude of 30 km. The computational domain consists of infinite rows of film cooling holes on the bottom of a blunt-nosed slab. Laminar and several turbulent calculations have been performed and compared. The influence of blowing ratios on the film cooling effectiveness is investigated. The results exhibit that the film cooling technique could be an effective method for an active cooling of blunt-nosed bodies in hypersonic flows.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Efficiently exploring exponential-size architectural design spaces with many interacting parameters remains an open problem: the sheer number of experiments required renders detailed simulation intractable.We attack this via an automated approach that builds accurate predictive models. We simulate sampled points, using results to teach our models the function describing relationships among design parameters. The models can be queried and are very fast, enabling efficient design tradeoff discovery. We validate our approach via two uniprocessor sensitivity studies, predicting IPC with only 1–2% error. In an experimental study using the approach, training on 1% of a 250-K-point CMP design space allows our models to predict performance with only 4–5% error. Our predictive modeling combines well with techniques that reduce the time taken by each simulation experiment, achieving net time savings of three-four orders of magnitude.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:

Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.

• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.

• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.