Suggested Topics within your search.
Suggested Topics within your search.
- Citizen participation 1
- Collectors and collecting 1
- Cultural property 1
- Electronics 1
- Film adaptations 1
- Historic preservation 1
- Historiography 1
- History 1
- History and criticism 1
- Human-computer interaction 1
- Intangible property 1
- Mass media 1
- Mass media and technology 1
- Mnemonics 1
- Motion pictures and literature 1
- Museums and community 1
- Nursing 1
- Pharmacology 1
- Philosophy 1
- Protection 1
- Slavery--Religious aspects 1
- Social aspects 1
- Sound recording industry 1
- Sound recordings 1
- Study and teaching 1
- Technological innovations 1
-
2721
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article -
2722
Les spots politiques télévisés britanniques : de l’anecdote télévisuelle à la mémoire collective
Published 2005-01-01“…On the other, their linguistic and iconic discourse aims at leaving a lasting print in collective memory.…”
Get full text
Article -
2723
Electrochemical Intelligent Recognition of Mineral Materials Based on Superpixel Image Segmentation
Published 2022-01-01“…And using the experiment, the CPU used in the experiment is Intel® Core™ i7-8700 3.2 GHz, the memory is 16 GB, and the GPU is NVIDIA GeForce GT × 1080 Ti, which ensures the accuracy of the experiment. …”
Get full text
Article -
2724
Comment rester vigilant face à l’oubli ? Le musée de la fonderie à Rosières
Published 2011-12-01“…In the local museum of Rosières, a small industrial town located in the centre of France, the visitors are offered much more than the possibility to get a grasp of the smelting work itself, which we demonstrate through an analysis of the history of this museum, of the content of its permanent exhibition, and of a network of individuals who try to keep the industrial memory of this area alive. This museum indeed appears to function as a microcosm of a social life that no longer exists, and that was strongly connected to the factory life and the industrial plant as well as industrial paternalism that ruled the workers’ lives during almost one and a half century.…”
Get full text
Article -
2725
Manuscrits orientaux à Sarajevo
Published 2002-11-01“…Arabic, Turkish and Persian literature is well represented in Bosnia-Herzegovina where the memory of its days as part of the Ottoman Empire is still alive. …”
Get full text
Article -
2726
Tales Of Possession And Dispossession
Published 2018-11-01“…A polyphonic aesthetic of absence emerges from these exchanges to transform individual pain into collective memory.…”
Get full text
Article -
2727
Fractional Derivative and Optimal Control Analysis of Cholera Epidemic Model
Published 2022-01-01“…Numerical simulation analysis shows that increasing the order of fractional derivatives contributes to updating the memory of the population to control the effects of cholera infection through available controlling techniques. …”
Get full text
Article -
2728
Guidelines on the management of irritable bowel syndrome
Published 2018-09-01“…In memory of Professor Witold Bartnik These guidelines constitute an update of the previous „Recommendations on the management of irritable bowel syndrome” issued in 2008. …”
Get full text
Article -
2729
Les sources de l’histoire du duché. Publications et inventaires récents
Published 2003-03-01“…The endeavours to publish the narrative texts have materialised not only intonew editions of the major works of the Norman chroniclers, but have also led to a rediscovery of the earliest Norman historiography and sustained debates concerning the processes of transmission of memory and the appropriation by a society of its past. …”
Get full text
Article -
2730
L’Affaire Redureau, le crime de Bas-Briacé (1913) : Un meurtrier de 15 ans au cœur des complaintes
Published 2021-03-01“…This persistence of the memory of the horror caused by this gesture is further developed by Pierre Guillard, who draws on the most well-known lament concerning this affair, discovered during a work of harvesting and co-collecting songs from oral traditions undertaken in the late 1980s and early 1990s.…”
Get full text
Article -
2731
Low viral persistence of an immunological model
Published 2012-09-01“…Hepatitis B virus can persist at very low levels in the body in the face of host immunity, and reactive during immunosuppression and sustain the immunological memory to lead to the possible state of 'infection immunity'. …”
Get full text
Article -
2732
Navigating Civic Agency and Civic Space Amid Authoritarian Realities in Myanmar: Dietrich Bonhoeffer’s Concept of Divine Mandate as Public Theology
Published 2025-01-01“…It encompasses being an agent of direction, memory, linguistic self-consciousness and transformation.…”
Get full text
Article -
2733
Deterministic Generation of Concatenated Graph Codes from Quantum Emitters
Published 2025-01-01“…We propose schemes for generating concatenated graph codes using multiphoton emission from two quantum emitters or a single quantum emitter coupled to a memory—capabilities available in several photonic platforms. …”
Get full text
Article -
2734
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01“…For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation,and to provide mutual authentication between the label and the server,and anonymity and forward security.The analysis showed that the scheme could resist replay attack,tag camouflage attack,server cheat attack,DoS attack,position tracking attack and clone attack.Compared with the existing schemes,the proposed scheme provides high security performance under low memory,computation and communication requirements,and it can meet the security requirements of the RFID system.…”
Get full text
Article -
2735
Cooperative service caching and peer offloading in Internet of vehicles based on multi-agent meta-reinforcement learning
Published 2021-06-01“…In order to reduce computation complexity, a two-layer mutli-RSU (road side unit) service caching and peer offloading algorithm (MPO) was proposed to decouple the optimization problem.In the designed MPO, the outer layer utilized multi-agent meta-reinforcement learning, which established long short-term memory (LSTM) network as the meta-agent to balance decisions of local agents and accelerate learning progress.The inner layer utilized lagrange multiplier method to achieve optimal decision for RSU peer offloading.Experimental results based on real traffic data in Hangzhou demonstrate that the proposed method outperforms other methods and remains robust under large-scale workloads.…”
Get full text
Article -
2736
Can the Spinal Cord Learn and Remember?
Published 2008-01-01“…Learning and memory traditionally have been associated with cellular processes occurring in a specialized region of the brain called the hippocampus. …”
Get full text
Article -
2737
Input-dependent wave propagations in asymmetric cellular automata: Possible behaviors of feed-forward loop in biological reaction network
Published 2008-05-01“…Through thesystematic simulations, some novel input-dependent wave propagations werefound in certain asymmetric CA, which may be useful for the signaling pro-cesses like the distinction, the filtering and the memory of external stimuli.…”
Get full text
Article -
2738
Focus : Les archives audiovisuelles de la justice
Published 2024-10-01“…Thanks to the Law of the 11th of July 1985 as advocated by then Minister of Justice, Robert Badinter, cameras have been allowed into courtrooms, to constitute the memory of the Judiciary through historical video or sound archives, in their entirety, without cuts, additions or editing.This new law broke the ban on filming or photographing trials, which dated back to 1954. …”
Get full text
Article -
2739
Simple and Efficient Preconditioner for Surface Integral Solution of Scattering from Multilayer Dielectric Bodies
Published 2016-01-01“…Compared with the traditional near field preconditioner, the proposed preconditioner significantly reduce CPU time and memory requirement. Furthermore, the multilevel fast multipole algorithm (MLFMA) is employed to improve the capability of the solutions. …”
Get full text
Article -
2740
Remembering the Heidelberg Catechism in South Africa today? Some remarks on the commemoration of a 16th Century Reformed confession
Published 2014-12-01“…The first part of the article argues that commemorations invite us to be conscious of the close link between memory and identity, as well as to the fact that our memories of the past are often highly contested memories. …”
Get full text
Article