Search results for "Execution"
showing 10 items of 74 documents
Edge-Based Missing Data Imputation in Large-Scale Environments
2021
Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis
Le renouvellement du contrôle juridictionnel de l’administration au moyen du recours pour excès de pouvoir
2017
The role of the administrative judge (the excess of power) has evolved due to the implementation of the various texts adopted recently as well as the developments in the case-law in recent years. In many areas, its role now goes beyond the mere confrontation of an administrative act with the rule of law. At the heart of the annulment decision is a statement and an assessment of the facts, apart from the interpretation of the law, which were usually separated by the principle of separation between the administration and its judge.Some jurisprudence which has become very classical, as well as others more recent, can be considered as characteristic manifestations of this new tendency of the ju…
A Focused Review of Language Use Preceding Death by Execution.
2018
Executions are one form of death that can be assumed to be maximally anxiety provoking. Words spoken by death row inmates moments before their execution can provide valuable insights into people's end-of-life communication needs and themes, conveying what individuals choose to express to others in the face of imminent death. In this focused review, we describe findings from quantitative and qualitative text analysis studies that have analyzed affective experiences and meaning-making attempts in transcriptions of actual statements made by Texas death row inmates. Overall, the most prevalent content themes identified in these final acts of verbal communication in the reviewed studies consiste…
Preventing reverse engineering of native and managed programs
2015
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…
On the impact of within-die process variation in GALS-Based NoC Performance
2012
[EN] Current integration scales allow designing chip multiprocessors (CMP), where cores are interconnected by means of a network-on-chip (NoC). Unfortunately, the small feature size of current integration scales causes some unpredictability in manufactured devices because of process variation. In NoCs, variability may affect links and routers causing them not to match the parameters established at design time. In this paper, we first analyze the way that manufacturing deviations affect the components of a NoC by applying a new comprehensive and detailed within-die variability model to 200 instances of an 8¿8 mesh NoC synthesized using 45 nm technology. Later, we show that GALS-based NoCs pr…
Reconfigurable control of robotized manufacturing cells
2007
This paper investigates the field of manufacturing system control. The addressed subject is indeed very fascinating, due to the importance that it has reached in the last decades both at research and industrial level. On the other hand, it seems to the author that most of the complexity intrinsic to the subject itself relies on the different meanings or levels of abstraction that both the terms ''manufacturing system'' and ''control'' may symbolize. The presented research aims to face the topic in a concrete fashion, i.e., by developing a control software system for a specific, although easy to be generalized, robotized manufacturing cell. Two different development methodologies, from the c…
A theory for long-memory in supply and demand
2004
Recent empirical studies have demonstrated long-memory in the signs of orders to buy or sell in financial markets [2, 19]. We show how this can be caused by delays in market clearing. Under the common practice of order splitting, large orders are broken up into pieces and executed incrementally. If the size of such large orders is power law distributed, this gives rise to power law decaying autocorrelations in the signs of executed orders. More specifically, we show that if the cumulative distribution of large orders of volume v is proportional to v to the power -alpha and the size of executed orders is constant, the autocorrelation of order signs as a function of the lag tau is asymptotica…
Motor imagery and cortico-spinal excitability: A review
2016
International audience; Motor imagery (MI) has received a lot of interest during the last decades as its chronic or acute use has demonstrated several effects on improving sport performances or skills. The development of neuroimagery techniques also helped further our understanding of the neural correlates underlying MI. While some authors showed that MI, motor execution and action observation activated similar motor cortical regions, transcranial magnetic stimulation (TMS) studies brought great insights on the role of the primary motor cortex and on the activation of the cortico-spinal pathway during MI. After defining MI and describing the TMS technique, a short report of MI activities on…
Automatic construction of test sets: Practical approach
2005
The problem of symbolic execution and test generation is considered both for sequential and concurrent programs. Practical methods for test construction for the given program path are presented.
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…