Search results for "Execution"

showing 10 items of 74 documents

Edge-Based Missing Data Imputation in Large-Scale Environments

2021

Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis

010504 meteorology & atmospheric sciencesComputer scienceDistributed computingUrban sensingMobile sensingContext (language use)Information technology02 engineering and technology01 natural sciences[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Smart cityEdge intelligence11. Sustainability0202 electrical engineering electronic engineering information engineeringLeverage (statistics)Edge computingVoronoi tessellation0105 earth and related environmental sciencesSmart cityOut-of-order executionSettore INF/01 - InformaticaMulti-agent systemMissing data imputation020206 networking & telecommunicationsT58.5-58.64Variety (cybernetics)Multi-agent system[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Mobile deviceInformation Systems
researchProduct

Le renouvellement du contrôle juridictionnel de l’administration au moyen du recours pour excès de pouvoir

2017

The role of the administrative judge (the excess of power) has evolved due to the implementation of the various texts adopted recently as well as the developments in the case-law in recent years. In many areas, its role now goes beyond the mere confrontation of an administrative act with the rule of law. At the heart of the annulment decision is a statement and an assessment of the facts, apart from the interpretation of the law, which were usually separated by the principle of separation between the administration and its judge.Some jurisprudence which has become very classical, as well as others more recent, can be considered as characteristic manifestations of this new tendency of the ju…

time-limitseffectiveness of controllegal security[SHS.DROIT] Humanities and Social Sciences/Lawjuge administratifquestion of factjurisdictional reviewrecevabilitéinstructiondélais de jugementinjonctionadministrationremedy for abuse of poweradministrédroits subjectifs[SHS.DROIT]Humanities and Social Sciences/Lawinjunctionsources de légalitéefficacité du contrôlemeans of controladmissibilitydroits objectifs.judgmentcontrôle juridictionnelprocédures d’urgencepouvoir discrétionnaireinvestigationsources of legalityobjective rights.subjective rightsadministrative acttiersdiscretionary powerexecution of judgmentRecours pour excès de pouvoircontrol of opportunityacte administratifurgent proceedingsobjective controladministrative judgemoyens de contrôlejugementexécution de la chosée jugéeadministeredcontrôle objectifquestion de faitsécurité juridiquecontrôle d'opportunité
researchProduct

A Focused Review of Language Use Preceding Death by Execution.

2018

Executions are one form of death that can be assumed to be maximally anxiety provoking. Words spoken by death row inmates moments before their execution can provide valuable insights into people's end-of-life communication needs and themes, conveying what individuals choose to express to others in the face of imminent death. In this focused review, we describe findings from quantitative and qualitative text analysis studies that have analyzed affective experiences and meaning-making attempts in transcriptions of actual statements made by Texas death row inmates. Overall, the most prevalent content themes identified in these final acts of verbal communication in the reviewed studies consiste…

emotion regulationexecutionFocused Reviewlanguage use05 social scienceslcsh:BF1-990Face (sociological concept)050109 social psychologytext analysis050105 experimental psychologyAdditional researchNonverbal communicationlcsh:PsychologydeathmedicineAnxietyPsychology0501 psychology and cognitive sciencesmedicine.symptomContent (Freudian dream analysis)PsychologySocial psychologyPractical implicationsGeneral PsychologyFrontiers in psychology
researchProduct

Preventing reverse engineering of native and managed programs

2015

One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…

virtualisointitrusted computingtietokoneohjelmatthin hypervisorvirtualizationbuffered executionremote attestationsalausavaimetsalauslähdekoodittakaisinmallinnushypervisorithypervisortietoturvainterpretationJava
researchProduct

On the impact of within-die process variation in GALS-Based NoC Performance

2012

[EN] Current integration scales allow designing chip multiprocessors (CMP), where cores are interconnected by means of a network-on-chip (NoC). Unfortunately, the small feature size of current integration scales causes some unpredictability in manufactured devices because of process variation. In NoCs, variability may affect links and routers causing them not to match the parameters established at design time. In this paper, we first analyze the way that manufacturing deviations affect the components of a NoC by applying a new comprehensive and detailed within-die variability model to 200 instances of an 8¿8 mesh NoC synthesized using 45 nm technology. Later, we show that GALS-based NoCs pr…

Engineering02 engineering and technology01 natural sciencesExecution timeDie (integrated circuit)Networks-on-chipReduction (complexity)0103 physical sciencesSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringGALSElectrical and Electronic Engineering010302 applied physicsbusiness.industryChipComputer Graphics and Computer-Aided Design020202 computer hardware & architectureProcess variationARQUITECTURA Y TECNOLOGIA DE COMPUTADORESProcess variationNetwork on a chipLogic gateEmbedded systembusinessSoftware
researchProduct

Reconfigurable control of robotized manufacturing cells

2007

This paper investigates the field of manufacturing system control. The addressed subject is indeed very fascinating, due to the importance that it has reached in the last decades both at research and industrial level. On the other hand, it seems to the author that most of the complexity intrinsic to the subject itself relies on the different meanings or levels of abstraction that both the terms ''manufacturing system'' and ''control'' may symbolize. The presented research aims to face the topic in a concrete fashion, i.e., by developing a control software system for a specific, although easy to be generalized, robotized manufacturing cell. Two different development methodologies, from the c…

Engineeringinterlocking logicPLC-based controlbusiness.industryreconfigurable controlPC-based controlGeneral MathematicsMass customizationControl (management)Ladder logicSettore ING-IND/35 - Ingegneria Economico-GestionaleIndustrial and Manufacturing EngineeringManufacturing engineeringComputer Science ApplicationsConceptual designComputer-integrated manufacturingControl and Systems EngineeringControl systembusinessSoftwareobject-oriented modelingAbstraction (linguistics)Manufacturing execution system
researchProduct

A theory for long-memory in supply and demand

2004

Recent empirical studies have demonstrated long-memory in the signs of orders to buy or sell in financial markets [2, 19]. We show how this can be caused by delays in market clearing. Under the common practice of order splitting, large orders are broken up into pieces and executed incrementally. If the size of such large orders is power law distributed, this gives rise to power law decaying autocorrelations in the signs of executed orders. More specifically, we show that if the cumulative distribution of large orders of volume v is proportional to v to the power -alpha and the size of executed orders is constant, the autocorrelation of order signs as a function of the lag tau is asymptotica…

PhysicsPhysics - Physics and SocietyActuarial scienceQuantitative Finance - Trading and Market MicrostructureCumulative distribution functionAutocorrelationFOS: Physical sciencesOrder (ring theory)Physics and Society (physics.soc-ph)Function (mathematics)Trading and Market Microstructure (q-fin.TR)FOS: Economics and businessCombinatoricsCondensed Matter - Other Condensed MatterExecution Commerce optimal liquidationLong memoryDiffusion (business)Constant (mathematics)Other Condensed Matter (cond-mat.other)
researchProduct

Motor imagery and cortico-spinal excitability: A review

2016

International audience; Motor imagery (MI) has received a lot of interest during the last decades as its chronic or acute use has demonstrated several effects on improving sport performances or skills. The development of neuroimagery techniques also helped further our understanding of the neural correlates underlying MI. While some authors showed that MI, motor execution and action observation activated similar motor cortical regions, transcranial magnetic stimulation (TMS) studies brought great insights on the role of the primary motor cortex and on the activation of the cortico-spinal pathway during MI. After defining MI and describing the TMS technique, a short report of MI activities on…

medicine.medical_treatmentPhysical Therapy Sports Therapy and RehabilitationAthletic Performance050105 experimental psychologyneuroscience03 medical and health sciences0302 clinical medicineMotor imagery[ INFO.INFO-BI ] Computer Science [cs]/Bioinformatics [q-bio.QM]medicinemotor controlHumans0501 psychology and cognitive sciencesOrthopedics and Sports MedicineNeural correlates of consciousnessmusculoskeletal neural and ocular physiology05 social sciencesMotor CortexMotor controlElectroencephalographyGeneral MedicineMagnetic Resonance ImagingTranscranial magnetic stimulationSpinal Cordnervous system[ SDV.NEU ] Life Sciences [q-bio]/Neurons and Cognition [q-bio.NC]Action observationImaginationPrimary motor cortexPsychologyNeurosciencePsychomotor Performance030217 neurology & neurosurgeryMotor executionTranscranial magnetic stimulationperformanceMuscle Contraction
researchProduct

Automatic construction of test sets: Practical approach

2005

The problem of symbolic execution and test generation is considered both for sequential and concurrent programs. Practical methods for test construction for the given program path are presented.

Computer scienceProgramming languagePath (graph theory)Path conditionSymbolic executioncomputer.software_genrecomputerTest harnessTest (assessment)
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct