Search results for "hardware"
showing 10 items of 1372 documents
Expiration of Time Limits and the Ius Appellationis
2022
The rotal decree under comment offers the cue to address the delicate topic of the appeal and the peremptory time limits for its presentation, especially in light of the recent reform of the canonical matrimonial process promulgated by Pope Francis.On the basis of the new structure of the process of matrimonial nullity appears, in fact, evident the legislative disfavor, towards the appeal, seen as a potentially dangerous tool for the salus animarum of the faithful for the risk of procedural lengths connected to it, so as to provide for a prior examination of admissibility in order to avoid that they were made for the purpose of mere dilatory, that is, for the sole purpose of lengthening the…
Testing and implementing a new approach to estimating interregional output multipliers using input-output data for South Korean regions
2020
Flegg's location quotient (FLQ) is a useful tool for estimating intraregional output multipliers. This paper uses it as one component when estimating interregional multipliers. Using statistical information criteria and official data for 16 South Korean regions, it is found that the best approach is to combine the FLQ with a simple trade model. The paper explains how the proposed procedure can be implemented for both multiple and individual regions, and also how a region-specific value for the unknown parameter δ in the FLQ formula can be determined. Finally, an illustrative case study of one of the regions is carried out.
A Telemetry, Tracking, and Command Antennas System for Small-Satellite Applications
2019
Circularly polarized (CP) antennas are used in space applications for telemetry tracking and command (TT&
Annales des travaux des auditeurs de l'IHEDN 2009 : "Y a-t-il un retour du "soft power" dans les relations internationales ?
2009
CD rom; International audience
Attacking TrustZone on devices lacking memory protection
2021
AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…
Software-as-a-Service Revenue Models
2013
This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.
A modelling framework for social media monitoring
2013
This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…
Consumer value of camera-based mobile interaction with the real world
2013
Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…
Utilizing online serious games to facilitate distributed requirements elicitation
2015
Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …