96 research outputs found

    An Overview of Starfish: A Table-Centric Tool for Interactive Synthesis

    Get PDF
    Engineering is an interactive process that requires intelligent interaction at many levels. My thesis [1] advances an engineering discipline for high-level synthesis and architectural decomposition that integrates perspicuous representation, designer interaction, and mathematical rigor. Starfish, the software prototype for the design method, implements a table-centric transformation system for reorganizing control-dominated system expressions into high-level architectures. Based on the digital design derivation (DDD) system a designer-guided synthesis technique that applies correctness preserving transformations to synchronous data flow specifications expressed as co- recursive stream equations Starfish enhances user interaction and extends the reachable design space by incorporating four innovations: behavior tables, serialization tables, data refinement, and operator retiming. Behavior tables express systems of co-recursive stream equations as a table of guarded signal updates. Developers and users of the DDD system used manually constructed behavior tables to help them decide which transformations to apply and how to specify them. These design exercises produced several formally constructed hardware implementations: the FM9001 microprocessor, an SECD machine for evaluating LISP, and the SchemEngine, garbage collected machine for interpreting a byte-code representation of compiled Scheme programs. Bose and Tuna, two of DDD s developers, have subsequently commercialized the design derivation methodology at Derivation Systems, Inc. (DSI). DSI has formally derived and validated PCI bus interfaces and a Java byte-code processor; they further executed a contract to prototype SPIDER-NASA's ultra-reliable communications bus. To date, most derivations from DDD and DRS have targeted hardware due to its synchronous design paradigm. However, Starfish expressions are independent of the synchronization mechanism; there is no commitment to hardware or globally broadcast clocks. Though software back-ends for design derivation are limited to the DDD stream-interpreter, targeting synchronous or real-time software is not substantively different from targeting hardware

    Real-Time Ozone Detection Based on a Microfabricated Quartz Crystal Tuning Fork Sensor

    Get PDF
    A chemical sensor for ozone based on an array of microfabricated tuning forks is described. The tuning forks are highly sensitive and stable, with low power consumption and cost. The selective detection is based on the specific reaction of the polymer with ozone. With a mass detection limit of ∼2 pg/mm2 and response time of 1 second, the sensor coated with a polymer sensing material can detect ppb-level ozone in air. The sensor is integrated into a miniaturized wearable device containing a detection circuit, filtration, battery and wireless communication chip, which is ideal for personal and microenvironmental chemical exposure monitoring

    Multi-key Security: The Even-Mansour Construction Revisited

    Get PDF
    International audienceAt ASIACRYPT 1991, Even and Mansour introduced a block cipher construction based on a single permutation. Their construction has since been lauded for its simplicity, yet also criticized for not providing the same security as other block ciphers against generic attacks. In this paper, we prove that if a small number of plaintexts are encrypted under multiple independent keys, the Even-Mansour construction surprisingly offers similar security as an ideal block cipher with the same block and key size. Note that this multi-key setting is of high practical relevance, as real-world implementations often allow frequent rekeying. We hope that the results in this paper will further encourage the use of the Even-Mansour construction, especially when a secure and efficient implementation of a key schedule would result in significant overhead

    Molecular imprinting science and technology: a survey of the literature for the years 2004-2011

    Full text link

    Educational implications of linguistic diversity in Britain Problem of innovation

    No full text
    Paper submitted to the seminarCentro de Informacion y Documentacion Cientifica (CINDOC). C/Joaquin Costa, 22. 28002 Madrid. SPAIN / CINDOC - Centro de Informaciòn y Documentaciòn CientìficaSIGLEESSpai

    Multi-object Localization in Robotic Hand

    No full text
    We have developed a machine learning approach to localized objects inside a robotic hand using only images from 2D cameras. Specifically, we used deep learning method (You Only Look Once, YOLO) and Iterative closest Point (ICP) to estimate the 3D coordinates of the objects in a robotic hand. This method will also output the number of objects inside the robotic hand in addition to the coordinates of the objects. We have demonstrated the performance with simulation and obtained typical accuracy within a few pixels (couple mm) and counting accuracy of about 76%. We have also applied it to real images, which is currently a work in progress to improve prediction performance. Furthermore, we are in the process of expanding the model to predict objects other than spheres. Our approach can find applications in many image-based object localization applications including industrial and service robotics

    Phishing with consumer electronics – malicious home routers

    No full text
    This paper describes an attack that exploits the online marketplace’s susceptibility to covert fraud, opaqueness of embedded software, and social engineering to hijack account access and ultimately steal money. The attacker introduces a fatal security flaw into a trusted embedded system (e.g. computer motherboard, network interface card, network router, cell phone), distributes it through the online marketplace at a plausible bargain, and then exploits the security flaw to steal information. Unlike conventional fraud, consumer risk far exceeds the price of the good. As proof of concept, the firmware on a wireless home router is replaced by an open source embedded operating system. Once installed, its DNS server is reconfigured to selectively spoof domain resolution. This instance of malicious embedded software is discussed in depth, including implementation details, attack extensions, and countermeasures.
    corecore