Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,482 result(s) for "Assembly language"
Sort by:
Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers
In recent years, the internet and smart devices have developed rapidly. Many people no longer rely on newspapers, magazines, or television to receive news. They can see the latest news using computers or mobile phones. According to a study by the Taiwan Internet Information Center, nearly 90% of Taiwanese people have used the internet. Many online streaming services have emerged, and people can easily watch movies and TV programs through computers or mobile phones. Hence, some websites use digital copyright management mechanisms to protect videos from being directly downloaded. However, 30% of websites use AES-128 encryption to protect their content. If the key access mechanism is not well protected, the encryption methodology may be useless. Therefore, this paper proposes a cross-platform digital copyright management mechanism for adaptive streaming. With this mechanism, users do not need to download additional applications, as the mechanism implements Web-Assembly language through the browser.
Encoding Electronic Spectra in Quantum Circuits with Linear T Complexity
We construct quantum circuits that exactly encode the spectra of correlated electron models up to errors from rotation synthesis. By invoking these circuits as oracles within the recently introduced “qubitization” framework, one can use quantum phase estimation to sample states in the Hamiltonian eigenbasis with optimal query complexityO(λ/ε), whereλis an absolute sum of Hamiltonian coefficients andεis the target precision. For both the Hubbard model and electronic structure Hamiltonian in a second quantized basis diagonalizing the Coulomb operator, our circuits have T-gate complexityO(N+log(1/ε)), whereNis the number of orbitals in the basis. This scenario enables sampling in the eigenbasis of electronic structure Hamiltonians with T complexityO(N3/ε+N2log(1/ε)/ε). Compared to prior approaches, our algorithms are asymptotically more efficient in gate complexity and require fewer T gates near the classically intractable regime. Compiling to surface code fault-tolerant gates and assuming per-gate error rates of one part in a thousand reveals that one can error correct phase estimation on interesting instances of these problems beyond the current capabilities of classical methods using only about a million superconducting qubits in a matter of hours.
Art of Assembly Language
Widely respected by hackers of all kinds, The Art of Assembly Language teaches programmers how to understand assembly language and how to use it to write powerful, efficient code. Using the proven High Level Assembler (HLA) as its primary teaching tool, The Art of Assembly Language leverages your knowledge of high level programming languages to make it easier for you to quickly grasp basic assembly concepts. Among the most comprehensive references to assembly language ever published, The Art of Assembly Language, 2nd Edition has been thoroughly updated to reflect recent changes to the HLA language. All code from the book is portable to the Windows, Linux, Mac OS X, and FreeBSD operating systems.
Modelling reversible execution of robotic assembly
Programming robotic assembly for industrial small-batch production is challenging; hence, it is vital to increase robustness and reduce development effort in order to achieve flexible robotic automation. A human who has made an assembly error will often simply undo the process until the error is undone and then restart the assembly. Conceptually, robots could do the same. This paper introduces a programming model that enables robot assembly programs to be executed in reverse. We investigate the challenges in running robot programs backwards and present a classification of reversibility characteristics. We demonstrate how temporarily switching the direction of program execution can be an efficient error recovery mechanism. Moreover, we demonstrate additional benefits arising from supporting reversibility in an assembly language, such as increased code reuse and automatically derived disassembly sequences. As a default approach to reversibility, we use program inversion and statement-level inversion of commands, but with a novel override option providing alternative sequences for asymmetric reverse actions. To efficiently program for this model, this paper introduces a new domain-specific language, SCP-RASQ (Simple C++ Reversible Assembly SeQuences). In initial experiments, where 200 consecutive assemblies of two industrial cases were performed, 18 of 22 errors were corrected automatically using only the trial-and-error capabilities that come from reverse execution.
Research and practice of software protection based on virtual shell technology
Through software decompilation technology, decompiling software can obtain pseudocode of the program source code, causing more and more events of core technology leakage or threats to software intellectual property rights, especially, the proliferation of pirated software. Aiming at the problem of how to effectively protect the software, this article implements a virtual shell packer with the virtual shell technology based on the QT5 framework as the front-end page frame and the assembly language to write the interpreter. Based on this packer, the code of protected software would be decompiled into logically chaotic code in order to increase the difficulty of cracking. Experiments show that this technology can effectively prevent the original pseudo-code from being restored through decompilation. So the software products are effectively protected.
Improved PIC16f877 microcontroller timer register to delimit the execution time of an operation
We often plan and build applications that carry out various processes requiring precise time management. Time management is attributed to the microcontroller, which can use various techniques such as instruction execution time, which requires delicate control of loops, or the use of functions such as delay, which cause your program to lose time in order to create delays. The problem with this kind of time management is that the time lost is of unknown duration. To alleviate this problem, new microcontrollers almost always offer specialized time-counting and time-management circuits, known as timers. A timer is a kind of clock built into the microcontroller, enabling the duration of an event to be measured. Their use is not complicated, but requires a good understanding of the structure of the various timers on a microcontroller. In this paper, we’ve chosen to demonstrate the improved and management of timers on Microchip’s PIC 16F877 microcontroller using assembly language.
The HACMS program: using formal methods to eliminate exploitable bugs
For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA's HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’.