Showing 1 - 4 results of 4 for search 'GNU Go~', query time: 0.31s Refine Results
  1. 1

    A Vector-Like Reconfigurable Floating-Point Unit for the Logarithm by Nikolaos Alachiotis, Alexandros Stamatakis

    Published 2011-01-01
    “…Under double precision, one LAU is 20 and 2.6 times faster than the respective GNU and MKL functions and 1.4 times faster than the FloPoCo logarithm. …”
    Get full text
    Article
  2. 2

    Modelagem e Simulação: Problemas Típicos da Engenharia Química para Simulação e Análise by Ivan Carlos Franco

    Published 2022-02-01
    “… Modelos matemáticos podem ser utilizados em diversas fases da engenharia, porém para que possamos utilizá-los devemos realizar a simulação computacional e analisar se as saídas dos modelos estão coerentes e dentro do que esperamos para o processo. …”
    Get full text
    Article
  3. 3

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  4. 4

    Social Discontent and Voting Behaviour in South Africa’s 2024 General Elections: The Transition from One-party Dominance to a Multi-party Coalition by Ath`enkosi Mfusi Mbete, Collin Olebogeng Mongale, Victor Ojakorotu

    Published 2024-10-01
    “…As a result, the party fell below the threshold to govern on its own, leading to the formation of a multi-party coalition government with former opposition parties named the Government of National Unity (GNU). …”
    Get full text
    Article