Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 21 through 30 of 561 Luca Bigliardi's Bookmarks

Rothar was created in May 2008. The idea came up in the beginning of 2008, surprised by the amount of bicycles abandoned and damaged in Dublin streets. As cyclists (and passionate about bicycles), it was difficult to see that bicycles were considered disposable goods.

Share It With Others!

A computer mystery/romance set five minutes into the future of 1988.

Share It With Others!

In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to infiltrate any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input, including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on. We find that it is possible to bypass rudimentary network security protections within the car, such as maliciously bridging between our car’s two internal subnets. We also present composite attacks that leverage individual weaknesses, including an attack that embeds malicious code in a car’s telematics unit and that will completely erase any evidence of its presence after a crash.

Share It With Others!

The self-assembly of molecularly precise nanostructures is widely expected to form the basis of future high-speed integrated circuits, but the technologies suitable for such circuits are not well understood. In this work, DNA self-assembly is used to create molecular logic circuits that can selectively identify specific biomolecules in solution by encoding the optical response of near-field coupled arrangements of chromophores. The resulting circuits can detect label-free, femtomole quantities of multiple proteins, DNA oligomers,
and small fragments of RNA in solution via ensemble optical measurements. This method, which is capable of creating multiple logic-gate–sensor pairs on a 2 x 80 x 80-nm DNA grid, is a step toward more sophisticated nanoscale logic circuits capable of interfacing computers with biological processes.

Share It With Others!

(Neo-Noir) Interactive Movie by Dawid Marcinkowski

Share It With Others!

This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. This infringement on users' privacy poses a significant impediment to the legal adoption of BitTorrent.

Share It With Others!

In social choice theory, Arrow’s impossibility theorem, the General Possibility Theorem, or Arrow’s paradox, demonstrates that no voting system can convert the ranked preferences of individuals into a community-wide ranking while also meeting a certain set of criteria with three or more discrete options to choose from. These criteria are called unrestricted domain, non-imposition, non-dictatorship, Pareto efficiency, and independence of irrelevant alternatives.

Share It With Others!

Revisit is a real-time visualization of the latest twitter messages (tweets) around a specific topic. Use it create your own twitter wall at a conference or an ambient display at your company or whatever other idea you come up with. In contrast to other twitterwalls, it provides a sense of the temporal dynamics in the twitter stream, and emphasizes the conversational threads established by retweets and @replies.

Share It With Others!

I prefer functional languages like Scheme, Scala or Haskell over C++ for most tasks. So, when I'm forced to program in C++, I write functional C++. Fortunately, it's possible to add the most important ingredient in functional languages--lambda-style anonymous functions--to standard C++.

Share It With Others!

The development of a method for integrating highly efficient energy conversion materials onto stretchable, biocompatible rubbers could yield breakthroughs in implantable or wearable energy harvesting systems. Being electromechanically coupled, piezoelectric crystals represent a particularly interesting subset of smart materials that function as sensors/actuators, bioMEMS devices, and energy converters. Yet, the crystallization of these materials requires high temperatures for maximally efficient performance, rendering them incompatible with temperature-sensitive plastics and rubbers. Here, we overcome these limitations by presenting a scalable and parallel process for transferring crystalline piezoelectric nanothick ribbons of lead zirconate titanate from host substrates onto flexible rubbers over macroscopic areas. Fundamental characterization of the ribbons by piezo-force microscopy indicates that their electromechanical energy conversion metrics are the highest on a flexible medium.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT