Although nanoparticles research is ongoing since more than 30 years, the development of methods and standard protocols required for their safety and efficacy testing for human use is still in development. The review covers questions on toxicity, safety, ri ...
Physical activity is an important determinant of health and well-being in older persons and contributes to their social participation and quality of life. Hence, assessment tools are needed to study this physical activity in free-living conditions. Wearabl ...
This protocol describes how in vivo-imaged dendrites and axons in adult mouse brains can subsequently be prepared and imaged with focused ion beam scanning electron microscopy (FIBSESEM). The procedure starts after in vivo imaging with chemical fixation, f ...
Trojan messages are messages that seem correct to the receiver but cannot be generated by any correct sender. Such messages constitute major vulnerability points of a distributed system---they constitute ideal targets for a malicious actor and facilitate f ...
A symbolic execution task is dynamically divided among multiple computing nodes. Each of the multiple computing nodes explores a different portion of a same symbolic execution tree independently of other computing nodes. Workload status updates are receive ...
One fundamental limitation of EEG-based brain- computer interfaces is the time needed to calibrate the system prior to the detection of signals, due to the wide variety of issues affecting the EEG measurements. For event-related potentials (ERP), one of th ...
Wireless mesh networks were designed as a mean to rapidly deliver large-scale communication capabilities without the support of any prior infrastructure. Among the different properties of mesh networks, the self-organizing feature is particularly interesti ...
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defeat some common privacy protection mechanisms. We propose the theoretical mode ...