Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

STRIDE (security)

Known as: Stride 
STRIDE is a system developed by Microsoft for thinking about computer security threats. It provides a mnemonic for security threats in six categories… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
In this paper we illustrate how to perform both visual object tracking and semi-supervised video object segmentation, in real… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2017
2017
Critical infrastructures and industrial control systems are complex Cyber-Physical Systems (CPS). To ensure reliable operations… Expand
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Is this relevant?
2015
2015
In this paper we propose the fastest converging control policy (also known as deadbeat control) for walking with the bipedal… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2006
2006
We propose a heuristic for the construction of variablestride multibit tries. These multibit tries are suitable for packet… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper describes an algorithm about online gait trajectory generation method, controller for walking, brief introduction of… Expand
  • figure 1
  • figure 4
  • figure 6
  • figure 5
  • figure 7
Is this relevant?
2001
2001
The gait of a multi-segment inchworm robot is a series of actuator actions that will change the shape of the robot to generate a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2000
2000
Processing-In-Memory (PIM) circumvents the von Neumann bottleneck by combining logic and memory (typically DRAM) on a single die… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
1999
1999
Summary The use of one and often two bits, in traditional or normal horsemanship, constitutes a welfare problem, a hazard to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We study the efficiency of previously proposed stride and sequential prefetching-two promising hardware-based prefetching schemes… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
1989
1989
Previous investigations into data storage schemes have focused on finding a storage scheme that permits conflict-free access for… Expand
Is this relevant?