A NEW PERIMETER.

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Perimeter-Crossing Buses: a New Attack Surface for Embedded Systems

Any channel crossing the perimeter of a system provides an attack surface to the adversary. Standard network interfaces, such as TCP/IP stacks, constitute one such channel, and security researchers and exploit developers have invested much effort into exploring the attack surfaces and defenses there. However, channels such as USB have been overlooked, even though such code is at least as comple...

متن کامل

Vertical perimeter versus horizontal perimeter

Given k ∈ N, the k’th discrete Heisenberg group, denoted H Z , is the group generated by the elements a1, b1, . . . , ak, bk, c, subject to the commutator relations [a1, b1] = . . . = [ak, bk] = c, while all the other pairs of elements from this generating set are required to commute, i.e., for every distinct i, j ∈ {1, . . . , k} we have [ai, aj ] = [bi, bj ] = [ai, bj ] = [ai, c] = [bi, c] = ...

متن کامل

The perimeter in site directed percolation. Mean perimeter expansions

2014 Exact expansions for susceptibility 2014 like mean perimeter series for directed percolation and extended mean size series are analysed, on two and three dimensional lattices. The critical threshold pc estimates are refined for the triangular and simple cubic lattices. On the square next-nearest-neighbour site problem pc is estimated as pc = 0.4965 ± 0.002. J. Physique 47 (1986) 943-946 JU...

متن کامل

Semantics-Aware Perimeter Protection

Web services security is becoming a critical concern for any organization adopting the XML-based Web services approach to application integration. While many access control techniques for Web services are becoming available, several issues still need to be solved in order to correctly split the burden of securing Web services between the perimetral and the service level. In this paper, a techni...

متن کامل

Of Minimal Perimeter

The square decomposition problem has applications in a number of areas such as bin packing of flexible objects of fixed area and circuit layout with minimum communication requirements. Our interest in the square decomposition problem arises from the following problem in parallel computation [1]. One wishes to compute a table of all values of a binary function f on the Cartesian product S x T, w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the American Medical Association

سال: 1886

ISSN: 0002-9955

DOI: 10.1001/jama.1886.04250110068006