A SECRET HISTORY: CHARACTER ANALYSIS

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

A Brief History of Motion Capture for Computer Character Animation

Motion capture is the recording of human body movement (or other movement) for immediate or delayed analysis and playback. The information captured can be as general as the simple position of the body in space or as complex as the deformations of the face and muscle masses. Motion capture for computer character animation involves the mapping of human motion onto the motion of a computer charact...

متن کامل

A Computational Feature Analysis for Multilingual Character-to-Character Dialogue

Natural language generation systems to date have concentrated on the tasks of explanation generation, tutorial dialogue, automated software documentation, and similar technical tasks. A largely unexplored area is narrative prose generation, or the production of texts used in stories such as novels, mysteries, and fairy tales. We present a feature analysis of one complex area of NLG found in nar...

متن کامل

Secret computation of purchase history data using somewhat homomorphic encryption

We consider secret computation of purchase history data among two companies of different type of business in order to identify purchase patterns without revealing customer information of each company. Among several privacy-preserving approaches, we focus on homomorphic encryption, which is public-key encryption supporting meaningful computations on encrypted data. In particular, we apply the so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: South archive (philological sciences)

سال: 2019

ISSN: 2663-2691,2663-2705

DOI: 10.32999/ksu2663-2691/2019-77-8