Another Stockton Dragon

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dragon

Objectives: Dragon Systems is developing and building high performance, computationallyefficient interactive speech workstations, to sup'port adaptive speech recognition of large vocabulary, natural language speech input in real-time. These systems are based on the results of the multi-knowledge source (MKS) algorithm architecture and multi-processor accelerator hardware studies previously unde...

متن کامل

Dragon surprise

There are now so few areas of natural environment in the world that have not been subject to biological survey or disturbance so the discovery of new species in recent expeditions to some of these regions has been proving remarkable, although large 'new' vertebrates are now increasingly rare. However, a recent analysis of material collected from lizard specimens in the northern Philippines has ...

متن کامل

Dragon curves revisited

It has happened several times in recent history that a mathematical discovery of great beauty and importance was originally published in a journal that would not likely to be read by many a working mathematician. One famous example is the Penrose tilings [15]. Surely, Penrose tilings and the theory of quasicrystals is now a major area of research (see, e.g., [17]), and not only in mathematics b...

متن کامل

Rainfall and Dragon-Kings

Previous studies have found broad distributions, resembling power laws for different measures of the size of rainfall events. We investigate the large-event tail of these distributions and find in one measure that tropical cyclones account for a large proportion of the very largest events outside the scaling regime, i.e., beyond the cutoff of the power law. Tropical cyclones are sufficiently ra...

متن کامل

Attack the Dragon

Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedback shift register (NLFSR) and a linear part (counter), combined by a filter function to generate a new state of the NLFSR and produce the keystream. The internal state of the cipher is 1088 bits, i.e., any kinds of TMD...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1899

ISSN: 0028-0836,1476-4687

DOI: 10.1038/059461b0