Concealing Coloration

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DNA-Inspired Information Concealing

Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].

متن کامل

Concealing with Structured Light

While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, b...

متن کامل

Concealing Campus Sexual Assault

This study tests whether there is substantial undercounting of sexual assault by universities. It compares the sexual assault data submitted by universities while being audited for Clery Act violations with the data from years before and after such audits. If schools report higher rates of sexual assault during times of higher regulatory scrutiny (audits), then that result would support the con...

متن کامل

Concealing Block Sizes Is Not Sufficient

correctly noted that blocked randomiza-tion has a disadvantage that " the executer can predict the next assignment " and this is clearly incompatible with allocation concealment. So we can agree that permuted blocks with a fixed block size should never be used in ran-domized trials. 2) But what is the solution to this problem? Kim and Shin 1) indicated that " To solve this problem, the allocato...

متن کامل

Concealing Secrets in Embedded Processors Designs

Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has either been implemented for particular hardware or software implementations. However, the drawbacks of protecting specific implementations are the lack of flexibility in terms of used algorithms, the im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Auk

سال: 1912

ISSN: 0004-8038,1938-4254

DOI: 10.2307/4071098