منابع مشابه
DNA-Inspired Information Concealing
Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].
متن کاملConcealing with Structured Light
While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, b...
متن کاملConcealing Campus Sexual Assault
This study tests whether there is substantial undercounting of sexual assault by universities. It compares the sexual assault data submitted by universities while being audited for Clery Act violations with the data from years before and after such audits. If schools report higher rates of sexual assault during times of higher regulatory scrutiny (audits), then that result would support the con...
متن کاملConcealing Block Sizes Is Not Sufficient
correctly noted that blocked randomiza-tion has a disadvantage that " the executer can predict the next assignment " and this is clearly incompatible with allocation concealment. So we can agree that permuted blocks with a fixed block size should never be used in ran-domized trials. 2) But what is the solution to this problem? Kim and Shin 1) indicated that " To solve this problem, the allocato...
متن کاملConcealing Secrets in Embedded Processors Designs
Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has either been implemented for particular hardware or software implementations. However, the drawbacks of protecting specific implementations are the lack of flexibility in terms of used algorithms, the im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Auk
سال: 1912
ISSN: 0004-8038,1938-4254
DOI: 10.2307/4071098