Dėl balsių <em>e </em>ir <em>ē </em>kai kurių pakitimo atvejų žemaičių dūnininkų tarmėje
نویسندگان
چکیده
منابع مشابه
BAYESIAN PERSUASION Emir
We thank Richard Holden for many important contributions to this paper. We would also like to thank Eric Budish, Navin Kartik, Canice Prendergast, Maxwell Stinchcombe, Lars Stole and participants at seminars at University of Mannheim, Duke/Northwestern/Texas IO Theory Conference, Stanford GSB, Simon Fraser University, University of British Columbia, and University of Chicago. This work is suppo...
متن کاملEME - low-cost embedded multiprocessing environment
This paper presents EME, a low-cost solution for a highly modular multiprocessing hardware-software environment useful in designing autonomous mobile robots. High processing capabilities, the ability to interface a large number of sensors and actuators, extensibility, redundancy and exibility are issues addressed by this environment. An autonomous robot equipped with two cameras, one for line-f...
متن کاملEME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data
This work describes a mode of operation, EME∗, that turns a regular block cipher into alength-preserving enciphering scheme for messages of (almost) arbitrary length. Specifically, theresulting scheme can handle any bit-length, not shorter than the block size of the underlyingcipher, and it also handles associated data of arbitrary bit-length. Such a scheme can either beused...
متن کاملeMir: Digital Signs that react to Audience Emotion
In this paper we present eMir, digital signage (public electronic displays) that show human faces which react to audience emotion. Using a camera installed at the sign, the system observes the audience and detects whether someone watches the display via face detection software. The face detection is able to classify facial expressions and determine gender. This information is used to let a huma...
متن کاملCharacterization of EME with Linear Mixing
Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encrypted in ECB mode of, then a non-linear mixing is performed and then again an encryption is performed in ECB mode which is masked to produce the ciphertext. Using the property of the binary field, the authors proved that the construction is not SPRP secure if the mixing used is linear. In this paper, we ob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Baltistica
سال: 2011
ISSN: 2345-0045,0132-6503
DOI: 10.15388/baltistica.20.2.1982