منابع مشابه
Snake Lex: An Alternative to Double Lex
Complete row and column symmetry breaking in constraint models using the lex leader method is generally prohibitively costly. Double lex, which is derived from lex leader, is commonly used in practice as an incomplete symmetrybreaking method for row and column symmetries. Double lex is based on a rowwise canonical variable ordering. However, this choice is arbitrary. We investigate other canoni...
متن کاملLex: Legislation in XML
This paper presents a proposal for an open XML standard for the markup of legal documents: METALex. The standard provides a generic and easily extensible framework for the XML encoding of the structure and contents of legal and paralegal documents. It differs from other existing metadata schemes in two respects: It is language and jurisdiction independent and it aims to accommodate uses of XML ...
متن کاملCOMP-lex Mechanics
Emerging evidence continues to support the functional importance of extracellular matrix (ECM) proteins in cellular signaling. In mineralizing tissues, including bone, cartilage, and vasculature, ECM proteins not only provide the microenvironment for propagation of crystal growth but also support and transmit mechanical cues to the cells, and these cues govern many aspects of cell function, inc...
متن کاملCOMP-lex Mechanics
Emerging evidence continues to support the functional importance of extracellular matrix (ECM) proteins in cellular signaling. In mineralizing tissues, including bone, cartilage, and vasculature, ECM proteins not only provide the microenvironment for propagation of crystal growth but also support and transmit mechanical cues to the cells, and these cues govern many aspects of cell function, inc...
متن کاملAlgebraic Analysis of LEX
LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equations in 17 variables. This is very close to the requirement for an efficient attack, i....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Zeszyty Naukowe Uniwersytetu Szczecińskiego Finanse Rynki Finansowe Ubezpieczenia
سال: 2016
ISSN: 2450-7741,2300-4460
DOI: 10.18276/frfu.2016.4.82/1-68