منابع مشابه
Methods of encrypting monotonic access structures Jakub
We will present some ideas about sharing a secret in a monotonic access structure. We show the relations which occur between the method of encrypting a monotonic access structure with the use of basis sets or maximal unprivileged sets, and that based on a logical formula (used by Benaloh and Leichter in [1]). We will also give some facts connected with the problem of security, including the asp...
متن کاملResponse to Block on Abortion , round Three Jakub
In response, while I may concede that for the purpose of theoretical tidiness it might be desirable to keep the distinction between the ex ante principle of gentleness and the ex post principle of punitive proportionality maximally clear and unambiguous, I would have to say that I still regard them as similar with respect to their substantive, moral essence. Block justifiably qualifies the prin...
متن کاملKepler Map for H atom driven by microwaves with arbitrary polarization Prot Pakoński Jakub
Dynamics of hydrogen atom driven by microwave field of arbitrary polarization is approximated by the discrete mapping. The map describes the change of dynamical variables from an aphelion or a perihelion to the next one. The results are compared with numerical simulation and previous approximations.
متن کاملCombinatorial control of gene expression by the three yeast repressors Mig 1 , Mig 2 and Mig 3 Jakub
Background: Expression of a large number of yeast genes is repressed by glucose. The zinc finger protein Mig1 is the main effector in glucose repression, but yeast also has two related proteins: Mig2 and Mig3. We have used microarrays to study global gene expression in all possible combinations of mig1, mig2 and mig3 deletion mutants. Results: Mig1 and Mig2 repress a largely overlapping set of ...
متن کاملJuly 2000 Third Workshop on Attribute Grammars and their Applications WAGA 2000 Advances in Attribute Grammar Driven HardwareCompilation
High-level or behavioral synthesis of digital circuits ooers an eeective way to deal with the increasing complexity of digital hardware design. A high-level synthesis tool transforms an abstract algorithmic description into a detailed register transfer level implementation. Since most of the times the algorithmic description is given in textual form, high-level synthesis transformations share c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Societatis Botanicorum Poloniae
سال: 2017
ISSN: 2083-9480
DOI: 10.5586/asbp.1951.002