Round control

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

“What goes round comes round”

Soon after the discovery of x-rays by Roentgen, radioactivity by Becquerel, and radium by the Curies, it was concluded that x-rays could not only be used for diagnostic purposes but also for therapy [1,2]. In the early years of radiation therapy, physicians had little understanding or knowledge of the physical nature and biological effects of radiation, the delivered doses were not certain, the...

متن کامل

Zero Round-Trip Time for the Extended Access Control Protocol

The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the...

متن کامل

Deficit round robin scheduling with adaptive weight control

Recently, I presented a paper, "Deficit round robin scheduling with adaptive weight control," coauthored with Ryan Zarick and Radim Bartos, at the 25th International Conference on Computer Applications in Industry and Engineering (ISCA-CAINE 2012). I highly recommend the ISCA-CAINE conference, as it includes quality papers from a broad spectrum of areas including: mobile applications, wireless ...

متن کامل

Convex-Round and Concave-Round Graphs

We introduce two new classes of graphs which we call convex-round, respectively concave-round graphs. Convex-round (concave-round) graphs are those graphs whose vertices can be circularly enumerated so that the (closed) neighborhood of each vertex forms an interval in the enumeration. Hence the two classes transform into each other by taking complements. We show that both classes of graphs have...

متن کامل

Cryptanalysis of some first round CAESAR candidates

ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES  _ CMCCv₁ with the complexity of two queries and the success ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Maandblad Voor Accountancy en Bedrijfseconomie

سال: 2002

ISSN: 2543-1684,0924-6304

DOI: 10.5117/mab.76.21796