منابع مشابه
“What goes round comes round”
Soon after the discovery of x-rays by Roentgen, radioactivity by Becquerel, and radium by the Curies, it was concluded that x-rays could not only be used for diagnostic purposes but also for therapy [1,2]. In the early years of radiation therapy, physicians had little understanding or knowledge of the physical nature and biological effects of radiation, the delivered doses were not certain, the...
متن کاملZero Round-Trip Time for the Extended Access Control Protocol
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the...
متن کاملDeficit round robin scheduling with adaptive weight control
Recently, I presented a paper, "Deficit round robin scheduling with adaptive weight control," coauthored with Ryan Zarick and Radim Bartos, at the 25th International Conference on Computer Applications in Industry and Engineering (ISCA-CAINE 2012). I highly recommend the ISCA-CAINE conference, as it includes quality papers from a broad spectrum of areas including: mobile applications, wireless ...
متن کاملConvex-Round and Concave-Round Graphs
We introduce two new classes of graphs which we call convex-round, respectively concave-round graphs. Convex-round (concave-round) graphs are those graphs whose vertices can be circularly enumerated so that the (closed) neighborhood of each vertex forms an interval in the enumeration. Hence the two classes transform into each other by taking complements. We show that both classes of graphs have...
متن کاملCryptanalysis of some first round CAESAR candidates
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Maandblad Voor Accountancy en Bedrijfseconomie
سال: 2002
ISSN: 2543-1684,0924-6304
DOI: 10.5117/mab.76.21796