Seeing Blocks and Crypto Bros

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Consciousness and Criterion: On Blocks Case for Unconscious Seeing

Block (2012) highlights two experimental studies of neglect patients which, he contends, provide ‘dramatic evidence’ for unconscious seeing. In Block’s hands this is the highly non-trivial thesis that seeing of the same fundamental kind as ordinary conscious seeing can occur outside of phenomenal consciousness. Block’s case for it provides an excellent opportunity to consider a large body of re...

متن کامل

Seeing and not seeing.

Recent studies revealed that although subterranean mammals inhabit a dark underground environment, they can still perceive light stimuli and use this to entrain their circadian activity rhythm. Regarding spatial orientation, olfactory and tactile cues are employed for short-distance; whereas for long-distance, subterranean mammals employ the earth's magnetic field and self-generated (vestibular...

متن کامل

Graph Grammars for Super Mario Bros Levels

In side-scrolling games such as Super Mario Bros, the player interacts with a simplified, two-dimensional world made up of elements from a finite set. Conventionally, specialized designers build the levels of the game, applying their creativity and experience to produce content exhibiting structural correctness (the player must be able to traverse the level from start to end), interestingness a...

متن کامل

NEON Crypto

NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing ...

متن کامل

Crypto-integrity

Designing cryptographic mechanisms as well as products and systems that embed cryptographic components is a challenging task. This task will become increasingly hard as software technology and systems evolve and as the new computational environment becomes more distributed, more diverse, and more global. In order to enable the inclusion of cryptographic components in the future infrastructure a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Media-N

سال: 2020

ISSN: 1942-017X,2159-6891

DOI: 10.21900/j.median.v16i1.225