Terrestrial primordial neon

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Primordial Krypton in the Terrestrial Mantle Is Not Solar

Introduction: Noble gases are key tracers for the origin of volatiles in the terrestrial planets and of interaction between mantle reservoirs and the atmosphere. General consensus is that material accreting in the solar nebula and nebula gases from the Sun itself were incorporated into the terrestrial planets, providing a starting point for models of planetary evolution. However, the isotopic s...

متن کامل

NEON Crypto

NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing ...

متن کامل

of 44 NeOn Integrated Project EU - IST - 027595 NeOn

In this deliverable, we report on several evaluation experiments which aim to demonstrate the synergies arising from a combination of ontology design patterns and ontology learning techniques. Furthermore, we present a novel method for ontology refinement, i.e. the semi-automatic acquisition of complex domain-range restrictions, and its evaluation on the well-known SWRC ontology. A variant of t...

متن کامل

Differences between the impact regimes of the terrestrial planets: implications for primordial D:H ratios

Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online's data policy on reuse of materials please consult the policies page.

متن کامل

Cryptography for ARM NEON

Recent research has shown that implementations with variable execution timing may allow attackers to extract secret cryptographic keys stored on the device. Timing variances can occur due to implementation choices (e.g. data-dependent branches) or due to the internal architecture of the processor core (e.g. cache lines). In order to overcome this problem one needs to find alternative implementa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1991

ISSN: 0028-0836,1476-4687

DOI: 10.1038/352388b0