the maiden castle

نویسندگان
چکیده

0

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Castle Landenberg

In this paper we demonstrate the workflow of 3D modelling and photorealistic texture mapping based on close range imagery acquired with a mini-UAV (Unmanned Aerial Vehicle) and in terrestrial mode. For generation of a highly accurate 3D model, a combined photogrammetric processing of these images was required. The conducted workflow consists of the following steps: project planning, flight plan...

متن کامل

Title: the Castle on the Hill the Castle on the Hill

A simple example of a stochastic game with irreversibility is studied and it is shown that the folk theorem fails in a robust way. In this game of Castle on the Hill, for a broad range of discount factors, including those close to one, equilibrium is unique. Moreover, the equilibrium for large discount factors is Pareto dominated by the equilibrium for low discount factors. A unique cyclic equi...

متن کامل

Castle curves and codes

We introduce two types of curves of interest for coding theory purposes: the so-called Castle and weak Castle curves. We study the main properties of codes arising from these curves.

متن کامل

Handing Over the Keys to the Castle

In this digital age, information is secured, coveted, and exfiltrated by nation states, hacktivists, and ambitious actors because, now more than ever, knowledge is power. Modern needs dictate that only authorized users know information, that authorized users can access information instantaneously, and that the integrity of information is certain. In opposition to these aspirations, an incessant...

متن کامل

Johnny Can Obfuscate: Beyond Mother's Maiden Name

Challenge/response authentication is stronger than password authentication, but has traditionally required a device for computing the challenge. Though human computation is limited, people can compute simple responses to challenges. If the challenge and the corresponding response is obfuscated with decoy information, an authentication scheme might be strong enough for a number of applications. ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
مطالعات ایرانی

جلد ۱۱، شماره ۲۱، صفحات ۲۲۳-۲۴۵

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023