نتایج جستجو برای: through sources
تعداد نتایج: 1595840 فیلتر نتایج به سال:
We postulate that regulatory compliance pressures that have forced information security out of obscurity and into the corporate boardroom provide economic justification for information security firms to innovate. We aim to establish the link between regulations and innovation through the intermediary of demand for information security products and services. First, we show from the results of a ...
Program obfuscation is a widely employed approach for software intellectual property protection. However, general obfuscation methods (e.g., lexical obfuscation, control obfuscation) implemented in mainstream obfuscation tools are heuristic and have little security guarantee. Recently in 2013, Garg et al. have achieved a breakthrough in secure program obfuscation with a graded encoding mechanis...
al-ghallābī is rated as among the shī‘ī authors of the third/eighth century, through whom many historical traditions have been related in shī‘ī and sunnī sources. examining the status of al-ghallābī’s traditions in the two major sects (of shī‘a and sunnī), this writing is intended to find the reason for the permeation of his traditions into the sources belonging to the sunnīs – who are very cau...
this paper modeled heating air of a room through examining free convection in a 3d chamber. the chamber had cold and hot sources with tc and th temperatures, respectively. its other walls were adiabatic. this study aimed at predicting effect of temperature difference, displacement of hot and cold sources and their aspect ratio on flow field, temperature and heat transfer rate. to conduct the st...
Center for Integrated Nanotechnologies (CINT), Los Alamos National Laboratory (LANL), Los Alamos, NM 87545, United States Dept. of Materials Science & Engineering, Seoul National University (SNU), Republic of Korea PKG Development Group, R&D Division, Hynix Semiconductor Inc., Republic of Korea Advanced Light Source (ALS), Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA 94720, United...
Varlo.s s.bstitlUmU f«T~ add~d onto starch by m~ans of ~surification or ~th~rification so that thtir ~fftct on rtllCtifJity of starch 'With isocyanatts in a nonpolar solvtnt could bt studi~d. Ma:rim.m rtacti~t, 0/ tht moJifitd starchts 'Was achitf)~d 'When tht dtgrtt of substitution (DS.) 'Was I.bo.t 0.7. C.,td .rtthl.M plastics madt from formulations containing 20 'I, of tht starch dtrl'Pl.t:v...
we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...
In this paper we solve the following open problem: we prove that equivalence in the logic of Temporal Here-and-There (THT) is not only a sufficient, but also a necessary condition for strong equivalence of two Temporal Equilibrium Logic (TEL) theories. This result has allowed constructing a tool, ABSTEM, that can be used to check different types of equivalence between two arbitrary temporal the...
Blet is a puzzle. One starts with an even number of coins, laid out in a circle. At first, the coins are laid out with heads and tails alternating (HTHTHT. . .HT). Each turn, you are allowed to take three consecutive coins that show tails-heads-tails and flip them over, getting heads-tails-heads. This increases the total number of heads by one. You may do the opposite, flipping a heads-tails-he...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید