نتایج جستجو برای: break problem

تعداد نتایج: 917759  

1992
Rafael Hirschfeld

We show how to break an electronic cash protocol due to van Antwerpen (a refinement of the system proposed by Chaum, Fiat, and Naor), and give an alternative protocol that fixes the problem.

Journal: :Oper. Res. Lett. 2005
Ryuhei Miyashiro Tomomi Matsui

We propose a polynomial-time algorithm to find an equitable home–away assignment for a given timetable of a round-robin tournament. Our results give an answer to a problem raised by Elf et al. (Oper. Res. Lett. 31 (2003) 343), which concerns the computational complexity of the break minimization problem in sports timetabling. © 2004 Elsevier B.V. All rights reserved.

Journal: :پژوهش های فقهی 0
علیرضا صابریان استادیارمجتمع آموزش عالی شهید محلاتی قم

according to commonly believed in imamiyeh' s fiqh, a murder commitment made in haram months would causes an increment in blood money to one third. the increment is called taghlize diyeh, increase of blood money. the increase includes all three kinds of murder commitments, namely intentional, quasi-intentional and unintentional ones, the very meaning written down in islamic puni-shment law...

2015
Mohammad Rostami

Dam break analysis plays a very important role in the risk assessment of dams. Large dams pose significantly higher risks to the people and property downstream of the dam as compared to smaller dams. So the flooding risk due to the possible failure of large dams is more crucial. The simulation of exceptional events characterized by high hydraulic and hydro-geologic risk is an actual problem for...

1998
Patrick C Hew

We correct for missed breaks in Lim-Alder Extended Edges.

Journal: :global journal of environmental science and management 2016
v. k. gupta suhas i. tyagi s. agarwal r. singh

fertilizer plant waste carbon slurry has been investigated after some processing as an adsorbent for the removal of dyes and phenols using columns. the results show that the carbonaceous adsorbent prepared from carbon slurry being porous and having appreciable surface area (380 m2/g) can remove dyes both cationic (meldola blue, methylene blue, chrysoidine g, crystal violet) as well as anionic (...

Journal: :IACR Cryptology ePrint Archive 2002
Fangguo Zhang Shengli Liu Kwangjo Kim

In ISC 2002, J. Zheng [8] proposed a new public key cryptosystem whose security is based upon the algebraic problem of reducing a high degree matrix to its canonical form by similarity transformations. In this paper, we show that factoring a polynomial over a finite field can be used to break down Zheng’s public key cryptosystem. The complexity of our attack is polynomial time. In other word, t...

2017
Pantelis Pipergias Analytis Charley Wu Alexandros Gelastopoulos

Humans regularly invest time towards activities characterized by dramatic success or failure outcomes, where critically, the outcome is uncertain ex-ante. How should people allocate time between such make-or-break activities and other safe alternatives, where rewards are more predictable (e.g., linear) functions of time? We present a formal framework for studying time allocation between these t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید