نتایج جستجو برای: the protected table

تعداد نتایج: 16069577  

Journal: :Journal of Chemical Education 1943

Journal: :The Vocational Aspect of Education 1967

Journal: :CoRR 2014
V. C. K. P. Arul Oli Elayaraja Ponram

This paper describes about how you can secure your Wireless Network from hackers about various threats to wireless networks, How hackers makes most use of it and what are the security steps one should take to avoid becoming victim of such attacks. There are plenty of opportunities to connect to public Wi-Fi hotspots when you're on the go these days. Coffee shops, hotels, restaurants and airport...

1997
H. Schlattl

We address the question how accurately stellar ages can be determined by stellar evolution theory. We select the star with the best observational material available our Sun. We determine the solar age by fitting solar evolution models to a number of observational quantities including several obtained from helioseismology, such as photospheric helium abundance or p-mode frequencies. Different ca...

2008

All known medical diseases vary both in severity and duration. While early diagnosis and prompt treatment are always essential, the vast majority of diseases are nevertheless chronic in their manifestations. This chronicity requires not only initial treatment but long-term management. The purpose of all long-term medical management is to minimize the current and future impact of the disease on ...

1996
Li Rufeng

The non-adiabatic frequencies of a standard solar model are discussed in this paper. The physics describing the radiative losses is included in the non-adiabatic effects.An asymptotic approximation to the non-adiabatic non-radial p-modes of the Sun is developed. An exact solution of non-adiabatic oscillations, which results in an eigenfrequency equation with the model-dependent surface phase sh...

Journal: :IACR Cryptology ePrint Archive 2013
Armando Faz-Hernández Patrick Longa Ana H. Sánchez

We demonstrate the high-speed computation of core elliptic curve operations with full protection against timing-type side-channel attacks. We use a state-of-the-art GLV-GLS curve in twisted Edwards form defined over a quadratic extension field of large prime characteristic, which supports a four dimensional decomposition of the scalar. We present highly optimized algorithms and formulas for spe...

Under the table or informal payments in several middle and low income countries is a serious impediment to health care reform. These payments are effectively a form of systemic corruption. This report shows the efforts of a patient who seek health care for his ankle while being requested to pay under the table in hospital and private clinic. The data were collected by interview and surveying pa...

1997
A. Weiss H. Schlattl

We address the question how accurately stellar ages can be determined by stellar evolution theory. We select the star with the best observational material available-our Sun. We determine the solar age by fitting solar evolution models to a number of observational quantities including several obtained from helioseismology, such as photospheric helium abundance or p-mode frequencies. Different ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید