نتایج جستجو برای: 16 weaknesses
تعداد نتایج: 353592 فیلتر نتایج به سال:
The philosophy underlying open source software (OSS) is enabling programmers to freely access the software source by distributing the software source code, thus allowing them to use the software for any purpose, to adapt and modify it, and redistribute the original or the modified source for further use, modification, and redistribution. The modifications, which include fixing bugs and improvin...
In some applications for synchronous stream ciphers, the risk of loss of synchroniration cannot be eliminated completely. In these cases frequent rcsynchroniration or resynduonisation upon request may be necessary. In the paper it is shown that this can lead to significant deterioration of the cryptographic security. A powerful general attack on nonlinearly filtered linear (over Z,) systems is ...
Recently a great deal of attention has been focused on quantum computation following a sequence of results [Bernstein and Vazirani, in Proc. 25th Annual ACM Symposium Theory Comput., 1993, pp. 11–20, SIAM J. Comput., 26 (1997), pp. 1411–1473], [Simon, in Proc. 35th Annual IEEE Symposium Foundations Comput. Sci., 1994, pp. 116–123, SIAM J. Comput., 26 (1997), pp. 1474–1483], [Shor, in Proc. 35th...
Parallel tempering, also known as replica exchange Monte Carlo, is studied in the context of two simple free-energy landscapes. The first is a double-well potential defined by two macrostates separated by a barrier. The second is a "golf course" potential defined by microstates having two possible energies with exponentially more high-energy states than low-energy states. The equilibration time...
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and to repeat the same steps on other data. Feature selection and/or model selection and/or tuning must be independent of the test data. For use of cross-validation, such steps must be repeated at each fold. Even then, such...
This work presents several classes of messages that lead to data leakage during modular exponentiation. Such messages allow for the recovery of the entire secret exponent with a single power measurement. We show that padding schemes as defined by industry standards such as PKCS#1 and ANSI x9.31 are vulnerable to side-channel attacks since they meet the characteristics defined by our classes. Th...
The emission of CO₂ has been considered a major cause of greenhouse effects and global warming. The current CO₂ capture approaches have their own advantages and weaknesses. We found that free-flowing hydrated sodium carbonate (Na₂CO₃) powders with 30 wt % water can achieve a very high CO₂ sorption capacity of 282 mg/g within 60 min and fast CO₂ uptake (90% saturation uptake within 16 min). The ...
........................................................................................................... Chapter One: 1.0 Introduction................................................................................................... 1.1 Scope of research.................................................................................... 1.2 Research Problem Definition..........................
................................................................................................................................................................2 INTRODUCTION .......................................................................................................................................................2 DIFFERENT APPROACHES USED TO ESTIMATE ENVIRONMENTAL BURDEN OF DISEASE...
The present study assessed the coverage and quality of immunization services for children aged 12-23 months and mothers who delivered a baby in last one year in rural areas of Chandigarh. Two hundred ten children and 210 mothers were enrolled. 69% of children were fully immunized, 15% were partially immunized and 16% were unimmunized. Among mothers, 79% were fully immunized, 11% partially imm...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید