نتایج جستجو برای: 13 weaknesses

تعداد نتایج: 352698  

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2009
J Machta

Parallel tempering, also known as replica exchange Monte Carlo, is studied in the context of two simple free-energy landscapes. The first is a double-well potential defined by two macrostates separated by a barrier. The second is a "golf course" potential defined by microstates having two possible energies with exponentially more high-energy states than low-energy states. The equilibration time...

2006
John H. Maindonald

Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and to repeat the same steps on other data. Feature selection and/or model selection and/or tuning must be independent of the test data. For use of cross-validation, such steps must be repeated at each fold. Even then, such...

2011
Juliane Krämer Dmitry Nedospasov Jean-Pierre Seifert

This work presents several classes of messages that lead to data leakage during modular exponentiation. Such messages allow for the recovery of the entire secret exponent with a single power measurement. We show that padding schemes as defined by industry standards such as PKCS#1 and ANSI x9.31 are vulnerable to side-channel attacks since they meet the characteristics defined by our classes. Th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم 1393

نیتروین-13 یک رادیوایزوتوپ پوزیترون دهنده با نیمه عمر 10 دقیقه از اعضای خانواده ی pet استاندارد است. یکی از وییگیهای این رادیوایزوتوپ این است که امکان آزمایشهای مکرر را بر روی موجود زنده ممکن می سازد. نیتروین-13 معمولا به شکل آمونیاک نشاندارشده با نیتروین-13 مورد استفاده قرار می گیرد. یکی از روشهای مناسب برای تولید آمونیاک پرتودهی پروتون به آب خالص توسط شتابدهنده ی سیکلوترون است. به این معنی که...

2008
Pedro Peris-Lopez Julio César Hernández Castro Juan E. Tapiador Arturo Ribagorda

The design of ultralightweight authentication protocols that conform to low-cost tag requirements is imperative. This paper analyses the most important proposals (except for those based in hard problems such as the HB [1–3] family) in the area [4–6] and identifies the common weaknesses that have left all of them open to various attacks [7–11]. Finally, we present Gossamer, a new protocol inspir...

Journal: :The International Journal of Evidence & Proof 2009

Journal: :Studia Universitatis „Vasile Goldis” Arad – Economics Series 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید