نتایج جستجو برای: binary masking

تعداد نتایج: 129564  

Journal: :Trends in cognitive sciences 2000
Enns Di Lollo V

A brief display that is clearly visible when shown alone can be rendered invisible by the subsequent presentation of a second visual stimulus. Several recently described backward masking effects are not predicted by current theories of visual masking, including masking by four small dots that surround (but do not touch) a target object and masking by a surrounding object that remains on display...

2003
Jean-Sébastien Coron Alexei Tchulkine

To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algorithm combines boolean operations with arithmetic operations, it is then necessary to perform conversions between boolean masking and arithmetic masking. A very efficient method was proposed by Louis Goubin in [6] to c...

Journal: :Schizophrenia research 2008
Junghee Lee Keith H Nuechterlein Kenneth L Subotnik Catherine A Sugar Joseph Ventura Denise Gretchen-Doorly Kimberly Kelly Michael F Green

Visual masking deficit in schizophrenia has been suggested to be a potential vulnerability marker for schizophrenia. An important characteristic of a vulnerability marker is stability over time, but relatively little is known about the longitudinal course of masking performance of schizophrenia patients. In this study, we examined the stability of visual masking performance in recent-onset schi...

2012
Justus Rabi K. Muralidhar

In the present information age, Conventional data masking solutions perform Static Data Masking, where the obfuscated values are physically stored in the database. For obvious reasons, Data Masking has been limited to Development and QA environments. Now, for the first time, organizations/enterprises production environments can be dynamically masked without enhancing existing applications and b...

Journal: :Journal of vision 2009
Isabel Dombrowe Frouke Hermens Gregory Francis Michael H Herzog

Visual backward masking is a commonly used technique in vision research and psychology. There are two distinct types of masking. Either masking is strongest for a simultaneous presentation of the target and the mask (A-type masking) or masking is strongest when the mask trails the target (B-type masking). To account for the two types of masking, a variety of explanations have been put forward t...

Journal: :The Journal of the Acoustical Society of America 2013
Payton Lin Thomas Lu Fan-Gang Zeng

Across bilateral cochlear implants, contralateral threshold shift has been investigated as a function of electrode difference between the masking and probe electrodes. For contralateral electric masking, maximum threshold elevations occurred when the position of the masker and probe electrode was approximately place-matched across ears. The amount of masking diminished with increasing masker-pr...

Journal: :Psychological review 2008
Frouke Hermens Gediminas Luksys Wulfram Gerstner Michael H Herzog Udo Ernst

Visual backward masking is a versatile tool for understanding principles and limitations of visual information processing in the human brain. However, the mechanisms underlying masking are still poorly understood. In the current contribution, the authors show that a structurally simple mathematical model can explain many spatial and temporal effects in visual masking, such as spatial layout eff...

2015
Michael H. Herzog Andreas Brand

Visual masking is a frequently used tool in schizophrenia research. Visual masking has a very high sensitivity and specificity and masking paradigms have been proven to be endophenotypes. Whereas masking is a powerful technique to study schizophrenia, the underlying mechanisms are discussed controversially. For example, for more than 25 years, masking deficits of schizophrenia patients were mai...

Journal: :Inf. Process. Lett. 2012
David Clark Robert M. Hierons

Fault masking can reduce the effectiveness of a test suite. We propose an information theoretic measure, Squeeziness, as the theoretical basis for avoiding fault masking. We begin by explaining fault masking and the relationship between collisions and fault masking. We then define Squeeziness and demonstrate by experiment that there is a strong correlation between Squeeziness and the likelihood...

Journal: :Journal of Computer Security 2005
Meng Yu Peng Liu Wanyu Zang

It is important for critical applications to provide critical services without any integrity or availability degradation in the presence of intrusions. This requirement can be satisfied by intrusion masking techniques under some situations. Compared with intrusion tolerance techniques, where some integrity or availability degradations are usually caused, intrusion masking techniques use substan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید