نتایج جستجو برای: eve
تعداد نتایج: 2609 فیلتر نتایج به سال:
the story of the creation of man and woman in the qur’an differs infundamental ways from the story of creation in the bible. the qur’an explainsthat, contiguous with the creation of adam, was the creation of his mate from thesame material and essence. these two, adam and eve, hold equal positions as allah’skhalafah(vicegerent) on earth. this article discusses the kiramat(generosity)of women in ...
A fundamental problem in cryptography is to enable two distant parties, traditionally called Alice and Bob, to communicate in absolute privacy, even in presence of an eavesdropper, Eve. It is a well known fact that a secret key, i.e., a randomly chosen bit string held by both Alice and Bob, but unknown to Eve, is sufficient to perform this task (one-time pad encryption). Thus, the problem of se...
This paper presents Eve, a new Execute-Verify architecture that allows state machine replication to scale to multi-core servers. Eve departs from the traditional agree-execute architecture of state machine replication: replicas first execute groups of requests concurrently and then verify that they can reach agreement on a state and output produced by a correct replica; if they can not, they ro...
We present the use of recently developed live imaging methods to examine the dynamic regulation of even-skipped (eve) stripe 2 expression in the precellular Drosophila embryo. Nascent transcripts were visualized via MS2 RNA stem loops. The eve stripe 2 transgene exhibits a highly dynamic pattern of de novo transcription, beginning with a broad domain of expression during nuclear cycle 12 (nc12)...
Consider Adam and Eve. Count generations starting from them. Supposing that there will always be people, then it's true that for any generation X, eventually there will be people belonging to the next generation X + 1. In this paper the same result is established for the class of higher order pattern rewriting systems.
Alice wants to communicate securely to Bob in the presence of an eavesdropper Eve. There are two resources available to facilitate this. First, Alice, Bob (and Eve) have access to dependent source observations. Secondly, there is a noisy broadcast channel from Alice to Bob and Eve. Under this general source and channel setup, we are interested in three classes of problems. First, what is the se...
In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confi...
We consider the problem of multiparty secret key exchange. A \team" of players P1 through Pk wishes to determine an n-bit secret key in the presence of a compu-tationally unlimited eavesdropper, Eve. The team players are dealt hands of cards of prespeciied sizes from a deck of d distinct cards; any remaining cards are dealt to Eve. We explore how the team can use the information contained in th...
This paper presents a scheme named code hopping (CodeHop) for gaussian wiretap channels based on nonsystematic low-density parity-check (LDPC) codes. Different from traditional communications, in the CodeHop scheme, the legitimate receiver (Bob) rapidly switches the parity-check matrix upon each correctly received source message block. Given an authenticated public feedback channel, the transmi...
This paper presents Eve, a new Execute-Verify architecture that allows state machine replication to scale to multi-core servers. Eve departs from the traditional agree-execute architecture of state machine replication: replicas first execute groups of requests concurrently and then verify that they can reach agreement on a state and output produced by a correct replica; if they can not, they ro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید