نتایج جستجو برای: eve

تعداد نتایج: 2609  

Journal: :international journal of women's research 2013
nahla gharavi naeeni

the story of the creation of man and woman in the qur’an differs infundamental ways from the story of creation in the bible. the qur’an explainsthat, contiguous with the creation of adam, was the creation of his mate from thesame material and essence. these two, adam and eve, hold equal positions as allah’skhalafah(vicegerent) on earth. this article discusses the kiramat(generosity)of women in ...

2006
Barbara Kraus Cyril Branciard Renato Renner

A fundamental problem in cryptography is to enable two distant parties, traditionally called Alice and Bob, to communicate in absolute privacy, even in presence of an eavesdropper, Eve. It is a well known fact that a secret key, i.e., a randomly chosen bit string held by both Alice and Bob, but unknown to Eve, is sufficient to perform this task (one-time pad encryption). Thus, the problem of se...

2012
Manos Kapritsos Yang Wang Vivien Quéma Allen Clement Lorenzo Alvisi Michael Dahlin

This paper presents Eve, a new Execute-Verify architecture that allows state machine replication to scale to multi-core servers. Eve departs from the traditional agree-execute architecture of state machine replication: replicas first execute groups of requests concurrently and then verify that they can reach agreement on a state and output produced by a correct replica; if they can not, they ro...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2014
Jacques P Bothma Hernan G Garcia Emilia Esposito Gavin Schlissel Thomas Gregor Michael Levine

We present the use of recently developed live imaging methods to examine the dynamic regulation of even-skipped (eve) stripe 2 expression in the precellular Drosophila embryo. Nascent transcripts were visualized via MS2 RNA stem loops. The eve stripe 2 transgene exhibits a highly dynamic pattern of de novo transcription, beginning with a broad domain of expression during nuclear cycle 12 (nc12)...

1997
Vincent van Oostrom

Consider Adam and Eve. Count generations starting from them. Supposing that there will always be people, then it's true that for any generation X, eventually there will be people belonging to the next generation X + 1. In this paper the same result is established for the class of higher order pattern rewriting systems.

2007
Vinod Prabhakaran Kannan Ramchandran

Alice wants to communicate securely to Bob in the presence of an eavesdropper Eve. There are two resources available to facilitate this. First, Alice, Bob (and Eve) have access to dependent source observations. Secondly, there is a noisy broadcast channel from Alice to Bob and Eve. Under this general source and channel setup, we are interested in three classes of problems. First, what is the se...

2000
Hiroo Azuma Masashi Ban

In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confi...

1991
Michael J. Fischer Rebecca N. Wright

We consider the problem of multiparty secret key exchange. A \team" of players P1 through Pk wishes to determine an n-bit secret key in the presence of a compu-tationally unlimited eavesdropper, Eve. The team players are dealt hands of cards of prespeciied sizes from a deck of d distinct cards; any remaining cards are dealt to Eve. We explore how the team can use the information contained in th...

Journal: :CoRR 2017
Zhao Chen Liuguo Yin Jianhua Lu

This paper presents a scheme named code hopping (CodeHop) for gaussian wiretap channels based on nonsystematic low-density parity-check (LDPC) codes. Different from traditional communications, in the CodeHop scheme, the legitimate receiver (Bob) rapidly switches the parity-check matrix upon each correctly received source message block. Given an authenticated public feedback channel, the transmi...

2012
Manos Kapritsos Yang Wang Vivien Quema Allen Clement Lorenzo Alvisi Mike Dahlin

This paper presents Eve, a new Execute-Verify architecture that allows state machine replication to scale to multi-core servers. Eve departs from the traditional agree-execute architecture of state machine replication: replicas first execute groups of requests concurrently and then verify that they can reach agreement on a state and output produced by a correct replica; if they can not, they ro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید