نتایج جستجو برای: mix
تعداد نتایج: 30840 فیلتر نتایج به سال:
Blood pressure (BP) was analyzed invasively using the telemetry system in unanesthetized, unrestrained healthy adult mongrel cats. After surgical implantation of a telemetry transmitter, BP was transiently elevated due to the invasive nature of the surgery, but it was gradually decreased. BP was largely stabilized seven to ten days postsurgery. Once BP was settled, systolic, diastolic and mean ...
This paper studies a gel formed by a network of cross-linked polymers and a species of mobile molecules. The gel is taken to be a dielectric, in which both the polymers and the mobile molecules are non-ionic. We formulate a theory of the gel in contact with a solvent made of the mobile molecules, and subject to electromechanical loads. A free-energy function is constructed for an ideal dielectr...
Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally proven. An attack against the soundness of this shuffling sche...
Advertisers have a need to understand the effectiveness of their media spend in driving sales in order to optimize budget allocations. Media mix models are a common and widely used approach for doing so. We outline the various challenges such models encounter in consistently providing valid answers to the advertiser’s questions on media effectiveness. We also discusses opportunities for improve...
Golle, Zhong, Boneh, Jakobsson, and Juels [9] recently presented an efficient mix-net, which they claim to be both robust and secure. We present five practical attacks for their mix-net, and break both its privacy and robustness. The first attack breaks the privacy of any given sender without corrupting any mix-server. The second attack requires that the first mix-server is corrupted. Both atta...
The Australian Government intends to mandate filtering at the Internet Service Provider (ISP) level to provide a “clean feed” to all subscribers. It claims the current arrangement that includes optional filtering at the Personal Computer (PC) level has failed to protect children from unsuitable Internet content. This paper addresses three key questions that are relevant to IT professionals ever...
Previous anonymous channels, called MIX nets, do not work if one center stops. This paper shows new anonymous channels which allow less than a half of faulty centers. A fault tolerant multivalued election scheme is obtained automatically. A very eecient ZKIP for the centers is also presented.
We present a mix network topology that is based on sparse expander graphs, with each mix only communicating with a few neighbouring others. We analyse the anonymity such networks provide, and compare it with fully connected mix networks and mix cascades. We prove that such a topology is efficient since it only requires the route length of messages to be relatively small in comparison with the n...
This chapter gives a summary of cryptographic e-voting protocols. We start with a motivation and an overview of some aspects of traditional elections. We then outline the security requirements of e-voting and present in detail two approaches to cryptographic e-voting, based on homomorphic encryption and mix networks. We finish the chapter with a list of open problems.
statement of problem: bracket de-bonding during initial orthodontic archwire placement immediately after bracket set up or following re-bonding a single bracket can be a clinical concern. purpose: the aim of this in vitro study was to assess the effect of time on the shear bond strength of a no-mix orthodontic composite adhesive. materials and methods: seventy freshly extracted human upper firs...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید