نتایج جستجو برای: transferability

تعداد نتایج: 3634  

2009
Marina Blanton William M. P. Hudelson

This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonymously authenticate, can be severely limited if their use requires possession of the credential owner’s biometric. We target to provide strong security guarantees using minimal trust assumptions, namely that a fresh re...

2008
Adam Wasserman Kieron Burke

The recently proposed Partition Theory (PT) (J. Phys. Chem. A 2007, 111, 2229), is illustrated on a simple one-dimensional model of a heteronuclear diatomic molecule. It is shown that a sharp definition for the charge of molecular fragments emerges from PT, and that the ensuing population analysis can be used to study how charge redistributes during dissociation and the implications of that red...

2013
Arnau Vives-Guasch Magdalena Payeras-Capellà Macià Mut Puigserver Jordi Castellà-Roca Josep Lluís Ferrer-Gomila

Electronic tickets demonstrate, without the use of paper, the possession of an authorization or access to a determined service. In this scenario, some security requirements must be accomplished. Moreover, some determined services should guarantee the anonymity of the users in the system. In addition to these requirements, the transferability of a ticket from one user to another (without involvi...

1999
Nicholas J. Ramer Andrew M. Rappe

A pseudopotential generation method is presented which significantly improves transferability. The method exploits flexibility contained in the separable Kleinman-Bylander form of the nonlocal pseudopotential @Phys. Rev. Lett. 48, 1425 ~1982!#. By adjusting the functional form of the local potential, we are able to improve the agreement with all-electron calculations. Results are presented for ...

Journal: :Journal of Documentation 2012
Allen Foster Christine Urquhart

Purpose: This paper reports on a project aimed at moving Foster’s Nonlinear Model of Information Seeking Behaviour forwards from an empirically based model focussed on one setting and towards one that is robustly transferable and enables testing of the model in other information seeking situations. Methodology: The method utilised recoding of the original dataset, comparison of code decisions, ...

Journal: :Journal of Computational Chemistry 2000
Xavier Fradera Miquel Duran Jordi Mestres

Starting from either the exchange or the exchange-correlation density together with Bader’s definition of an atom in a molecule, an atomic hole density function can be defined. Contour maps of atomic hole density functions are able to show how the electron density of each atom in a molecule is partially delocalized into the rest of atoms in the molecule. The degree of delocalization of the atom...

2000
Goichiro Hanaoka Junji Shikata Yuliang Zheng Hideki Imai

A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices such as quantum computers. Therefore while these signature schemes represent an efficient solution to the short term integrity (unforgeability and non-repudiation) of digital data, they pr...

2005
G. GRÄTZER F. WEHRUNG

In general, the tensor product, A ⊗ B, of the lattices A and B with zero is not a lattice (it is only a join-semilattice with zero). If A ⊗ B is a capped tensor product, then A ⊗ B is a lattice (the converse is not known). In this paper, we investigate lattices A with zero enjoying the property that A ⊗ B is a capped tensor product, for every lattice B with zero; we shall call such lattices ame...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید