نتایج جستجو برای: large blocks
تعداد نتایج: 1097471 فیلتر نتایج به سال:
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoo cipher and fast when the blocks are large. BEAST is assembled from cryptographic hash functions and stream ciphers. It is provably secure if these building blocks are secure. For smartcard applications, a variant BEAST-RK is proposed, where the bulk operations can be done by the smartcard's host without...
The well pattern development effect of the three types reservoirs that have entered late stage ultra-high water cut is gradually getting worse, and inefficient ineffective wells are increasing. It necessary to optimize adjust layer series improve effect. According current pattern, this paper studies reservoir development, status different patterns adaptability combination, gives adjustment meth...
are arranged somewhat in the form of a square (as per the diagram in the margin). The several blocks were not all equally visited by cholera. The blocks marked 2, 3, 7, and 8 gave a larger proportion of cases than the others, and the blocks 2 and 3, in particular, were remarkable for the large number of cases they furnished. In only one block (No. 5) which was occupied by a small number of deta...
The availability of 12 complete genomes of various species of genus Drosophila provides a unique opportunity to analyze genome-scale chromosomal rearrangements among a group of closely related species. This article reports on the comparison of gene order between these 12 species and on the fixed rearrangement events that disrupt gene order. Three major themes are addressed: the conservation of ...
{ Parallel applications suuer from signiicant bus traac due to the transfer of shared data. Large block sizes exploit locality and decrease the eeective memory access time. It also has a tendency to group data together even though only a part of it is needed by any one processor. This is known as the false sharing problem. This research presents a dynamic sub-block coherence protocol which mini...
This paper proposes a parallel architecture for quadtreebased fractal image coding. This architecture is capable of performing the fractal image coding based on quadtree partitioning without the external memory for the fixed domain pool. Since a large domain block consists of small domain blocks, the calculations of distortion for all kinds of domain blocks are performed by the summation of the...
A silicon micromachining method that is able to create deep silicon dioxide blocks at selected locations in a silicon substrate is presented. The process combines deep-reactive-ion etching (DRIE), thermal oxidation, deposition of silicon dioxide and optional planarization. Design issues and parameters for the creation of such blocks are discussed. The selectively defined silicon dioxide blocks ...
Block elimination algorithms for solving sparse discrete optimization problems are considered. The numerical example is provided. The benchmarking is done in order to define real computational capabilities of block elimination algorithms combined with SYMPHONY solver. Analysis of the results show that for sufficiently large number of blocks and small enough size of separators between the blocks...
One problem of the current network programming implementation in TinyOS 1.1 is that it takes much longer than the tranditional in-sytem-programming due to the slow radio connection. We extended the implementation so that it uses the history of the previous version to reduce the transmission time. For a small amount of change in the source code, we achieved around 3.5 times of the speed-up. And ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید