نتایج جستجو برای: xor

تعداد نتایج: 2663  

2010
P. E. CONNER E. E. FLOYD

For any point xEX, we denote by HXEG the isotropy subgroup of G at xEX. The group G will be a compact Lie group. The space X is assumed to be locally compact, locally connected, finite dimensional and separable metric. We shall use the Alexander-Wallace-Spanier cohomology groups. A subscript c will denote cohomology with compact supports. The coefficient ring J will denote either the integers Z...

2005
Graham Steel

We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols.

2017
P. Mano

In digital communication, convolutional codes are important to control the errors between the transmitter and receiver. Convolutional code is a type of error correction code (ECC) which can perform both error detection and correction operation between transmitter and receiver side. Here information bits are transformed serially through the architecture which is one of the major advantages as co...

Journal: :Hypertension 2013
Suborno M Ghosh Vikas Kapil Isabel Fuentes-Calvo Kristen J Bubb Vanessa Pearl Alexandra B Milsom Rayomand Khambata Sheiva Maleki-Toyserkani Mubeen Yousuf Nigel Benjamin Andrew J Webb Mark J Caulfield Adrian J Hobbs Amrita Ahluwalia

Elevation of circulating nitrite (NO2(-)) levels causes vasodilatation and lowers blood pressure in healthy volunteers. Whether these effects and the underpinning mechanisms persist in hypertension is unknown. Therefore, we investigated the consequences of systemic nitrite elevation in spontaneously hypertensive rats and conducted proof-of-principle studies in patients. Nitrite caused dose-depe...

2003
V. Shmatikov

We present decidability results for the verification ofcryptographic protocols in the presence of equational the-ories corresponding to xor and Abelian groups. Since theperfect cryptography assumption is unrealistic for crypto-graphic primitives with visible algebraic properties such asxor, we extend the conventional Dolev-Yao model by per-mitting the intruder to exploit...

2012
Qiuying Chen Hyeong-Cheon Park Michael S. Goligorsky Praveen Chander Steven M. Fischer Steven S. Gross

A major challenge in systems biology is integration of molecular findings for individual enzyme activities into a cohesive high-level understanding of cellular metabolism and physiology/pathophysiology. However, meaningful prediction for how a perturbed enzyme activity will globally impact metabolism in a cell, tissue or intact organisms is precluded by multiple unknowns, including in vivo enzy...

Journal: :Cardiovascular research 2003
Harald Kögler Heather Fraser Sylvia McCune Ruth Altschuld Eduardo Marbán

OBJECTIVE Xanthine oxidase (XO) inhibitors enhance myofilament Ca(2+) responsiveness of normal rat myocardium. We examined whether this inotropic action is preserved or magnified in failing rat myocardium and whether the magnitude of this effect correlates with tissue xanthine-oxidoreductase (XOR) activity. METHODS Hearts of 18-20 month-old SHHF (spontaneous hypertensive/heart failure) rats w...

Journal: :Saudi medical journal 2009
Nadjet Hanachi Noureddine Charef Abderrahmane Baghiani Seddik Khennouf Yacine Derradji Sabah Boumerfeg Daoud Harzallah Lekhmici Arrar

OBJECTIVE To search whether xanthine oxido-reductase (XOR) present in the synovium is also liberated, to determine its activity in synovial fluid and to establish a possible relationship between XOR levels in rheumatoid arthritis (RA) and non-RA patients. METHODS This study was carried out in the Laboratory of Immunology, University Ferhat Abbas, Setif, Algeria from 2001-2008. This study is a...

2013
Peter Gazi

Cascading-based constructions represent the predominant approach to the problem of keylength extension for block ciphers. Besides the plain cascade, existing works also consider its modification containing key-whitening steps between the invocations of the block cipher, called randomized cascade or XOR-cascade. We contribute to the understanding of the security of these two designs by giving th...

Journal: :IACR Transactions on Symmetric Cryptology 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید