نتایج جستجو برای: concrete placing
تعداد نتایج: 93964 فیلتر نتایج به سال:
This Engineer Technical Letter (ETL) discusses the special problem areas and concerns related to RCC construction in order to assure that the concrete properties required are ultimately realized in the completed structure. A quality RCC product requires a coordinated effort between the structural designer, the materials engineer, the materials laboratory, and those responsible for field quality...
Signature schemes that are derived from three move identification schemes such as the Fiat-Shamir, Schnorr and modified ElGamal schemes are a typical class of the most practical signature schemes. The random oracle paradigm [1,2,12] is useful to prove the security of such a class of signature schemes [4,12]. This paper presents a new key technique, “ID reduction”, to show the concrete security ...
In recent work, Ishai, Prabhakaran and Sahai (CRYPTO 2008) presented a new compiler (hereafter the IPS compiler) for constructing protocols that are secure in the presence of malicious adversaries without an honest majority from protocols that are only secure in the presence of semi-honest adversaries. The IPS compiler has many important properties: it provides a radically different way of obta...
We present the results of an experiment examining the extent to which individuals will tolerate delays when told that such delays are for security purposes. In our experiment, we asked 800 Amazon Mechanical Turk users to count the total number of times a certain term was repeated in a multipage document. The task was designed to be conducive to cheating. We assigned subjects to eight between-su...
Imaging techniques are high in demand for modern nondestructive evaluation of large-scale concrete structures. The travel-time tomography (TTT) technique, which is based on the principle of mapping the change of propagation velocity of transient elastic waves in a measured object, has found increasing application for assessing in situ concrete structures. The primary aim of this technique is to...
AES-128, the NIST P-256 elliptic curve, DSA-3072, RSA3072, and various higher-level protocols are frequently conjectured to provide a security level of 2. Extensive cryptanalysis of these primitives appears to have stabilized sufficiently to support such conjectures. In the literature on provable concrete security it is standard to define 2 security as the nonexistence of high-probability attac...
Several in-place rehabilitation techniques have been used before placing an Asphalt Concrete (AC) overlay on Portland Cement Concrete (PCC) pavements in attempts to minimize reflection cracking. Among these techniques, "rubblization" of PCC has been recognized to be the most utilized procedure for the mitigation of reflection cracking in US. This paper presents the practices on the use of rubbl...
The propenies of composites made by placing inclusions in a matrix are often controlled by the shape and size of the panicles used. Mathematically, characterizing the shape of panicles in three dimensions is not a panicularly easy task, especially when the panicle, for whatever reason, cannot be readily visualized. But, even when panicles can be visualized, as in the case of aggregates used in ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید