نتایج جستجو برای: 9 weaknesses

تعداد نتایج: 503181  

Journal: :BMC Public Health 2007
Joachim Cohen Johan Bilsen Guido Miccinesi Rurik Löfmark Julia Addington-Hall Stein Kaasa Michael Norup Gerrit van der Wal Luc Deliens

BACKGROUND Systematic and reliable epidemiological information at population level, preferably cross-national, is needed for an adequate planning of (end-of-life) health care policies, e.g. concerning place of death, but is currently lacking. This study illustrates opportunities and weaknesses of death certificate data to provide such information on place of death and associated factors in nine...

2005
Niels Ferguson

We show two weaknesses in the the authentication functionality of GCM when it is used with a short authentication tag. The first weakness raises the probability of a successful forgery significantly. The second weakness reveals the authentication key if the attacker manages to create successful forgeries.

1998
Padraig Cunningham

There is considerable enthusiasm about Case-Based Reasoning as a means of developing knowledge-based systems. There are two broad reasons for this enthusiasm. First, it is evident that much of human expert competence is experience based and it makes sense to adopt a reuse-based methodology for developing knowledge based systems. The other reason is the expectation that using Case-Based Reasonin...

Journal: :Nature Reviews Genetics 2006

Journal: :Review of Keynesian Economics 2017

Journal: :Babel – AFIAL : Aspectos de Filoloxía Inglesa e Alemá 1996

2011
Jay Eggert

This paper proposes a heterogeneous multi-core architecture where all of the cores share a single Instruction Set Architecture (ISA). The design is characterized by each of the heterogeneous cores representing a different point in the power/performance design space. They demonstrate, through modeling, that this is an effective mechanism to reduce power dissipation by means of dynamically switch...

2012
Leila Amgoud

This paper analyzes the ASPIC+ argumentation system. It shows that it is grounded on two monotonic logics which are not Tarskian ones. Moreover, the system suffers from five main problems: i) its logical formalism is ill-defined, ii) it may return undesirable results, iii) it builds on some counter-intuitive assumptions, iv) it violates some rationality postulates, and v) it allows counterintui...

2007
Christian Ullerich Andreas Westfeld

Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reducti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید