نتایج جستجو برای: 9 weaknesses
تعداد نتایج: 503181 فیلتر نتایج به سال:
BACKGROUND Systematic and reliable epidemiological information at population level, preferably cross-national, is needed for an adequate planning of (end-of-life) health care policies, e.g. concerning place of death, but is currently lacking. This study illustrates opportunities and weaknesses of death certificate data to provide such information on place of death and associated factors in nine...
We show two weaknesses in the the authentication functionality of GCM when it is used with a short authentication tag. The first weakness raises the probability of a successful forgery significantly. The second weakness reveals the authentication key if the attacker manages to create successful forgeries.
There is considerable enthusiasm about Case-Based Reasoning as a means of developing knowledge-based systems. There are two broad reasons for this enthusiasm. First, it is evident that much of human expert competence is experience based and it makes sense to adopt a reuse-based methodology for developing knowledge based systems. The other reason is the expectation that using Case-Based Reasonin...
This paper proposes a heterogeneous multi-core architecture where all of the cores share a single Instruction Set Architecture (ISA). The design is characterized by each of the heterogeneous cores representing a different point in the power/performance design space. They demonstrate, through modeling, that this is an effective mechanism to reduce power dissipation by means of dynamically switch...
This paper analyzes the ASPIC+ argumentation system. It shows that it is grounded on two monotonic logics which are not Tarskian ones. Moreover, the system suffers from five main problems: i) its logical formalism is ill-defined, ii) it may return undesirable results, iii) it builds on some counter-intuitive assumptions, iv) it violates some rationality postulates, and v) it allows counterintui...
Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reducti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید