نتایج جستجو برای: keeping the secrets
تعداد نتایج: 16055413 فیلتر نتایج به سال:
“Open science" as a practise became increasing widespread in Europe during the late sixteenth and early seventeenth centuries. It represented a departure from the previously dominant ethos of secrecy in the pursuit of Nature’s Secrets, and its emergence was a distinctive and vital organisational aspect of the Scientific Revolution. The development of norms of disclosure and demonstration, and t...
This paper discusses the hardware foundations of the cryptosystem employed by the Xbox video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and verifies portions of an external FLASH-type ROM. The presence of the secret boot block is camouflaged by a decoy boot block in the external ROM. The code contained within the secr...
Keeping and telling secrets are acts of intimacy. This article explores secret-telling-friendly methodologies, capable encouraging individuals to share their life stories in own terms, with particular episodes, emotional connections, protagonists, also secrets. The openness our research design played an important part the identification role secret-storytelling understanding life. was enhanced ...
abstract poor reading comprehension can result in failure in using references, benefiting from professional gatherings and resources, keeping up with the growing body of knowledge in the virtual world of the internet, and failing to achieve in efl programs. the purpose of the present quasi-experimental study was to explore the effects of background knowledge and previewing narrative and expos...
For example, a = b = c = 1 defines an equilateral triangle and the formula gives Area = V3/4. However a = 3, b = c = 1 does not define a triangle, and the formula produces 4 45 This would have made perfect sense to the ancientsthere is no triangle, and there is no number. Today we know more: 4 1.677i is indeed a number, and that creates a problem. Does it mean that a = 3, b = c = 1 really does ...
Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an unbounded number of wires, anywhere in the circuit. In contrast, all previous works on protecting cryptograph...
A 2-wave survey study among 1173 10–14-year-olds tested the longitudinal contribution of secrecy from parents to psychosocial and behavioral problems in adolescence. Additionally, it investigated a hypothesized contribution of secrecy from parents to adolescent development by examining its relation with self-control. Results showed that keeping secrets from parents is associated with substantia...
Improved life-sustaining technology in the neonatal intensive care has resulted in an increased probability of survival for extremely premature babies. In the neonatal intensive care, the condition of a baby can deteriorate rapidly. Nurses and parents are together for long periods at the bedside and so form close and trusting relationships. Neonatal nurses as the constant caregivers may be pres...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید