نتایج جستجو برای: 4758

تعداد نتایج: 84  

2006
Véronique Cortier Graham Steel

We define a new class of security protocols using XOR, and show that secrecy after an unbounded number of sessions is decidable for this class. The new class is important as it contains examples of key-management APIs, such as the IBM 4758 CCA API, which lie outside the classes for which secrecy has previously been shown to be decidable. Earlier versions of the CCA API were shown to have seriou...

2015
Safwan Badr Michael A. Grandner Jerome A. Barrett Sherene M. Thomas

Journal of Clinical Sleep Medicine, Vol. 11, No. 6, 2015 Sleep is essential for optimal health. The American Academy of Sleep Medicine (AASM) and Sleep Research Society (SRS) developed a consensus recommendation for the amount of sleep needed to promote optimal health in adults, using a modifi ed RAND Appropriateness Method process. The recommendation is summarized here. A manuscript detailing ...

Journal: :AIDS 2011
Timothy D Mastro Myron S Cohen Helen Rees

We have entered a new era in which antiretroviral agents have been demonstrated to be highly effective in preventing HIV-1 infection, especially in serodiscordant couples. The HPTN-052 randomized, controlled trial (RCT) of early versus delayed antiretroviral therapy (ART) for the HIV-1-infected persons in sexual partnerships with HIV-negative persons demonstrated at least a 96% reduction in HIV...

2002
C. Neiner

We report on XMM-Newton observations of the galactic supersoft X-ray source RXJ0925.7-4758. The RGS spectrum exhibits a wealth of spectral features from iron and oxygen. XMM-Newton data confirm the finding of previous Chandra HETGS/MEG observations that NLTE models of hot white dwarf atmospheres fail to represent the complex spectrum. There are clear evidences for P Cygni profiles with wind vel...

2009
Brian W. Pogue Alexander Iliev

The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even though this is conceptually the simplest and most general solution. Thus, current protocols involve only the direct players—we call such protocols s...

1999
H. W. Hartmann J. Heise A. N. Parmar

The Super Soft Source RX J0925.7–4758 (RX J0925 hereafter) was observed by BeppoSAX LECS and MECS on January 25–26 1997. The source was clearly detected by the LECS but only marginally detected by the MECS. We apply detailed Non-Local Thermodynamic Equilibrium (Non-LTE) models including metal line opacities to the observed LECS spectrum. We test whether the X–ray spectrum of RX J0925 is consist...

1998
Anthony A. Giunta Layne T. Watson

Two methods of creating approximation models are compared through the calculation of the modeling accuracy on test problems involving one, ve, and ten independent variables. Here, the test problems are representative of the modeling challenges typically encountered in realistic engineering optimization problems. The rst approximation model is a quadratic polynomial created using the method of l...

Journal: :Afyon Kocatepe Üniversitesi sosyal bilimler dergisi 2022

Kitle fonlaması, fon bulmada sıkıntı yaşayan proje sahipleri için alternatif bir finansman yöntemi olarak kendine yer edinmiştir. Proje sahipleri, kitle fonlaması platformlarına projelerini sunarak, bireylerden talep etmekte ve topladıkları fonlarla gerçekleştirebilmektedir. Projeler, platformda yayınlandıktan sonra güncellenebilir, sağlayanlar tarafından yorum yapılabilir böylelikle projenin b...

2001
Gabriele Campi

In these last years there have been an increasing need to secure information transmitted on the Internet. In order to meet this requirement in an absolutely secure way, the major OEMs have designed devices that complies with these requirements. Such device embeds very high-level type of technology that make their design, build and development a real big challenge. Our laboratory (of Celestica I...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید