نتایج جستجو برای: caesar

تعداد نتایج: 799  

Journal: :CoRR 2017
Dewi Sartika Ginting Kristin Sitompul Jasael Simanulang Rahmat Widia Sembiring Muhammad Zarlis

A R T I C L E I N F O A B S T R A C T Article history: Received: 14 March, 2017 Accepted: 20 April, 2017 Online: 13 June, 2017 Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed me...

2004
GAVIN P. SALAM

Global properties of energy-momentum flow in final-states, such as event shapes and jet-resolution thresholds, offer a good compromise between simplicity and sensitivity to the dynamics of QCD. Thanks to the former, it has been possible to make a wide range of theoretical predictions for them, including both fixed-order and resummed perturbative calculations as well as non-perturbative model ca...

2010
Anna Lombardo Alessandra Roncaglioni Elena Boriani Chiara Milan Emilio Benfenati

BACKGROUND Bioconcentration factor (BCF) describes the behaviour of a chemical in terms of its likelihood of concentrating in organisms in the environment. It is a fundamental property in recent regulations, such as the European Community Regulation on chemicals and their safe use or the Globally Harmonized System for classification, labelling and packaging. These new regulations consider the p...

Journal: :CoRR 2017
Liang-Wei Chen Bhargav Mangipudi Jayachandu Bandlamudi Richa Sehgal Yun Hao Meng Jiang Huan Gui

The objective of the triple scoring task in WSDM Cup 2017 is to compute relevance scores for knowledge-base triples of typelike relations. For example, consider Julius Caesar who has had various professions, including Politician and Author. For two given triples (Julius Caesar, profession, Politician) and (Julius Caesar, profession, Author), the former triple is likely to have a higher relevanc...

2009
Tim Hunter

This paper aims to show that certain syntactic differences between arguments and adjuncts can be thought of as a transparent reflection of differences between their contributions to neo-Davidsonian logical forms. Specifically, the crucial underlying distinction will be that between modifying an event variable directly, and modifying an event variable indirectly via a thematic relation. I note a...

Journal: :CoRR 2013
Amelia Carolina Sparavigna

Some software solutions used to obtain the facial transformations can help investigating the artistic metamorphosis of the ancient portraits of the same person. An analysis with a freely available software of portraitures of Julius Caesar is proposed, showing his several " morphs ". The software helps enhancing the mood the artist added to a portrait. In image processing, a facial transformatio...

Journal: :Synthese 2013
Joongol Kim

This paper argues that (cardinal) numbers are originally given to us in the context ‘Fs exist n-wise’, and accordingly, numbers are certain manners or modes of existence, by addressing two objections both of which are due to Frege. First, the so-called Caesar objection will be answered by explaining exactly what kind of manner or mode numbers are. And then what we shall call the Functionality o...

2016
Ekawat Homsirikamol William Diehl Ahmed Ferozpuri Farnoud Farahmand Kris Gaj George Mason

Cryptographic contests have emerged as a commonly accepted way of developing cryptographic standards. This process has appeared to work particularly well in case of Advanced Encryption Standard (AES), developed in the period 1997-2001, and Secure Hash Algorithm 3 (SHA-3), developed in the period 2007-2012. In 2013, a new contest, called CAESAR Competition for Authenticated Encryption: Security,...

Journal: :IACR Cryptology ePrint Archive 2017
Daniel Kales Maria Eichlseder Florian Mendel

Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this work, we investigate the implications of reusing nonces for three third-round candidates of the ongoing CAESAR competition, namely Tiaoxin, AEGIS and MORUS. We show that an attacker that is able to force nonces to be reused can reduce the security of the ciphers with results ranging from full key-re...

2005
Nikolaos Christidis Peter A. Stott Simon Brown Gabriele C. Hegerl John Caesar

[1] Since 1950, the warmest and coldest days and nights of the year have become warmer. Comparing these observations with climate model simulations in an optimal detection analysis shows a significant human influence on patterns of change in extremely warm nights. Human influence on cold nights and days is also detected, although less robustly, but there is no detection of a significant human i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید