نتایج جستجو برای: the protected table

تعداد نتایج: 16069577  

2009
Helmut Seidl Vesal Vojdani

Automatic race detection of C programs requires fast, yet sufficiently precise, analysis of dynamic memory. Therefore, we present a region-based pointer analysis which seeks to identify disjoint regions of dynamically allocated objects to ensure that write accesses to the same region are always protected by the same mutexes. Our approach has been implemented within the interprocedural analyzer ...

Journal: :فصلنامه علمی تخصصی قضاوت 0

the following questions were discussed in the round table, and the commission votes as follows: 459- with the supposition of the death of defendant after issuing absent vote and protesting by the heirs, if the protested verdict finally gets certain against the heirs, is it possible to apply article 2 of the execution of financial convictions’ law against the heirs? opinion of minority of votes ...

Journal: :international journal of hospital research 2014
edris hasanpoor ali janati abdulla salehi mobin sokhanvar javad ebrahimzadeh

under the table or informal payments in several middle and low income countries is a serious impediment to health care reform. these payments are effectively a form of systemic corruption. this report shows the efforts of a patient who seek health care for his ankle while being requested to pay under the table in hospital and private clinic. the data were collected by interview and surveying pa...

Journal: :Computación y Sistemas 2014
Rafael Martínez-Peláez Francisco Rico-Novella Pablo Velarde-Alvarado

Recently, Li and Lee proposed a new remote user authentication scheme using smart card. However, their scheme requires a verification table and the user’s identity is not protected. Moreover, users cannot change their password off-line. In order to overcome the security flaws, we propose a new scheme which provides more security without affecting the merits of the original scheme.

2004
Keith A. Hnilica

Numerous organisms are have zoonotic potential; many are devastating, horrible diseases (Table Z at end of notes). However, some of the organisms that veterinary practitioners encounter on a daily basis (Staphylococcus, Malassezia, Pseudomonas, and Microsorium canis) have recently demonstrated an increasing potential to cross the species barrier that most of us assumed protected ourselves, staf...

Journal: :محیط زیست طبیعی 0
منصوره ملکیان گروه محیط زیست دانشکدۀ منابع طبیعی، دانشگاه صنعتی اصفهان راحله باقری کارشناس محیط زیست استان کهگیلویه و بویراحمد

investigating species diversity and richness is essential for defining conservation priorities. in addition, determining landscape parameters influencing species diversity and richness is important for selecting and designing parks and protected areas. kohgiluyeh & boyer ahmad province is a mountainous region, comprises hills, mounds, forests and plains. this vast province has high species dive...

2014
Armando Faz-Hernández Patrick Longa Ana H. Sánchez

We propose efficient algorithms and formulas that improve the performance of side-channel protected elliptic curve computations, with special focus on scalar multiplication exploiting the GallantLambert-Vanstone (CRYPTO 2001) and Galbraith-Lin-Scott (EUROCRYPT 2009) methods. Firstly, by adapting Feng et al.’s recoding to the GLV setting, we derive new regular algorithms for variable-base scalar...

2014
Jordi Castro José A. González

Minimum distance controlled tabular adjustment (CTA) is a perturbative technique of statistical disclosure control for tabular data. Given a table to be protected, CTA looks for the closest safe table by solving an optimization problem using some particular distance in the objective function. CTA has shown to exhibit a low disclosure risk. The purpose of this work is to show that CTA also provi...

Journal: :IACR Cryptology ePrint Archive 2012
Jean-Philippe Aumasson Daniel J. Bernstein

SipHash is a family of pseudorandom functions optimized for short inputs. Target applications include network traffic authentication and hash-table lookups protected against hash-flooding denial-of-service attacks. SipHash is simpler than MACs based on universal hashing, and faster on short inputs. Compared to dedicated designs for hash-table lookup, SipHash has well-defined security goals and ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید