نتایج جستجو برای: consuming

تعداد نتایج: 48273  

Journal: :Journal of the American Chemical Society 2009
Taro Toyota Naoto Maru Martin M Hanczyc Takashi Ikegami Tadashi Sugawara

A micrometer-sized oil droplet of 4-octylaniline containing 5 mol % of an amphiphilic catalyst exhibited a self-propelled motion, producing tiny oil droplets, in an aqueous dispersion of an amphiphilic precursor of 4-octylaniline. The tiny droplets on the surface of the self-propelled droplet were conveyed to the posterior surface and released to the aqueous solution. Thus the persistent moveme...

2014
Christian Forler Stefan Lucks Jakob Wenzel

It is a common wisdom that servers should store the one-way hash of their clients’ passwords, rather than storing the password in the clear. In this paper we introduce a set of functional properties a key-derivation function (password scrambler) should have. Unfortunately, none of the existing algorithms satisfies our requirements and therefore, we introduce a novel and provably secure password...

2013
DONNA ROONEY

This paper about consumption as a metaphor for learning follows from some ideas about learning and space that emerged from a research project concerned with everyday learning at work. These learning/work spaces have drawn our attention to the significant consumption (eating and drinking) occurring within them. We suggest that linking everyday learning to the ordinariness of consuming opens up s...

2006
Peter Nelson Kenneth Dallmeyer Lucasz Szybalski Tom Palarz Michael Wieher

The Spamalot system uses intelligent agents to interact with spam messages and systems referenced in spam. The goal of Spamalot is to consume spam senders’ resources by engaging the spammer in an unproductive conversation or information exchange. To date two Spamalot agents have been implemented: Arthur which handles Nigerian spam and Patsy which processes spam requesting information via web fo...

Journal: :Environmental research 2014
Margaret R Neff Satyendra P Bhavsar Felicity J Ni David O Carpenter Ken Drouillard Aaron T Fisk Michael T Arts

BACKGROUND Consumption of fish is promoted as a healthy way to obtain essential fatty acids (EFA) in the diet, yet the risk of ingesting harmful contaminants remains a concern. A recent study concluded that the risk-benefit of consuming fish from the North American Laurentian Great Lakes, which sustain important commercial and recreational fisheries, is currently unclear. We report the fatty ac...

2012
Fahad Alahmari James A. Thom Liam Magee Wilson Wong

The value of a single dataset is increased when it is linked to combinations of datasets to provide users with more information. Linked Data is a style of publishing data on the Web by using a structured machine-readable format, RDF, and semantically typed relations to connect related data. Its structured representation opens up new possibilities in the way these data can be accessed and querie...

2015
Tomasz Pluskiewicz Karol Szczepanski

Introduction Object-oriented programming (OOP) paradigm is a prevalent method for designing computer software. In OOP data structures are represented as classes, which declare a set of named properties. This is especially important in statically typed languages, where this structure is fairly rigid and usually does not change at runtime. That structure causes friction when data in other represe...

Journal: :Medical History 1996
David Harley

Jordan Goodman, Paul E Lovejoy and Andrew Sherratt (eds), Consuming habits: drugs in history and anthropology, London and New York, Routledge, 1995, pp. xii, 244, £35.00 (0-415-09039-3). A persistent feature of human cultures is the use of substances that alter mental states, which are incorporated into rituals, social life, and patterns of trade. These substances have occupied a somewhat awkwa...

2000
Annalisa Bossi Sandro Etalle Sabina Rossi

Input-consuming programs are logic programs with an additional restriction on the selectability (actually, on the resolvability) of atoms. This class of programs arguably allows to model logic programs employing a dynamic selection rule and constructs such as delay declarations: as shown also in [5], a large number of them are actually input-consuming. In this paper we show that – under some sy...

Journal: :IACR Cryptology ePrint Archive 2013
Christian Forler Stefan Lucks Jakob Wenzel

It is a common wisdom that servers should better store the one-way hash of their clients’ passwords, rather than storing the password in the clear. This paper introduces Catena, a new one-way function for that purpose. Catena is memory-hard, which can hinder massively parallel attacks on cheap memory-constrained hardware, such as recent “graphical processing units”, GPUs. Furthermore, Catena ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید