>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到Manipulation相关记录95条 . 查询时间(0.062 秒)
Whether on the trading floor or in the CERN control rooms, vast streams of constantly changing data cross each other under the watchful eye of experts. On the one hand, physicists analyse the results ...
We present Helix, a Byzantine fault tolerant and scalable consensus algorithm for fair ordering of transactions among nodes in a distributed network. In Helix, one among the network nodes proposes a p...
Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs (ICS '10) and its main application is the protection of cryptographic devices against tampering attacks on memory. In this work, ...
Algebraic Manipulation Detection (AMD) codes [CDF+08] are keyless message authentication codes that protect messages against additive tampering by the adversary assuming that the adversary cannot “see...
2018年SPIE生物分子,细胞和组织的成像,操作和分析会议(SPIE Imaging, Manipulation,and Analysis of Biomolecules,Cells,and Tissues XVI)。
Conventional optical tweezers based on optical radiation forces (scattering, absorption and gradient forces) produced by a tightly focused laser beam have been primarily applied to particles with a di...
2018年SPIE光遗传学和光学操纵会议(SPIE Optogenetics and Optical Manipulation 2018)。
MARSS, the annual International Conference on Manipulation, Automation and Robotics at Small Scales, will be held for the second time from 17 to 21 July, 2017 in Montréal, Canada. This recently establ...
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. Originally, biometrics were the main motivation for fuzzy extractors but ...
Algebraic manipulation detection codes are a class of error detecting codes which have found numerous applications in cryptography. In this paper we extend these codes to defeat general algebraic atta...
Today’s advances in micro/nanotechnology are revolutionizing the traditional paradigm of biomedical research. Owing to the unique properties, micro/nanoparticles find an array of applications in molec...
Conference attendees are invited to attend the BiOS poster session on Monday evening. Come view the posters, enjoy light refreshments, ask questions, and network with colleagues in your field. Authors...
BiOS is organized into six tracks. Choose a track and click to see the list of conferences.Review conference details by clicking on the titles below. These details include paper titles, authors, sched...
We present security vulnerabilities in the remote voting system Helios. We propose Apollo, a modified version of Helios, which addresses these vulnerabilities and could improve the feasibility of inte...
The effects of thermal manipulation (TM) during late ostrich embryonic development on hatchability, body weight, biochemical and hormonal changes, and the ability of hatching chicks to cope with therm...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...