How to Protect Water Resources in Hanoi
نویسندگان
چکیده
منابع مشابه
How to protect biometric templates
In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabled widespread deployment of the biometric-based identification/verification systems. However, due to the nature of biometric data, well-established cryptographic tools (such as hashing, encryption, etc.) are not sufficient for solving one of the most important problems related to biometric system...
متن کاملHow to protect the protector?
This paper describes ongoing research to harden the lower part of the software stack, normally not covered by existing software-based fault-tolerance mechanisms. I discuss a combination of four techniques to harden the operating system kernel against hardware faults: resilient data structures, asynchronous checks, restartable OS services, and message protection. I present initial performance re...
متن کاملHow to Protect Fly Photoreceptors
December 2006 | Volume 4 | Issue 12 | e418 Most governments around the world set conservation policy based on the assumption that resource exploitation and species protection can co-exist in the same place. These policies have led to Orwellian “marine protected areas” that host commercial fi shing operations, leading one to wonder who’s protecting whom. A new study reveals the danger of this ap...
متن کاملhow to protect young researchers from research misconduct
سخن سردبیر editorial مجله دانشگاه علوم پزشکی رفسنجان دوره 13، بهمن 1393، 1020-1019 چگونه می توان پژوهشگران جوان را از سوء رفتارهای پژوهشی حفظ نمود how to protect young researchers from research misconduct محسن رضائیان[1] m. rezaeian در سخن سردبیری شماره قبل مجله دانشگاه ]1[، با انواع سوء رفتارهای پژوهشی و طبقه بندی آن ها به تقلب های پژوهشی و رفتارهای پژوهشی ابهام برانگیز آشنا شدی...
متن کاملHow to Protect Yourself without Perfect Shredding
Erasing old data and keys is an important capability of honest parties in cryptographic protocols. It is useful in many settings, including proactive security in the presence of a mobile adversary, adaptive security in the presence of an adaptive adversary, forward security, and intrusion resilience. Some of these settings, such as achieving proactive security, is provably impossible without so...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis
سال: 2009
ISSN: 2199-9201,1619-7623
DOI: 10.14512/tatup.18.2.77