Smashing bits to show asteroid strength

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smashing Protein Complex Ions to Bits Reveals Their Structural Organization

Elastic network (EN) models have been widely used in recent years for describing protein dynamics, based on the premise that the motions naturally accessible to native structures are relevant to biological function. We posit that equilibrium motions also determine communication mechanisms inherent to the network architecture. To this end, we explore the stochastics of a discrete-time, discrete-...

متن کامل

Graphene: show of adhesive strength.

G raphite is composed of layers of carbon atoms that are held together by strong covalent bonds within each graphene layer and relatively weak van der Waals forces between the layers. The mechanical properties of graphite — it is anisotropic and prone to interlayer cleavage — are closely related to the characteristics of these forces. Furthermore, according to recent work at the University of C...

متن کامل

Smashing: Folding Space to Tile through Time

Partial differential equation solvers spend most of their computation time performing nearest neighbor (stencil) computations on grids that model spatial domains. Tiling is an effective performance optimization for improving the data locality and enabling course-grain parallelization for such computations. However, when the domains are periodic, tiling through time is not directly applicable du...

متن کامل

Data Smashing

Investigation of the underlying physics or biology from empirical data requires a quantifiable notion of similarity when do two observed data sets indicate nearly identical generating processes, and when they do not. The discriminating characteristics to look for in data is often determined by heuristics designed by experts, e:g:, distinct shapes of “folded” lightcurves may be used as “features...

متن کامل

Smashing SQUASH-0

At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol, which we call SQUASH-0, was using a linear mixing function which was subsequently withdrawn. Essentially, we mount an attack against SQUASH-0 with full window which could be used as a “known random coins attack” aga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science

سال: 2016

ISSN: 0036-8075,1095-9203

DOI: 10.1126/science.353.6296.259-a