نتایج جستجو برای: eternal security number
تعداد نتایج: 1323106 فیلتر نتایج به سال:
We present here three new solutions of Brans-Dicke theory for a stationary geometry with cylindrical symmetry in the presence of matter in rigid rotation with T 6= 0. All the solutions have eternal closed timelike curves in some region of spacetime the size of which depends on !. Moreover, two of them do not go over a solution of general relativity in the limit ! !1. PACS number(s): 04.50+h, 04...
In December of 1998, there was published a seminal work using precise measurements of supernovae magnitudes and leading to the conclusion of an apparent accelerated expansion of observed part of Universe. But when we approach the processing of these precise data from a classical ethereal position, without relativistic adjustments, we get another picture, and we believe it is the correct one. It...
We use mobile guards on the vertices of a graph to defend it against an infinite sequence of attacks on its edges. A guard on an incident vertex moves across the attacked edge to defend it; other guards may also move to neighboring vertices. We prove upper and lower bounds on the minimum number of guards needed for this eternal vertex cover problem and characterize the graphs for which the uppe...
An eternal $1$-secure set, in a graph $G = (V, E)$ is set $D \subset V$ having the property that for any finite sequence of vertices $r_1, r_2, \ldots, r_k$ there exists $v_1, v_2, v_k$ and $ D D_0, D_1, D_2, D_k$ dominating sets $G$, such each $i$, $1 \leq i k$, $D_{i} (D_{i-1} - \{v_i\}) \cup \{r_i\}$, where $v_i \in D_{i-1}$ $r_i N[v_i]$. Here v_i$ possible. The cardinality smallest $G$ call...
Digital timestamping is a cryptographic technique allowing affixing a reliable date to a digital document. The security of most existing timestamping systems is based on the security of the used cryptographic techniques as hash functions. However, a hash function has a limited lifetime. In this context, we provide a non-interactive timestamping scheme in the bounded storage model (BSM) whose se...
This paper describes an investigation into the potential for remote controlled operation of home automation systems. It considers problems with their implementation, discusses possible solutions through various network technologies and indicates how to optimize the use of such systems. The home is an eternal, heterogeneous, distributed computing environment (Greaves, 2002) which certainly requi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید