نتایج جستجو برای: 16 weaknesses
تعداد نتایج: 353592 فیلتر نتایج به سال:
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1. The SOHO (Schizophrenia Outpatient Health Outcomes) Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2. Methods to Adjust for Selection Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Introduction Fatigue in Parkinson’s Disease (PD) remains poorly understood. The comprovation derives from and is proven by psychometric scales. objective to prepare a Technical Scientific Report on the performance of scales PD. Methods Based Methodological Guideline for Preparation Report, Brazil 2014, we conducted search MEDLINE / PubMed, Virtual Health Library (BVS) Cochrane, then review crit...
Traditional matchmaking in East Sumba Regency has long been considered a tradition that needs to be continued even though it many weaknesses need avoided. one of them is if closely related coercion children who will matched. The purpose this study was see the true meaning customary and legal impact on perpetrators forced based Law 16 2016 concerning marriage. research method used normative empi...
The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key schedules, for example the slide attacks. In this paper we present new interesting key-pairs of the DES that can be used in related-key attacks to produce sliding properties of the full-round DES key schedule. This is a sort of key schedule weakness from a slide attack point...
A best evidence topic in cardiac surgery was written according to a structured protocol. The question addressed was whether either right atrial or bi-atrial pacing effectively reduces the incidence of Atrial fibrillation post cardiac surgery. Altogether 458 papers were found using the reported search, of which 16 represented the best evidence on this topic. The author, journal, date and country...
Copyright is held by the author/owner(s). Presented at the Cross-Surface ’16 workshop, in conjunction with ACM ISS’16. November 6, Niagara Falls, Canada. Abstract Technologies for spatial and proxemic interaction with mobile devices depend inherently on the ability to obtain information on the device’s position (i.e., to localize the device). Numerous technologies have been proposed for this, e...
In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related keys, differing in one of the byte positions. The keystreams generated by RC4 for a key and its related keys are substantially similar in the initial hundred bytes before diverging. RC4 is most commonly used with a 128-bit key repeated 16 times; this variant does not s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید