نتایج جستجو برای: gambit tokens

تعداد نتایج: 5899  

2014
Manoj Prabhakaran Amit Sahai Akshay Wadia

Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our main result is a completeness theorem t...

Journal: :IACR Cryptology ePrint Archive 2017
Shalev Ben-David Or Sattath

The fisherman caught a quantum fish. Fisherman, please let me go, begged the fish, and I will grant you three wishes. The fisherman agreed. The fish gave the fisherman a quantum computer, three quantum signing tokens and his classical public key. The fish explained: to sign your three wishes, use the tokenized signature scheme on this quantum computer, then show your valid signature to the king...

2012
Jens-Matthias Bohli

Introduction The vision of the Internet of Things has been discussed for several years now, and has already attracted attention beyond the research community. Besides the widespread use of RFID chips, the Internet of Things is also characterized by smart real-world objects that report status of themselves or the environment detected by sensors. Some objects also offer to change their status or ...

Journal: :PVLDB 2009
Thomas Kabisch Eduard Constantin Dragut Clement T. Yu Ulf Leser

Much data in the Web is hidden behind Web query interfaces. In most cases the only means to “surface” the content of a Web database is by formulating complex queries on such interfaces. Applications such as Deep Web crawling and Web database integration require an automatic usage of these interfaces. Therefore, an important problem to be addressed is the automatic extraction of query interfaces...

Journal: :Journal of the experimental analysis of behavior 2012
Carla H Lagorio Timothy D Hackenberg

Pigeons were given repeated choices between variable and fixed numbers of token reinforcers (stimulus lamps arrayed above the response keys), with each earned token exchangeable for food. The number of tokens provided by the fixed-amount option remained constant within blocks of sessions, but varied parametrically across phases, assuming values of 2, 4, 6, or 8 tokens per choice. The number of ...

2011
Anqi Cui Min Zhang Yiqun Liu Shaoping Ma

Twitter is a microblogging service where worldwide users publish their feelings. However, sentiment analysis for Twitter messages (tweets) is regarded as a challenging problem because tweets are short and informal. In this paper, we focus on this problem by the analysis of emotion tokens, including emotion symbols (e.g. emoticons), irregular forms of words and combined punctuations. According t...

Journal: :Bulletin of the EATCS 2000
Costas Busch Neophytos Demetriou Maurice Herlihy Marios Mavronicolas

Balancing networks are highly distributed data structures used to solve multiprocessor synchronization problems. Typically, balancing networks are accessed by tokens, and the distribution of the tokens on the network’s output specify the property of the network. However, tokens represent increment operations only, and tokens alone are not adequate for synchronization problems that require decre...

Journal: :Theoretical Computer Science 2015

Journal: :پژوهش های زبانی 0
دکتر وحید صادقی استادیار دانشگاه بین المللی امام خمینی(ره)

this article addresses the perceptual correlates of compensatory lengthening in persian. in a perception experiment, duration, spectral tilt measurements h1-h2 and h1-f1 and f0 were varied in several steps based on the results from a production experiment (sadeghi, 2007). subjects were asked to identify the tokens involving vowel length. results revealed that duration is the most reliable perce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید