نتایج جستجو برای: the secret agent

تعداد نتایج: 16078161  

2007
Rajeev Alur Pavol Cerný Swarat Chaudhuri

For specifying and verifying branching-time requirements, a reactive system is traditionally modeled as a labeled tree, where a path in the tree encodes a possible execution of the system. We propose to enrich such tree models with “jump-edges” that capture observational indistinguishability: for an agent a, an a-labeled edge is added between two nodes if the observable behaviors of the agent a...

Journal: :CoRR 2014
Delaram Kahrobaei Elizabeth Vidaure

In his paper [9], Stadler develops techniques for improving the security of existing secret sharing protocols by allowing to check whether the secret shares given out by the dealer are valid. In particular, the secret sharing is executed over abelian groups. In this paper we develop similar methods over non-abelian groups.

2001
JOHN R. FOSTER

VERTEBRATE TRACKS are comparatively rare in Tertiary deposits of the western United States. Unlike the deposits of the Mesozoic in this region, in which each formation often has several dozen known tracksites, there are only a few known sites in Paleocene units of the region (Lockley and Hunt, 1995), and though the Eocene Green River Formation contains relatively numerous tracks, especially tho...

Journal: :IACR Cryptology ePrint Archive 2016
Rosario Gennaro Steven Goldfeder Arvind Narayanan

While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. Due to the properties of DSA, it is far more difficult to create a threshold scheme for it than for other signature algorithms. In this paper, we present a breakthrough scheme that provides a threshold DSA algorithm that is efficient and optimal. We also present a...

Journal: :iranian journal of radiology 0
mahtab karami kashan university of medical; kashan university of medical

agent technology is an emerging and promising research area in software technology, which increasingly contributes to the development of value-added information systems for large healthcare organizations due to its capability to automatically modify themselves in response to changes in their operating environment. multi agent system (mas) approach is the construction of a complex system as a se...

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1389

here, we report analysis of in vitro and in vivo drug release from an in situ formulation consisting of triamcinolone acetonide (tr) and poly(d,l-lactide-co-glycolide) (plga) and the additives glycofurol and hydroxyapatite nanoparticles (ha). we found that these additives enhanced drug release rate. we used the taguchi method to predict optimum formulation variables to minimise the initial burs...

Journal: :The Iowa Review 1973

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید