نتایج جستجو برای: the secret agent
تعداد نتایج: 16078161 فیلتر نتایج به سال:
For specifying and verifying branching-time requirements, a reactive system is traditionally modeled as a labeled tree, where a path in the tree encodes a possible execution of the system. We propose to enrich such tree models with “jump-edges” that capture observational indistinguishability: for an agent a, an a-labeled edge is added between two nodes if the observable behaviors of the agent a...
In his paper [9], Stadler develops techniques for improving the security of existing secret sharing protocols by allowing to check whether the secret shares given out by the dealer are valid. In particular, the secret sharing is executed over abelian groups. In this paper we develop similar methods over non-abelian groups.
VERTEBRATE TRACKS are comparatively rare in Tertiary deposits of the western United States. Unlike the deposits of the Mesozoic in this region, in which each formation often has several dozen known tracksites, there are only a few known sites in Paleocene units of the region (Lockley and Hunt, 1995), and though the Eocene Green River Formation contains relatively numerous tracks, especially tho...
While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. Due to the properties of DSA, it is far more difficult to create a threshold scheme for it than for other signature algorithms. In this paper, we present a breakthrough scheme that provides a threshold DSA algorithm that is efficient and optimal. We also present a...
agent technology is an emerging and promising research area in software technology, which increasingly contributes to the development of value-added information systems for large healthcare organizations due to its capability to automatically modify themselves in response to changes in their operating environment. multi agent system (mas) approach is the construction of a complex system as a se...
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
here, we report analysis of in vitro and in vivo drug release from an in situ formulation consisting of triamcinolone acetonide (tr) and poly(d,l-lactide-co-glycolide) (plga) and the additives glycofurol and hydroxyapatite nanoparticles (ha). we found that these additives enhanced drug release rate. we used the taguchi method to predict optimum formulation variables to minimise the initial burs...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید