نتایج جستجو برای: variant working vacations
تعداد نتایج: 299600 فیلتر نتایج به سال:
In this paper, we investigate Keccak — the cryptographic hash function adopted as the SHA-3 standard. We propose a malicious variant of the function, where new round constants are introduced. We show that for such the variant, collision and preimage attacks are possible. We also identify a class of weak keys for the malicious Keccak working in the MAC mode. Ideas presented in the paper were ver...
This first variationist study of ancient Egyptian examines two possessive constructions in Middle and Late Egyptian. Egyptologists maintain that the innovative form does not gain popularity until Late Egyptian, and that in the Late Egyptian stage, the language had two different registers – each favouring a different possessive variant (Allen 2013, Junge 2005). I confirm that the innovative form...
Background: Taxol is one of the most important anti-cancer drugs, which is obtained from yew trees (<span style="font-variant: normal; ...
In this note we identify a simple setup from which one may easily infer various decomposition results for queues with interruptions as well as càdlàg processes with certain secondary jump inputs. Special cases are processes with stationary or stationary and independent increments. In the Lévy process case, the decomposition holds not only in the limit but also at independent exponential times, ...
We consider in this paper an M/G/1 type queueing system with the following extensions. First, the server is unreliable and is subject to random breakdowns. Second, the server also implements the well-knownN-policy.Third, instead of a Bernoulli vacation schedule, the more general notion of binomial schedule withK vacations is applied. A cost function with two decision variables is developed. A n...
هــدف ایــن مقالــه انعــکاس صــدای گروهــی از جوانــان از ورای هنــر شــهری و خیابانــی یا گرافیتــی اســت و اینکــه چــرا ایــن گــروه هنــری ترجیــح داده انــد کــه حــرف خــود را از طریــق...
Electronic Assessment systems usually provide an authoring tool for creating activities (mainly closed-type questions) and administering the flow of their presentation and are also complemented with a delivery environment for learners. In this paper, we discuss learner’s control over authored assessment. The prototype application, ReACTS (Re-Adaptable Computerized Testing System), enables learn...
In this paper, we address the issues of maintaining sensing coverage and connectivity by keeping a minimum number of sensor nodes in the active mode in wireless sensor networks. We investigate the relationship between coverage and connectivity by solving the following two sub-problems. First, we prove that if the radio range is at least twice the sensing range, complete coverage of a convex are...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید