نتایج جستجو برای: future state value stream mappingfvsm

تعداد نتایج: 2025088  

Journal: :IACR Cryptology ePrint Archive 2009
Mehreen Afzal Ashraf Masood

Inner state of a stream cipher is said to be as large as necessary but at the same time as small as possible. Trivium, a hardware oriented stream cipher, has been selected for the final portfolio of the eSTREAM project. It offers a security level of 80 bits while it has 288 internal state bits. Owing to its simple algebraic structure, it has been proved experimentally that Trivium can provide o...

Journal: :Perform. Eval. 2000
Jean-Michel Fourneau Leïla Kloul Franck Quessette

We present a new type of multiclass generalized networks of queues with a steady-state product form solution. At its arrival into a queue, a negative customer (or a signal) starts an iteration. At each step of the iteration, a customer is deleted according to a probability which may depend on the type of customer. The iteration stops when the deletion fails. We study networks with multiple clas...

2007
Mohamed G. Gouda Yan Li

We introduce a new abstract system, called the truth system. In the truth system, a process deduces a true value, with high probability, from an incoming stream of both true and false values, where the probability that a value in the incoming stream is true is at least 0.6. At each instant, the receiving process maintains at most one candidate of the true value, and eventually the process reach...

سعید مرید, , علیرضا مساح بوانی, ,

In this study the impact of climate change on temperature, rainfall and river flows of the Zayandeh Rud basin under two climate change scenarios for two periods (2010-2039 and 2070-2099) are investigated. For the evaluation of future climate change impact on stream flow to Chadegan reservoir, the global circulation model (GCM) outputs of the HadCM3 model (monthly temperature and precipitation) ...

Journal: :IACR Cryptology ePrint Archive 2009
Marius Oliver Gheorghita

The purpose of this paper is to provide a description of the Nofish cryptographic algorithm. This paper is intended to release the algorithm to the cryptographic community, for its future analysis and possible use. The name of the algorithm comes in respect to other well-known secure crypto algorithms like Blowfish and Twofish and since this one has not gained this status, I call it Nofish. 1. ...

Journal: :J. UCS 2005
Tarmo Uustalu Varmo Vene

We propose a novel discipline for programming stream functions and for the semantic description of stream manipulation languages based on the observation that both general and causal stream functions can be characterized as coKleisli arrows of comonads. This seems to be a promising application for the old, but very little exploited idea that if monads abstract notions of computation of a value,...

2010
Keith B. Gido Donald A. Jackson

The broad range of subjects represented in this symposium highlight exciting new advances in the field of stream fish community ecology. Some of the chapters expand on themes (e.g., community stability, species interactions) that were represented in the 1987 publication Community and Evolutionary Ecology of North American Stream Fishes edited by W. J. Matthews and D. C. Heins. Others present re...

2012
Stewart S. R. Jamieson Andreas Vieli Stephen J. Livingstone Colm Ó Cofaigh Chris Stokes Claus-Dieter Hillenbrand Julian A. Dowdeswell

Marine-based ice streams whose beds deepen inland are thought to be inherently unstable1–3. This instability is of particular concern because significant portions of the marinebased West Antarctic and Greenland ice sheets are losing mass and their retreat could contribute significantly to future sea-level rise4–7. However, the present understanding of icestream stability is limited by observati...

2001
Nira Liberman Yaacov Trope

Temporal construal theory states that distant future situations are construed on a higher level (i.e., using more abstract and central features) than near future situations. Accordingly, the theory suggests that the value associated with the high-level construal is enhanced over delay and that the value associated with the low-level construal is discounted over delay. In goal-directed activitie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید