نتایج جستجو برای: one way carsharing
تعداد نتایج: 2296053 فیلتر نتایج به سال:
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...
Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...
In a forthcoming paper[2], we examine the security of the APCO Project 25 (“P25”)[3] two-way digital voice radio system. P25 is a suite of digital protocols and standards designed for use in narrowband shortrange (VHF and UHF) land-mobile wireless two-way communications systems. The system is used by law enforcement, national security, public safety, and other government users in the United Sta...
Diffraction gratings are elementary tools for much of optics and spectroscopy. Here, at microwave frequencies, we provide a new perspective on these fundamental structures. A transmission diffraction grating is presented that has diffracted beams emanating from one surface only. It can thus function either as a transmission grating with no reflected orders (other than zero) or, in the reverse c...
We introduce a new class of interdependent games, motivated by applications in large-scale power restoration, humanitarian logistics, and integrated supply-chains, where different agents have individual utilities but a social welfare objective must be optimized in a decentralized fashion. In these games, the utilities of one player does not depend on the decisions of the other player, giving he...
(2002). 26. J. M. Caruthers, D. B. McKay, Curr. Opin. Struct. Biol. 12, 123 (2002). 27. J. P. Abrahams, A. G. Leslie, R. Lutter, J. E. Walker, Nature 370, 621 (1994). 28. L. Holm, C. Sander, Trends. Biochem. Sci. 20, 478 (1995). 29. S. S. Velankar, P. Soultanas, M. S. Dillingham, H. S. Subramanya, D. B. Wigley, Cell 97, 75 (1999). 30. R. M. Story, H. Li, J. N. Abelson, Proc. Natl. Acad. Sci. U....
Given a graph, does there exist an orientation of the edges such that the resulting directed graph is strongly connected? Robbins’ theorem [Robbins, Am. Math. Monthly, 1939] states that such an orientation exists if and only if the graph is 2-edge connected. A natural extension of this problem is the following: Suppose that the edges of the graph is partitioned into trails. Can we orient the tr...
The VMPC function is a combination of triple permutation composition and integer addition. It differs from a simple triple permutation composition with one integer addition operation performed on some of the elements of the permutation. The consequence of this addition operation is corruption of cycle structure of the transformed permutation the fundamental source of the function's resistance t...
We introduce the one-way radiative transfer equation (RTE) for modeling the transmission of a light beam incident normally on a slab composed of a uniform forward-peaked scattering medium. Unlike the RTE, which is formulated as a boundary value problem, the one-way RTE is formulated as an initial value problem. Consequently, the one-way RTE is much easier to solve. We discuss the relation of th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید