نتایج جستجو برای: t table implementation

تعداد نتایج: 1151118  

2008
Syed Masud Mahmud

, 4 b s t r a c t : In conventional techniques [4-61 the phase angle between two signals of same frequency is computed by converting the signals into two square waves and then measuring the time difference between the zero crossing points of the square waves. In some other techniques the phase is computed by measuring the time difference between the pulse centers of the two square waves [l-31. ...

Journal: :Behavior Research Methods, Instruments, & Computers 1995

2013
Severin Holzer-Graf Thomas Krinninger Martin Pernull Martin Schläffer Peter Schwabe David Seywald Wolfgang Wieser

In this paper we evaluate and improve different vector implementation techniques of AES-based designs. We analyze how well the T-table, bitsliced and bytesliced implementation techniques apply to the SHA-3 finalist Grøstl. We present a number of new Grøstl implementations which improve upon many previous results. For example, our fastest ARM NEON implementation of Grøstl is 40% faster than the ...

Journal: :Nippon Eiseigaku Zasshi (Japanese Journal of Hygiene) 1982

Journal: :مدیریت فرهنگ سازمانی 0
حسین خنیفر استاد، دانشکدة مدیریت و حسابداری، پردیس فارابی دانشگاه تهران، ایران سید مهدی الوانی استاد، دانشکدة مدیریت، دانشگاه علامه طباطبایی، تهران، ایران حمید حاجی ملا میرزایی دکتری مدیریت تصمیم گیری و خط مشی گذاری عمومی، پردیس فارابی دانشگاه تهران، ایران

this article discuss about public policy implementation for cultural space in iran. we want to design a model for implementing cultural policy. and will explain the factors of the model and the relations between them. then we will compare the proposed model with the other famous models on the word. the proposed model created with the qualitative methodology which is grounded theory (gt). with p...

1993
Mikael Pettersson

Linear Hashing has been proposed as a simple and eecient technique for storing and retrieving key sets whose cardinality is not known in advance. Its main advantage is that it allows tables to grow and shrink gracefully without major reorganizations. In this paper, several modiications of the basic scheme are presented, together with performance measurements. It is also shown that the seemingly...

Journal: :Vascular Health and Risk Management 2008
Ben van Steenkiste Richard Grol Trudy van der Weijden

BACKGROUND Cardiovascular disease prevention is guided by so-called risk tables for calculating individual's risk numbers. However, they are not widely used in routine practice and it is important to understand the conditions for their use. OBJECTIVES Systematic review of the literature on professionals' performance regarding cardiovascular risk tables, in order to develop effective implement...

Abstract: Background:Blended learning is a term increasingly used to describe the way e-learning is being combined with traditional classroom methods and independent study to create a new, hybrid teaching methodology. The aim of this study was to explore the perspectives of Tabriz health center staff on the Establishment status of blended learning system based on ISO 10015 requirements. Methods...

2013
Raphael Spreitzer Thomas Plos

Cache attacks are a special form of implementation attacks and focus on the exploitation of weaknesses in the implementation of a specific algorithm. We demonstrate an access-driven cache attack, which is based on the analysis of memory-access patterns due to the T-table accesses of the Advanced Encryption Standard (AES). Based on the work of Tromer et al. [20] we gather the cachememory access ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید