نتایج جستجو برای: minute pirate bug
تعداد نتایج: 66771 فیلتر نتایج به سال:
This essay “Pirate Assemblage” explores two related questions. The first is how we read and appreciate the literary form of pirate literature such as Alexander Exquemelin’s Buccaneers America (1678) Charles Johnson’s two-volume General History Pyrates (volume one 1724, volume 1728). second what answer to that question suggests for regard in relation more canonical eighteenth-century this might ...
The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.
Description of a new species of Corixidea from Brazil (Heteroptera: Dipsocoromorpha: Schizopteridae)
ABSTRACT The minute litter bug genus Corixidea Reuter, 1891 currently comprises nine valid American species. Herein, we describe quaresmai sp. nov. from one of the last remaining remnants Atlantic Forest in northeast Brazil. new species is characterized by distal extension anophoric process parallel and close to left lateral margin tergites, elongated tergum 8, with a pectinate half filiform ti...
As the requirement to use computers increases, software piracy is increasing, yet little research has been conducted in South Africa to investigate the reasons why students pirate software. This paper reports on a study on the demographic factors affecting students’ intention to pirate software. The study was carried out on students at the University of the Witwatersrand using questionnaires. I...
One of the most important forms of preharvest damage to wheat is caused by sunn pests. The insects insert their mouth parts into the immature grain and while injecting their saliva suck the milky juices. Flour from damaged wheat results in low baking performance due to the bug proteolytic enzymes’ injected which cause the breakdown of gluten structure in the dough. In the present study three wh...
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved against self-defensive pirate decoders. When assuming that a pirate decoder can take some self-defensive reaction (e.g., erasing all of the internal keys and shutting down) to escape from tracing if it detects tracing, it ...
This paper proposes fully resilient traitor tracing schemes which have no restriction about the number of traitors. By using the concept of key update, the schemes can make the pirate decoders useless within some time-period, which will be called life-time of the decoder. There is a trade-off between the size of ciphertext and life-time of pirate decoders.
The Special Rapporteur on adequate housing as a component of the right to an adequate standard of living, and on the right to non-discrimination in this context, undertook an official visit to Croatia from 5 to 13 July 2010 to examine the realization of the right to adequate housing in the country and the achievements and difficulties encountered in its fulfilment, in particular in relation to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید