نتایج جستجو برای: minute pirate bug

تعداد نتایج: 66771  

Journal: :Humanities 2022

This essay “Pirate Assemblage” explores two related questions. The first is how we read and appreciate the literary form of pirate literature such as Alexander Exquemelin’s Buccaneers America (1678) Charles Johnson’s two-volume General History Pyrates (volume one 1724, volume 1728). second what answer to that question suggests for regard in relation more canonical eighteenth-century this might ...

2000
Jacob Löfvenberg Tina Lindkvist

The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.

Journal: :Iheringia Serie Zoologia 2021

ABSTRACT The minute litter bug genus Corixidea Reuter, 1891 currently comprises nine valid American species. Herein, we describe quaresmai sp. nov. from one of the last remaining remnants Atlantic Forest in northeast Brazil. new species is characterized by distal extension anophoric process parallel and close to left lateral margin tergites, elongated tergum 8, with a pectinate half filiform ti...

2010
Linda Spark

As the requirement to use computers increases, software piracy is increasing, yet little research has been conducted in South Africa to investigate the reasons why students pirate software. This paper reports on a study on the demographic factors affecting students’ intention to pirate software. The study was carried out on students at the University of the Witwatersrand using questionnaires. I...

A. Allameh M. Kadivar M. Shahedi

One of the most important forms of preharvest damage to wheat is caused by sunn pests. The insects insert their mouth parts into the immature grain and while injecting their saliva suck the milky juices. Flour from damaged wheat results in low baking performance due to the bug proteolytic enzymes’ injected which cause the breakdown of gluten structure in the dough. In the present study three wh...

2004
Tatsuyuki Matsushita Hideki Imai

We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved against self-defensive pirate decoders. When assuming that a pirate decoder can take some self-defensive reaction (e.g., erasing all of the internal keys and shutting down) to escape from tracing if it detects tracing, it ...

Journal: :IACR Cryptology ePrint Archive 2007
Eun Sun Yoo Koutarou Suzuki Myung-Hwan Kim

This paper proposes fully resilient traitor tracing schemes which have no restriction about the number of traitors. By using the concept of key update, the schemes can make the pirate decoders useless within some time-period, which will be called life-time of the decoder. There is a trade-off between the size of ciphertext and life-time of pirate decoders.

2010
Raquel Rolnik

The Special Rapporteur on adequate housing as a component of the right to an adequate standard of living, and on the right to non-discrimination in this context, undertook an official visit to Croatia from 5 to 13 July 2010 to examine the realization of the right to adequate housing in the country and the achievements and difficulties encountered in its fulfilment, in particular in relation to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید