نتایج جستجو برای: concrete tank

تعداد نتایج: 90492  

Journal: :Journal of the experimental analysis of behavior 2011
Brian D Kangas Rachel N Cassidy

Thirty-five years ago, B.F. Skinner (1976) lamented a decreasing trend in the prevalence of cumulative records in the Journal of the Experimental Analysis of Behavior ( JEAB). The editorial began with the two memorable lines, ‘‘Evidently we have not long to wait for an issue of JEAB without a single cumulative record! I shall not miss the records so much as the kinds of experiments that could s...

2004
Schoffstall

Triboelektrostatická separácia minerálnej substancie zo slovenského uhlia V článku sú diskutované niektoré technické aspekty triboelektrostatickej separácie a výsledky aplikácie tohto postupu pri úprave troch typov uhlia, konkrétne energetického uhlia z Cígľa, Handlovej a Novák. Bolo zistené, že účinnosť separácie veľmi úzko závisí na druhu separovan uhlia. Prvé výsledky preukázali súvislosť me...

2009
Mihir Bellare Thomas Ristenpart

Waters’ variant of the Boneh-Boyen IBE scheme is attractive because of its efficency, applications, and security attributes, but suffers from a relatively complex proof with poor concrete security. This is due in part to the proof’s “artificial abort” step, which has then been inherited by numerous derivative works. It has often been asked whether this step is necessary. We show that it is not,...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1392

abstract in aggregate, active forms of reactive silica with mineral names are sometimes associated with sand and gravel in concrete mixture. alkali hydroxides originated from alkalis in the cement or other resources form an alkaline silica gel with this reactive silica which becomes swallowed and expanded during time causing damage to concrete. there have been growing researches on alkaline r...

Journal: :IACR Cryptology ePrint Archive 2014
Gordon Procter

In this note, we describe an error in the proof for CLRW2 given by Landecker et al. in their paper at CRYPTO 2012 on the beyond-birthday-bound security for tweakable block ciphers. We are able to resolve the issue, give a new bound for the security of CLRW2, and identify a potential limitation of this proof technique when looking to extend the scheme to provide asymptotic security.

Journal: :The Journal of the Acoustical Society of America 1963

2004
Michael Backes Birgit Pfitzmann Michael Waidner

M. Naor (Ed.): TCC 2004, LCNS 2951, pages 336 352, February 2004. c © Springer-Verlag Berlin Heidelberg 2004. Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography, i.e., the specification is an ideal system and a real system should in some sense simulate this ideal one...

Journal: :CoRR 2017
Gaëlle Loosli Hattoibe Aboubacar

This paper proposes the adaptation of Support Vector Data Description (SVDD) to the multiple kernel case (MK-SVDD), based on SimpleMKL. It also introduces a variant called Slim-MK-SVDD that is able to produce a tighter frontier around the data. For the sake of comparison, the equivalent methods are also developed for One-Class SVM, known to be very similar to SVDD for certain shapes of kernels....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید