نتایج جستجو برای: cottontop tamarin
تعداد نتایج: 280 فیلتر نتایج به سال:
W ell it’s that time of the year again. As the southern hemisphere slowly warms to a new spring, so the annual Ig Nobel awards reappear. I have written about these previously, but to the uninitiated these awards embody the pinnacle of human achievement and represent eccentric and unusual research as an alternative to the ‘‘real’’ Nobel awards, which although awarded at the same time tend to be ...
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device performing the crypto operations is free of malware. We explore ways in which some security guarantees can be achieved even if an attacker has succeeded in obtaining access to all the keys in a device, e.g. by exploiting software vulnerabilities. We develop a new proto...
Marmoset monkeys devalue rewards requiring travel to acquire, but tamarin monkeys do not, despite the greater patience of marmosets when rewards are delayed in time. Such preference reversals, not predicted by standard economic theory, may reflect behavioral mechanisms adaptively specialized for different spatial and temporal patterns of foraging.
Learning at a distance II. Statistical learning of non-adjacent dependencies in a non-human primate.
In earlier work we have shown that adults, infants, and cotton-top tamarin monkeys are capable of computing the probability with which syllables occur in particular orders in rapidly presented streams of human speech, and of using these probabilities to group adjacent syllables into word-like units. We have also investigated adults' learning of regularities among elements that are not adjacent,...
Indemnisation The internship is supported by the European grant ProS-ecure (ERC Starting Grant) and the ANR grant VIP (Programme JCJC). Context. Security protocols are distributed programs that aim at ensuring security properties, such as confidentiality, authentication or anonymity, by the means of cryptography. Such protocols are widely deployed, e.g., for electronic commerce on the Internet,...
Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how can formalize protocols, adversary models, properties, scale to substantial, real world, verification problems.
Mature push button tools have emerged for checking trace properties (e.g. secrecy or authentication) of security protocols. The case of indistinguishability-based privacy properties (e.g. ballot privacy or anonymity) is more complex and constitutes an active research topic with several recent propositions of techniques and tools. We explore a novel approach based on type systems and provide a (...
The Golden Lion Tamarin (Leontopithecus rosalia) is an endemic primate of the Brazilian Atlantic coastal rainforest, still under serious extinction risk. Just a few is know about its anatomy, specifically the muscle unions. Due to the reasons exposed before, aiming understanding the locomotion of this and others primates, we decided to study the morphology and morphometry of the gracilis and sa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید