نتایج جستجو برای: cottontop tamarin

تعداد نتایج: 280  

Journal: :British journal of sports medicine 2007
P McCrory

W ell it’s that time of the year again. As the southern hemisphere slowly warms to a new spring, so the annual Ig Nobel awards reappear. I have written about these previously, but to the uninitiated these awards embody the pinnacle of human achievement and represent eccentric and unusual research as an alternative to the ‘‘real’’ Nobel awards, which although awarded at the same time tend to be ...

Journal: :IACR Cryptology ePrint Archive 2015
Jiangshan Yu Mark Ryan Cas J. F. Cremers

Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device performing the crypto operations is free of malware. We explore ways in which some security guarantees can be achieved even if an attacker has succeeded in obtaining access to all the keys in a device, e.g. by exploiting software vulnerabilities. We develop a new proto...

Journal: :Current Biology 2005
Arwen Long Michael Platt

Marmoset monkeys devalue rewards requiring travel to acquire, but tamarin monkeys do not, despite the greater patience of marmosets when rewards are delayed in time. Such preference reversals, not predicted by standard economic theory, may reflect behavioral mechanisms adaptively specialized for different spatial and temporal patterns of foraging.

Journal: :Cognitive psychology 2004
Elissa L Newport Marc D Hauser Geertrui Spaepen Richard N Aslin

In earlier work we have shown that adults, infants, and cotton-top tamarin monkeys are capable of computing the probability with which syllables occur in particular orders in rapidly presented streams of human speech, and of using these probabilities to group adjacent syllables into word-like units. We have also investigated adults' learning of regularities among elements that are not adjacent,...

2013
Steve Kremer Fr

Indemnisation The internship is supported by the European grant ProS-ecure (ERC Starting Grant) and the ANR grant VIP (Programme JCJC). Context. Security protocols are distributed programs that aim at ensuring security properties, such as confidentiality, authentication or anonymity, by the means of cryptography. Such protocols are widely deployed, e.g., for electronic commerce on the Internet,...

Journal: :IEEE Security & Privacy 2022

Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how can formalize protocols, adversary models, properties, scale to substantial, real world, verification problems.

Journal: :CoRR 2017
Véronique Cortier Niklas Grimm Joseph Lallemand Matteo Maffei

Mature push button tools have emerged for checking trace properties (e.g. secrecy or authentication) of security protocols. The case of indistinguishability-based privacy properties (e.g. ballot privacy or anonymity) is more complex and constitutes an active research topic with several recent propositions of techniques and tools. We explore a novel approach based on type systems and provide a (...

2006

The Golden Lion Tamarin (Leontopithecus rosalia) is an endemic primate of the Brazilian Atlantic coastal rainforest, still under serious extinction risk. Just a few is know about its anatomy, specifically the muscle unions. Due to the reasons exposed before, aiming understanding the locomotion of this and others primates, we decided to study the morphology and morphometry of the gracilis and sa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید