نتایج جستجو برای: prince ehtejab

تعداد نتایج: 4608  

1997
Rachel Walker

Mongolian Stress, Licensing, and Factorial Typology* Rachel Walker University of California, Santa Cruz June 1997 This paper examines the analysis and typology of prominence-based stress systems, which do not call on binary rhythms but depend solely on factors such as syllable weight or sonority, peripherality, and nonfinality in locating stress (Prince 1983, 1990; Prince & Smolensky 1993). Fou...

1998
RACHEL WALKER

In this paper, I argue that a nasal agreement phenomenon in Mbe (BenueCongo, Nigeria; Bamgbose 1971) is a case of reduplication in which material is copied as a nasal coda to a CV prefix with place features linked to the following onset; if place-linking fails, no copy occurs. I demonstrate that this account has important analytical implications for Mbe and more generally, for the theory of red...

Journal: :IACR Cryptology ePrint Archive 2013
Jérémy Jean Ivica Nikolic Thomas Peyrin Lei Wang Shuang Wu

In this article, we provide the first third-party security analysis of the PRINCE lightweight block cipher, and the underlying PRINCEcore. First, while no claim was made by the authors regarding related-key attacks, we show that one can attack the full cipher with only a single pair of related keys, and then reuse the same idea to derive an attack in the single-key model for the full PRINCEcore...

Journal: :Journal of the Royal Society of Medicine 1981

Journal: :The Southeast Asian journal of tropical medicine and public health 2000
N Bhamarapravati

2004
Philip B Mitchell Gin S Malhi Jillian R Ball

School of Psychiatry, University of New South Wales, Randwick, NSW. Philip B Mitchell, MD, FRANZCP, FRCPsych, Head; and Psychiatrist, Black Dog Institute, Prince of Wales Hospital, Sydney; Gin S Malhi, MB ChB, FRANZCP, FRCPsych, Senior Lecturer; and Psychiatrist, Black Dog Institute, Prince of Wales Hospital, Sydney; Jillian R Ball, BA, MA (ClinPsych), PhD, Conjoint Senior Lecturer; and Researc...

1995
Haike Jacobs HAIKE JACOBS

Since Kiparsky (1968) it has been standard practice in generative phonology to account for sound change by means of rule addition, rule simplification, rule reordering and rule loss. Given that the phonological rule as such no longer exists in recently proposed constraint-based theories of phonology, such as Optimality Theory (cf. Prince and Smolensky (1993), McCarthy and Prince (1993a and b), ...

Journal: :Journal of the American Mosquito Control Association 2003
Scott M Shone Patricia N Ferrao Cyrus R Lesser Gregory E Glass Douglas E Norris

During the summer of 2001, field studies were performed to evaluate the effects of carbon dioxide (CO2) and 1-octen-3-ol (octenol) on the ability to collect Aedes albopictus with Centers for Disease Control (CDC) Fay-Prince traps. Results from these studies indicated that Ae. albopictus is significantly more attracted to CO2- or CO2 + octenol-baited CDC Fay-Prince traps than unbaited or octenol...

Journal: :IACR Cryptology ePrint Archive 2009
Hüseyin Demirci Ihsan Taskin Mustafa Çoban Adnan Baysal

This paper studies key-recovery attacks on AES-192 and PRINCE under single-key model by methodology of meet-in-the-middle attack. A new technique named key-dependent sieve is proposed to further reduce the memory complexity of Demirci et al.’s attack at EUROCRYPT 2013, which helps us to achieve 9-round attack on AES-192 by using a 5-round distinguisher; the data, time and memory complexities ar...

Journal: :19: Interdisciplinary Studies in the Long Nineteenth Century 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید