نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1386

the purpose of the present study is to find out whether bilinguals of khuzestan-arab origin or monolinguals of iranian origin code-switch during learning or speaking english and which group is more susceptible to code-switch. to this end, the students of 24 classes from high schools and pre- university centers were screened out, and interviewed and their voices and code-switchings were recorded...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده الهیات و معارف اسلامی شهید مطهری 1393

murder of wife during adultery: if a man sees his wifes adultery with another man, he can kill both of them. and he is not guilty in this murder. this sentence is the opinion of imami jurists and numerous comments on this issue are the main reasons for the sentence. that is the opinion of the sunni jurists too. murder of wife and the stranger man are permitted. but in contrast to these views, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم انسانی 1389

abstract this study examines the relationship between reading anxiety and difficulty of texts as well as the relationship between reading anxiety and students perceived difficulty of the texts. since difficulty is a relative concept, i limited its definition by sticking to the readability formula. we also took students perceived difficulty levels into account. therefore, in the present study, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ادبیات و علوم انسانی 1389

abstract translation has become a cultural act which plays a significant role in human life. with the emergence of functional translation theories, and skopos theory in particular, translation has been considered as a purposeful, interpersonal and intercultural activity which is produced for particular recipients and directed by a specific purpose. this purpose determines the translatio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1389

the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...

Journal: :I. J. Network Security 2016
Qiao Peng Youliang Tian

Using multiple linear of multilinear map, we propose a simple, non-interactive and effective publicly verifiable secret sharing (PVSS) scheme based on multilinear DiffieHellman assumption (MDH). Up to now, the publicly verifiable of secret sharing is still an issue. In this paper, we set the sharing secret is a multiple linear pairing, we apply the multiple linear property of multilinear map fo...

2014
Feng Hao Matthew Nicolas Kreeger Brian Randell Dylan Clarke Siamak Fayyaz Shahandashti Peter Hyun-Jeen Lee

This paper presents a new End-to-End (E2E) verifiable e-voting protocol for large-scale elections, called Direct Recording Electronic with Integrity (DRE-i). In contrast to all other E2E verifiable voting schemes, ours does not involve any Tallying Authorities (TAs). The design of DRE-i is based on the hypothesis that existing E2E voting protocols’ universal dependence on TAs is a key obstacle ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده فنی 1393

a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...

2011
Manuel Barbosa Pooya Farshim

In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both seen as a public-key counterpart to Verifiable Computation, where input generation and output verification a...

2002
Frank Guerin Jeremy Pitt

This paper develops a general agent communication framework which allows us to define several different notions of verification and to investigate if an agent communication language is verifiable. The framework is sufficiently general to accommodate communication languages based on agents’ mental states as well as those based on social states of the multi-agent system. For this purpose an exist...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید