نتایج جستجو برای: lex sportiva

تعداد نتایج: 1729  

Journal: :Jurist-Diction 2021

AbstractCOVID-19 pandemic brought many impacts to every sector around the world, football is one of them. As a modern industry, relation between professional players and clubs working that produces rights responsibility for both parties already agree on contract. Problems occur when COVID-19 forces Indonesian competition be postponed. The government federation made several regulations solve pro...

Journal: :IJAC 2000
David B. A. Epstein Paul J. Sanders

We introduce a new class of groups with solvable word problem, namely groups specified by a confluent set of short-lex-reducing Knuth– Bendix rules which form a regular language. This simultaneously generalizes short-lex-automatic groups and groups with a finite confluent set of short-lex-reducing rules. We describe a computer program which looks for such a set of rules in an arbitrary finitely...

2009
Justin Yip Pascal Van Hentenryck

This paper presents the first experimental evaluation of the length-lex domain for set variables. The implementation is based on bound-consistency algorithms proposed in earlier work and two novel technical contributions: a generic filtering algorithm which automatically pushes ordering constraints into symmetric binary constraints with only a logarithmic overhead and an adaptation of symmetry-...

2002
M. E. Lesk

Lex helps write programs whose control flow is directed by instances of regular expressions in the input stream. It is well suited for editor-script type transformations and for segmenting input in preparation for a parsing routine. Lex source is a table of regular expressions and corresponding program fragments. The table is translated to a program which reads an input stream, copying it to an...

2008
Orr Dunkelman Nathan Keller

In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...

2006
Hongjun Wu Bart Preneel

WG and LEX are two stream ciphers submitted to eStream – the ECRYPT stream cipher project. In this paper, we point out security flaws in the resynchronization of these two ciphers. The resynchronization of WG is vulnerable to a differential attack. For WG with 80-bit key and 80-bit IV, 48 bits of the secret key can be recovered with about 2 chosen IVs . For each chosen IV, only the first four k...

2011
Clifton James McFate Kenneth D. Forbus

Broad coverage lexicons for the English language have traditionally been handmade. This approach, while accurate, requires too much human labor. Furthermore, resources contain gaps in coverage, contain specific types of information, or are incompatible with other resources. We believe that the state of open-license technology is such that a comprehensive syntactic lexicon can be automatically c...

دکتر فرهاد ایرانپور

حدود اختیارات مدیران شرکت های سهامی مشمول قانون متبوع شرکت(Lex societatis) می باشد. وانگهی اگر چه این اصل صلاحیت خارج سرزمینی قانون متبوع شرکت مورد قبول قرار می گیرد؛ در عمل دامنة عمل آن به جهت حمایت از حقوق اشخاص ثالث ناآگاه از محدودیت اختیارات مدیران‘ مختص به مواردی می شود که مربوط به روابط داخلی شرکت است. این تحدید دامنة اثر قانون خارجی ( قانون متبوع شرکت) از طریق اعمال قواعد سنتی تعارض قوان...

2017
Bradley T Elliott Peter Herbert Nicholas Sculthorpe Fergal M Grace Daniel Stratton Lawrence D Hayes

Lifelong exercise is associated with regulation of skeletal mass and function, reductions in frailty, and successful aging. Yet, the influence of exercise on myostatin and myostatin-interacting factors is relatively under examined in older males. Therefore, we investigated whether serum total myostatin, free myostatin, follistatin, and growth and differentiation factor 11 (GDF11) were altered f...

2010
Jianyong Huang Willy Susilo Jennifer Seberry

LEX is a stream cipher based on the round transformation of the AES block cipher, and it was selected for the final phase evaluation of the eSTREAM project. LEX is 2.5 times faster than AES both in software and in hardware. In this paper, we present a differential fault attack on LEX. The fault model assumes that the attacker is able to flip a random bit of the internal state of the cipher but ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید