نتایج جستجو برای: opaque information
تعداد نتایج: 1159963 فیلتر نتایج به سال:
The response of the “perfect lens”, consisting of a slab of lossless material of thickness d with εs = μs = −1 at one frequency ω0 is investigated. It is shown that as time progresses the lens becomes increasingly opaque to any physical TM line dipole source located a distance d0 < d/2 from the lens and which has been turned on at time t = 0. Here a physical source is defined as one which suppl...
The pathogenic fungus Candida albicans can undergo phenotypic switching between two heritable states: white and opaque. This phenotypic plasticity facilitates its colonization in distinct host niches. The master regulator WOR1 is exclusively expressed in opaque phase cells. Positive feedback regulation by Wor1 on the WOR1 promoter is essential for opaque formation, however the underlying mechan...
KDLM is a model of information flow control for distributed programming languages, introducing a distributed notion of selective declassification. KDLM uses type-level notions of both principals and policies to model security policies incorporating access control and information flow control, with run-time representatives based on cryptographic keys. This article addresses the question of how t...
Neither arbitrary horses, nor intentional lions, nor generic unicorns are animals, and would-be assistents do not have to be assistents.2 In fact, one may well wonder just what sort of objects the paraphrases in (0') are supposed to be about. Given their dubious ontological status, an analysis of (0) that can do without them ought to be preferrable to one along the lines of (0') – ceteris parib...
Byzantine-fault-tolerant service protocols like Q/U and FaB Paxos that optimistically order requests can provide increased efficiency and fault scalability. However, these protocols require n ≥ 5b + 1 servers (where b is the maximum number of faults tolerated), owing to their use of opaque Byzantine quorum systems; this is 2b more servers than required by some non-optimistic protocols. In this ...
Code obfuscation and software watermarking are well known techniques designed to prevent the illegal reuse of software. Code obfuscation prevents malicious reverse engineering, while software watermarking protects code from piracy. An interesting class of algorithms for code obfuscation and software watermarking relies on the insertion of opaque predicates. It turns out that attackers based on ...
The human fungal pathogen Candida albicans undergoes white-opaque phenotypic switching, which enhances its adaptation to host niches. Switching is controlled by a transcriptional regulatory network of interlocking feedback loops acting on the transcription of WOR1, the master regulator of white-opaque switching, but regulation of the network on the translational level is not yet explored. Here,...
OF THE DISSERTATION New Techniques in Intelligent Information Filtering by Sofus Attila Macskassy Dissertation Director: Dr. Haym Hirsh Intelligent Information Filtering is the process of receiving or monitoring large amounts of dynamically generated information and extracting the subset of information that would be of interest to a user based on some specified information need. Historically, t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید