نتایج جستجو برای: secret garden

تعداد نتایج: 27694  

Journal: مدیریت شهری 2015
Ferial Sadat Siadati, Seyyed Mostafa Mokhtabad Amrei,

The roof garden has great functioning of smoothing the shortage of land resource in the city and making use of the land resource diversity and efficiently. The modern era, following the fast development of economic and society, people have a high claim to green roof or roof garden. It is an efficient and reasonable way to exploit the open space the roof of the building. From the classic roof ...

2016
Simon Wacker

We prove the Garden of Eden theorem for cellular automata with finite set of states and finite neighbourhood on right amenable left homogeneous spaces with finite stabilisers. It states that the global transition function of such an automaton is surjective if and only if it is preinjective. Pre-Injectivity means that two global configurations that differ at most on a finite subset and have the ...

Journal: :CoRR 2016
Laurent Bartholdi

We prove a converse to Myhill’s “Garden-of-Eden” theorem and obtain in this manner a characterization of amenability in terms of cellular automata: A group G is amenable if and only if every cellular automaton with carrier G that has gardens of Eden also has mutually erasable patterns. This answers a question by Schupp, and solves a conjecture by CeccheriniSilberstein, Mach̀ı and Scarabotti.

2013
Cristina Díaz Moreno Efrén García

As previous years, Dip 5 will continue with the redefinition of what was formerly known as public space, trying to reactivate the physical realm of the common, nowadays kidnapped by economic and political agents. The origin of the word paradise gets back to ancient Persia, and to the Avestian term pairi-daêza, composed by pairi, "around" and diz "to construct", literally enclosed space, that wa...

Journal: :IACR Cryptology ePrint Archive 2005
Ivan Damgård Matthias Fitzi Jesper Buus Nielsen Tomas Toft

We show that if a set of players hold shares of a value a ∈ Zp for some prime p (where the set of shares is written [a]p), it is possible to compute, in constant round and with unconditional security, sharings of the bits of a, i.e. compute sharings [a0]p, . . . , [a`−1]p such that ` = dlog 2 (p)e, a0, . . . , a`−1 ∈ {0, 1} and a = ∑`−1 i=0 ai2 . Our protocol is secure against active adversarie...

A. Cheraghi , M. Hadian Dehkordi ,

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

خان‌محمدی, نیره,

Vegetation is the important part of a historical garden so that, by destroying it, it's impossible to call the historical site a "Garden". In Persian gardens, the plants have special importance, since in many references the methods of planting in garden are specifically described. Whereas garden's vegetation is a mortal element and its replacement and restoration is not easily possible, so docu...

2014
Tomoko Adachi

2-level shared secret schemes are defined by Simmons in 1989. In this paper, we describe a survey of 2-level secret sharing schemes using finite geometry.

Journal: :ACM Transactions on Architecture and Code Optimization 2015

Journal: :JDIM 2012
Yi-Hui Chen Chin-Chen Chang

Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir’s s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید