نتایج جستجو برای: jan aushadhi scheme jas

تعداد نتایج: 235322  

Journal: :TBC 2002
Shueng-Han Gary Chan S.-H. Ivan Yeung

In traditional near-VOD (NVOD), the number of streams required is high if the user delay goal is low (say, 2 minutes). In this paper, we study the use of client buffering to reduce such bandwidth requirement. We first study a scheme based on streaming approach termed “join-and-stream” (JAS), which broadcasts a movie in a staggered manner and uses short unicast streams to recover the time differ...

Journal: :Inf. Process. Lett. 2004
Guilin Wang

A group signature scheme allows any group member to sign messages on behalf of the group in an anonymous and unlinkable fashion. In the event of a dispute, a designated group manager can reveal the identity of the signer. In 1999, Tseng and Jan proposed a group signature scheme using self-certified public keys. By attacking their signature verification equation, we demonstrate that their scheme...

2005
Jonathan P. Pearce Rajiv T. Maheswaran Milind Tambe

In multi-agent systems where sets of joint actions (JAs) are generated, tools are needed to evaluate these sets and efficiently allocate resources for the many JAs. To address evaluation, we introduce k-optimality as a metric that captures desirable properties of diversity and relative quality. Our main contribution is a method to utilize local interaction structure to obtain bounds on cardinal...

Journal: :The Plant cell 2002
John G Turner Christine Ellis Alessandra Devoto

Plant responses to many biotic and abiotic stresses are orchestrated locally and systemically by signaling molecules known as the jasmonates (JAs). JAs also regulate such diverse processes as pollen maturation and wound responses in Arabidopsis. Here we review recent advances in our understanding of how JA biosynthesis is regulated, the signaling functions of different JAs, and how the JA signa...

Journal: :Computer Standards & Interfaces 2004
Chao-Liang Liu Gwoboa Horng Hsin-Yu Liu

In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks. key words: cryptanalysis, user identification, ID-based cryptosystem, wi...

2002
Richard Markeloff

A new package has been developed to provide classes for identifying and analyzing muons in simulated LCD events using Java Analysis Studio. The classes in the package are described. Sample code for performing a JAS LCD muon analysis is presented.

2008
W. Jung J. S. Bethel

From the last decade, commercial vendors have introduced airborne three line scanners; for example ADS40, TLS, JAS, DAS-1, 3OC and etc. While ADS40, TLS and JAS placed CCD arrays on the focal plane in a single optical system, the 3-DAS-1 and 3-OC use three optical apertures but rigidly fixed to each other. For this reason, we need to develop a photogrammetric model for three different cameras b...

Journal: :JOURNAL OF THE BREWING SOCIETY OF JAPAN 1991

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید