نتایج جستجو برای: technique step

تعداد نتایج: 852326  

2013
Anand Embar Thomas Witelski Guglielmo Scovazzi Xuanhe Zhao

Modeling Microdomain Evolution on Giant Unilamellar Vesicles using a Phase-Field Approach by Anand Embar Department of Civil and Environmental Engineering Duke University

2015
Soussan Djamasbi Siavash Mortazavi Mina Shojaeizadeh

Despite common belief, Baby Boomers form a sizable population of gamers. Paying attention to how this generation experiences a game can help companies that target this group of users increase their market share. To address this need, this study examines Baby Boomers’ reaction to a new way of manipulating objects in a game, namely with their eyes. In particular, the study focuses on testing the ...

This study redescribes an arthroscopic bridge technique for repair of avulsion of the posterior cruciate ligament. The procedure is performed step-to-step. In this technique we created two bone tunnels in the anterior aspect of the tibia and inferior medial of the tibia tuberosity and then create suture fixation of the fragment using the suture bridge. The arthroscopic bridge technique was used...

2006
Wung-Hong Huang

We analyze the energy and angular momenta of the two-spin spiky string moving on the AdS3×S with NS-NS field. Due to the infinite boundary of the AdS spacetime the solution will extend to infinity and it appears the divergences. After adding the counter terms we then obtain the dispersion relation of the corresponding giant magnon and see how the background field produces the correction terms. ...

Journal: :IACR Cryptology ePrint Archive 2011
Mario Romsy

In [BKT11] Baba, Kotyada and Teja introduced the FACTOR problem over non-abelian groups as base of an ElGamal-like cryptosystem. They conjectured that there is no better method than the naive one to solve the FACTOR problem in a general group. Shortly afterwards Stanek published an extension of the baby-step giant-step algorithm disproving this conjecture [Sta11]. Since baby-step giant-step met...

2007
David Gurzick A. Ozok Barbara Morris

A survey was conducted on 210 Baby Boomers (Age mean = 51.4 Std. dev. 5.46) within the United States to determine their current use of online technology in social interactions, their preferences in these interactions, and the expectations they have of near-future online communication technologies. The findings highlight the importance of online communication in their lives and spotlight their w...

2017
Anneke Horstman Mengfan Li Iris Heidmann Mieke Weemen Baojian Chen Jose M. Muino Gerco C. Angenent Kim Boutilier

Anneke Horstman, Mengfan Li, Iris Heidmann, Mieke Weemen, Baojian Chen, Jose M. Muino, Gerco C. Angenent, and Kim Boutilier Wageningen University and Research, Bioscience, 6708 PB Wageningen, The Netherlands Wageningen University and Research, Laboratory of Molecular Biology, 6708 PB Wageningen, The Netherlands Enza Zaden Research and Development, 1602 DB Enkhuizen, The Netherlands Max Planck I...

2006
Nelia Mann Samuel E. Vázquez

We present a simple procedure to construct non-local conserved charges for classical open strings on coset spaces. This is done by including suitable reflection matrices on the classical transfer matrix. The reflection matrices must obey certain conditions for the charges to be conserved and in involution. We then study bosonic open strings on AdS5×S. We consider boundary conditions correspondi...

2010
Hassan Jameel Asghar Josef Pieprzyk Huaxiong Wang

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giantstep algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید