>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Weakness相关记录31条 . 查询时间(0.054 秒)
Concrete isn’t thought of as a plastic, but plasticity at small scales boosts concrete’s utility as the world’s most-used material by letting it constantly adjust to stress, decades and some...
It’s a paradox that has long vexed researchers in the field of optics.To control a light source, another light source that uses as much energy — if not more — is often required. The setup works, but i...
Researchers from Binghamton University—State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes...
Purpose: This study aimed to compare hip abductor muscle strength between individuals with symptomatic, unilateral gluteal tendinopathy (GT), and asymptomatic controls. Methods: Fifty individuals wit...
We found a statistical weakness in the Spritz algorithm designed by Ronald L. Rivest and Jacob C. N. Schuldt. For N = 8: P rob(output(x) = output(x + 2)) = 1/N + 0.000498. The bias becomes statistic...
Agency Implies Weakness of Will     autonomy  agency  will       2014/11/17
Notions of agency and of weakness of will clearly seem to be related to one another. This essay takes on a rather modest task in relation to current discussion of these topics; it seeks to establish t...
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
In 2013, Joux, and then Barbulescu, Gaudry, Joux and Thom\'{e}, presented new algorithms for computing discrete logarithms in finite fields of small and medium characteristic. We show that these new a...
In 2013, Joux and then Barbulsecu et al. presented new algorithms for computing discrete logarithms in finite fields of small characteristic. Shortly thereafter, Adj et al. presented a concrete analys...
What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The gene...
The article explains the lower relative rates of return that foreigners have earned on their U.S. investments, which might reflect optimal decisions in efficient capital markets. Estimates show that f...
With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention.
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing...
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s p...
Enriched weakness           2010/12/1
The basic notions of category theory, such as limit, adjunction, and orthogonality, all involve assertions of the existence and uniqueness of certain arrows. Weak notions arise when one drops the un...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...