>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到turning相关记录88条 . 查询时间(0.061 秒)
Kirigami takes pop-up books to a whole new level. The Japanese paper craft involves cutting patterns in paper to transform a two-dimensional sheet into an intricate, three-dimensional structure when p...
Chemist Peter Psarras has good reason to call himself a musical rock star—after all, he plays bass and keyboard semi-professionally—but he’s more likely to claim “rock” stardom of the geological bent....
High-density polyethylene (HDPE) waste was successfully feedstock recycled, and the obtained chemicals were utilized for synthesis of plasticizers for polylactide (PLA). First, an effective route to r...
Since the late 1990s, Lake Erie has been plagued with blooms of toxic algae that turn its waters a bright blue-green. These harmful algae blooms are made up of cyanobacteria that produce the liver tox...
We explore large-scale fault-tolerant multiparty computation on a minimal communication graph. Our goal is to be able to privately aggregate data from thousands of users - for example, in order to obt...
Across North America, streams and rivers are becoming saltier, thanks to road deicers, fertilizers and other salty compounds that humans indirectly release into waterways. At the same time, freshwater...
This paper studies ways to backdoor lattice-based systems following Young and Yung's work on backdooring RSA and discrete-log based systems. For the NTRU encryption scheme we show how to build a backd...
Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking...
Man-in-the-middle attacks in TLS due to compromised CAs have been mitigated by log-based PKI enhancements such as Certificate Transparency. However, these log-based schemes do not offer sufficient inc...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed, length preserving function which outputs ciphertext blocks as soon as the ...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed, length preserving function which outputs ciphertext blocks as soon as the ...
In 'Turning Online Ciphers Off', a class of constructions was defined based on layers of secure online ciphers interleaved with simple mixing layers (like reversing and block-shifting). Here we show t...
A devastating earthquake was predicted to hit Rome on May 11, 2011. This prediction was never officially released, but it grew on the internet and was amplified by the media. It was erroneously ascrib...
Conditional Cash Transfers (CCTs) have been shown to increase human capital investments, but their standard features make them expensive. We use a large randomized experiment in Morocco to estimate a...
The primary purpose of this research was to compare the impact characteristics of Taekwondo (TKD) and Yongmudo (YMD) player’s turning kick according to the target height. 5 highly skilled YMD and 5 TK...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...