>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到update相关记录167条 . 查询时间(0.076 秒)
One year ago today, researchers at Lawrence Livermore National Laboratory achieved a record shot at the National Ignition Facility (NIF) that set the world talking about the potential of fusion energy...
Asked to name his favorite tree, Paul W. Meyer, the former director of Penn’s Morris Arboretum, likens the task to “asking a parent to name their favorite child.”
2021年7月8日,南京农业大学动物科技学院孙少琛教授团队在生殖生物学科顶级学术期刊《Human Reproduction Update》(5年影响因子18.96,学科排名1/83)在线发表了题为The multiple roles of RAB GTPases in female and male meiosis的综述论文,全面概括和阐述了小G蛋白(单体GTP酶)RAB家族对卵母细胞成熟以及精子...
Update on African qualifiers for FIFA World Cup Qatar 2022™     FIFA World Cup Qatar 2022  postpone       font style='font-size:12px;'> 2021/5/27
FIFA can confirm that in conjunction with CAF and taking into consideration the current disruption caused by the COVID-19 pandemic and the need to ensure optimal playing conditions for all teams, it h...
The National Science Foundation (NSF) joins other federal agency partners in announcing the release of the 2019 Update to the National Artificial Intelligence (AI) Research and Development (R&D) Strat...
西安电子科技大学数据库系统课件3.4 数据更新INSERT与UPDATE
Securing Update Propagation with Homomorphic Hashing     Homomorphic Hashing  Folly open-source library       font style='font-size:12px;'> 2019/3/4
In database replication, ensuring consistency when propagating updates is a challenging and extensively studied problem. However, the problem of securing update propagation against malicious adversari...
Using the Cloud to Determine Key Strengths -- Triennial Update     key lengths  cloud computing       font style='font-size:12px;'> 2019/1/2
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the most common cryptograph...
Following up mass surveillance and privacy issues, modern secure communication protocols now seek for more security such as forward secrecy and post-compromise security. They cannot rely on any assump...
In this paper a method of detecting buildings in dense populated city areas using a three-dimensional model, produced by aerial images, is described. Further to the detection of the outline of the bui...
Message-locked encryption (MLE) (formalized by Bellare, Keelveedhi and Ristenpart, 2013) is an important cryptographic primitive that supports deduplication in the cloud. Updatable block-level message...
Hand-held 3D scanning systems are increasingly available on the market from several system manufacturers. These systems are deployed for 3D recording of objects with different size in diverse applicat...
The state of the art of 3D surveying technologies, if correctly applied, allows to obtain 3D coloured models of large open pit mines using different technologies as terrestrial laser scanner (TLS), wi...
Ability to query and update over encrypted data is an essential feature to enable breach-resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have demonstrated the import...
为进一步拓展我国生殖医学相关工作者的国际视角,传播新技术、促进新理念、激发新灵感,2018 年 1 月 21 日,《人类生殖医学前沿》(Human Reproduction Update IF=11.748)中文版创刊启动会在北京举行。北京大学第三医院院长、生殖医学中心主任、中国工程院院士乔杰教授任中文版主编。中文版副主编、编委与版权引进方Medthink以及相关学术支持单位等共30余人共同出席会...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...