搜索结果: 1-15 共查到“知识库 limited”相关记录223条 . 查询时间(0.075 秒)
Response of Four Tree Species to Changing Climate in a Moisture-Limited Area of South Siberia
climate–growth relationships climate change drought stress Scots pine Siberian elm Siberian larch silver birch tree rings Vaganov–Shashkin model
font style='font-size:12px;'>
2024/2/27
The response of vegetation to climate change is of special interest in regions where rapid warming is coupled with moisture deficit. This raises the question of the limits in plants’ acclimation abili...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
font style='font-size:12px;'>
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Encrypting plaintexts CRYPTO
font style='font-size:12px;'>
2018/6/5
Order-preserving encryption emerged as a key ingredient underlying the security of practical database management systems. Boldyreva et al. (EUROCRYPT '09) initiated the study of its security by introd...
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Symmetric-key cryptography message authentication code lightweight
font style='font-size:12px;'>
2018/4/17
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message int...
MESH-TO-BIM: FROM SEGMENTED MESH ELEMENTS TO BIM MODEL WITH LIMITED PARAMETERS
Architectural Heritage BIM Documentation Ruins Segmented elements Visual programming
font style='font-size:12px;'>
2018/6/5
Building Information Modelling (BIM) technique has been widely utilized in heritage documentation and comes to a general term Historical/Heritage BIM (HBIM). The current HBIM project mostly employs th...
Early speech development in Koolen de Vries syndrome limited by oral praxis and hypotonia
KANSL1 variant of social function tension speech language apraxia
font style='font-size:12px;'>
2018/3/5
KANSL1 variants, 25 with 17q21.31 microdeletion), aged 1.0–27.0 years were assessed for oral-motor, speech, language, literacy, and social functioning. Early history included hypotonia and feeding dif...
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage
Symmetric Encryption Searchable Encryption Lower Bound
font style='font-size:12px;'>
2017/11/27
We consider a recent security definition of Chenette, Lewi, Weis, and Wu for order-revealing encryption (ORE) and order-preserving encryption (OPE) (FSE 2016). Their definition says that the compariso...
GEOPACKAGE DATA FORMAT FOR COLLABORATIVEMAPPING OF GEOSPATIAL DATAIN LIMITED NETWORKENVIRONMENTS
CollaborativeMapping GeoPackage,Mobile GIS Field Data Collector
font style='font-size:12px;'>
2016/10/14
With the growth of technology in earth and space science informatics has led to the revolution in a wide range of geospatial practice. Nowadays collaborative mapping has become a new hot spot, followi...
Limited effect of refined carbohydrate dietary supplementation on colonization of the gastrointestinal tract of healthy subjects by Candida albicans
Candida albicans refined carbohydrate colonization
font style='font-size:12px;'>
2016/5/31
Infections due to Candida albicans occur readily
in situations in which ample glucose is available. In mice,
dietary refined carbohydrate supplementation leads to higher
rates of Candida growth in ...
Quantum limited measurement of magnetic field gradient with entangled atoms
Quantum limited measurement magnetic field gradient entangled atoms
font style='font-size:12px;'>
2016/1/23
We propose a method to detect the amplitude gradient of a microwave field by using a pair of entangled two-component Bose-Einstein condensates. We consider the two spatially separated condensates to b...
Optimizing the Limited Resources for More Efficiency in Teacher Development Programs
Limited Resources More Efficiency Teacher Development Programs
font style='font-size:12px;'>
2016/1/20
Optimizing the Limited Resources for More Efficiency in Teacher Development Programs.
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
Authenticated Key Exchange CK model Security Analysis
font style='font-size:12px;'>
2016/1/4
In this paper we focus on designing authenticated key exchange protocols for practical
scenarios where the party consists of a powerful but untrusted host (e.g., PC, mobile phone, etc)
and a power-l...
One Time Programs with Limited Memory
pseudorandom functions one-time device one-time program
font style='font-size:12px;'>
2016/1/3
We reinvestigate a notion of one-time programs introduced
in the CRYPTO 2008 paper by Goldwasser et al. A one-time program
is a device containing a program C, with the property that the program
C c...
Achieving Differential Privacy with Bias-Control Limited Source
differential privacy imperfect randomness Bias-Control Limited source
font style='font-size:12px;'>
2015/12/31
In the design of differentially private mechanisms, it’s usually
assumed that a uniformly random source is available. However, in many
situations it seems unrealistic, and one must deal with various...
Palmer Amaranth (Amaranthus palmeri) Damage Niche in Illinois Soybean Is Seed Limited
Common garden experiment, genetic and environmental variation geographic range expansion global change weed–crop interference
font style='font-size:12px;'>
2015/12/21
Palmer amaranth, a dioecious summer annual forb, originating in Sonoran desert washes, compromises crop yields in much of the southern United States and its range is expanding northward. Appropriate t...