Advances in Cryptology - ASIACRYPT 2010
Rotational Rebound Attacks on Reduced Skein. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Constant-Size Commitments to Polynomials and Applications.
Подобные документы
Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.
статья, добавлен 14.01.2017The characteristics and features of the method for assessing the changes of health system with multiple levels of efficiency, depending on the state change of its elements. The essence, the specificity of logical differential calculus, multivalue logic.
статья, добавлен 28.02.2016JavaScript as a prototype-based scripting language programming. JavaScript as a language for embedded software applications access to objects. Use of browsers as a scripting language to make interactive Web pages. Key architectural features JavaScript.
книга, добавлен 14.03.2014Характеристика языка программирования Visual Basic for Applications и определение вычислительных возможностей Excel. Создание диалогового окна вычисления амортизации оборудования, принципы обработки информации и особенности интерфейса программы.
статья, добавлен 11.10.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012Рассмотрение алгоритма действий в Visual Basic for Applications. Определение входных, выходных и промежуточных параметров функции в программе. Составление матрицы зависимостей переменных. Отладка задачи выполнялась с использованием вычислений в Excel.
лабораторная работа, добавлен 24.05.2015Introduction to Blind Signal Processing: Problems and Applications. Iterative Algorithms with Non-negativity Constraints. Basic Properties of PCA. Extraction of Principal Components. SOS Blind Identification Based on EVD. Computer Simulation Experiments.
книга, добавлен 25.11.2013Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.
книга, добавлен 08.03.2014Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.
статья, добавлен 12.02.2019Правила синтаксиса Visual Basic For Applications (VBA). Организация взаимодействия с пользователем. Работа с числовыми значениями, датой и временем. Переменные и типы данных. Встроенные функции языка VBA. Операторы условного и безусловного перехода.
курс лекций, добавлен 25.10.2015Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.
дипломная работа, добавлен 02.05.2015The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
статья, добавлен 23.02.2016An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.
дипломная работа, добавлен 10.12.2019The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
дипломная работа, добавлен 13.07.2020Особливості розробки програми мовою програмування VBA (Visual Basic for Applications) для теплового розрахунку горизонтального неізольованого електричного проводу. Аналіз методики розрахунку, блок-схема алгоритму програми, таблиця ідентифікаторів.
курсовая работа, добавлен 29.07.2017The basic tendencies of development of mobile marketing in Ukraine are considered. The development of Internet marketing. The advantages of hybrid mobile applications, the essence of their use, as one of the modern means of communication for business.
статья, добавлен 10.10.2018Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
презентация, добавлен 28.12.2013Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014Застосування засобу програмування Visual Basic for Applications при формуванні інформаційної компетентності у майбутніх учителів інформатики. Аналіз понять компетентності та інформаційної компетентності, що застосовуються в педагогічних дослідженнях.
статья, добавлен 17.08.2017Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.
дипломная работа, добавлен 27.08.2016Порівняльна характеристика Word 2010 та Word 2003. Опис методики вивчення однієї з прикладних програм загального призначення – текстового редактора Word 2010 та викладення даної теми в шкільному курсі інформатики. Класифiкацiя систем обробки текстiв.
курсовая работа, добавлен 06.05.2015Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
статья, добавлен 28.08.2016Bioinformatics Versus Other Disciplines. Further Developments: from Linear Information to Multidimensional Structure Organization. Probability-Generating Functions and Characteristic Functions. Transition Probability Matrix and State Transition Graph.
учебное пособие, добавлен 25.11.2013