Advances in Cryptology - ASIACRYPT 2010
Rotational Rebound Attacks on Reduced Skein. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Constant-Size Commitments to Polynomials and Applications.
Подобные документы
Computer facilities and microprocessor systems and data manipulation. Digital automata synthesis. Programming of Intel microprocessors, generic architecture. Construction principles of telecommunications nodes. Initialization of purpose registers.
?????????, добавлен 11.10.2014???????? ???????????, ??????????? ?? ???????? ??????? ?????????? ????????? Microsoft Word 2010. ??????????? ????????, ???? ???????? ?? ???????. ?????? ???????????? ???? ????????? ? Microsoft Word. ?????????????? ???????? ???????? ????????? ??????.
???????? ??????, добавлен 14.10.2014??????????? ?????????? ?????????? ?????????????? ???????????? ?????????????? ? ????? ???????????? ?? ???????? ????????????? ??????? Microsoft Sharepoint 2010. ???????? ???????????? ??????? ??????????, ?? ???????????? ? ??????????? ?? ????????? ???????.
??????, добавлен 30.07.2016Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
?????, добавлен 04.10.2014The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.
????????? ??????, добавлен 31.10.2016???????? ??????? ?????????? ??? ????????????? ? ??????? ???????? ? ???????????? ??????? ? ????????? ????. ????????????? ? ????????? ??????? ? ??????? ??????? Microsoft Project 2010. ?????????? ???????? ? ?????????? ?????????? ? ????????? ???????????.
???????????? ??????, добавлен 21.04.2021?????? ??????????? ??????? ?????, ????? ??????????? ? ??????????? ??????? ??? ??????????? ??????????? ?????? ?????. ???????????? Generic Routing Encapsulation, Point-to-Point Tunneling Protocol, ipSecurity. ????? ?????????? ??? ??????????? ??????.
????????? ??????, добавлен 19.06.2017- 108. Quantum information
Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
?????, добавлен 08.03.2014 The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
??????, добавлен 08.02.2013Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
??????? ???????, добавлен 25.11.2013The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.
??????, добавлен 23.06.2016- 112. ????????? ????????
??????? ???????? ?????? ?????. ????????????? ????? ??????? ??????????. ???????? ??? - ????????? ????????????????? ??????????? (Digital Differential Analyzer). ????? ?????????? ? ??????????? ???????. ???????? ??????????. ?????????? ????????????? ?????????.
???????????, добавлен 26.07.2013 The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.
??????, добавлен 23.02.2016The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
??????, добавлен 22.02.2023A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.
??????, добавлен 20.01.2017The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
??????, добавлен 22.12.2016???????? ???????? POINT, RECT ? SIZE ??? ????????????? ? MFC ? ??????????? ??????? ? ???????? ?????????? ???? ? ????????? ?????????? ?? ??????. ????????-??????????????? ???????? ?????? ???? ????????: ?????? CPoint, CRect ? CSize, ?? ??????? ? ?????????.
??????, добавлен 14.03.2014The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.
??????, добавлен 22.08.2021- 119. Study of two 3D face representation algorithms using range image and curvature-based representations
The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.
??????, добавлен 23.06.2016 Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
???????????, добавлен 28.12.2013Bits and Bytes. Complementation or Bitwise NOT. Special Operations and Abbreviations. Booleans and BitFields. Conversion of Integral Types to Byte Arrays. Symmetric Block Ciphers. Rijndael and the Advanced Encryption Standard. Public Key Cryptography.
?????, добавлен 08.03.2014?????????? ???????????? ????????. ??????????? ??????????? ??????????? ?????????. ???????? ?????????????????? ?????????????? ??????, ?????????? ?? ?????????? ??? ??????. ?????????????? ? ???????????????? ?????????? ?????????? Visual Basic for Applications.
????????? ??????, добавлен 23.05.2016- 123. Cache Memory
Memory Hierarchy. Internal or Main memory. Time between presenting the address and getting the valid data. Physical arrangement of bits into words. Cache Read Operation. Typical Cache Organization. Comparison of Cache Sizes. Direct Mapping Cache.
???????????, добавлен 03.06.2012 ??????????? ????? ?????????? ???????? ?????? ? ??????. ????????? ?????? Constant Block, Fcn Block, Mux Block ? ??. ??????????? ?????????? ???????????? ???? ? ???? ? ?????????. ????????????? ??????? ???????????, ??????????? ? ????????????? ??????????.
???????? ??????, добавлен 08.04.2016- 125. ?????????? Microsoft
???????????? ??????? ???????? ? ???????? ?????????? Microsoft - ???????? ?????? ? ???????????? ???????????? ??????????? ? ?????????? ????????-??????????, ?????? ?????????? ???????????? ?????? Windows. ?????? ???????????? ???????? Net Applications.
???????, добавлен 27.01.2011