>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Automated相关记录338条 . 查询时间(0.077 秒)
Precise coastal shoreline mapping is essential for monitoring changes in erosion rates, surface hydrology, and ecosystem structure and function. Monitoring water bodies in the Arctic National Wildlife...
本研究在sGK9708×0-153、LMY22×LY343、鲁绵研28×新陆早24等多个重组自交系群体中通过综合考评表型变异和共有置信区间筛选主效QTL,结果表明在A04、A07、A08和D08染色体上存在重要的纤维品质相关QTL。其中,通过SGK9708×0-153群体的转录组数据在纤维长度和强度QTL中分别检测到50和48个候选基因。这些基因的共表达网络模块在多个RIL群体中的基因对之间表现出...
In side-channel analysis attacks, on-die localized EM monitoring enable high bandwidth measurements of only a relevant part of the Integrated Circuit (IC). This can lead to improved attacks compared t...
The standard definition of security for digital signatures---existential unforgeability---does not ensure certain properties that protocol designers might expect. For example, in many modern signature...
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
We study protocols that rely on a public ledger infrastructure, concentrating on protocols for zero-knowledge contingent payment, whose security properties combine diverse notions of fairness and priv...
Automated identification of high-level structures in unorganized point cloud of indoor spaces Indoor space is an important aspect of scene analysis that provides essential information for many applica...
Image based-modeling practices in the field of Cultural Heritage studies are nowadays no longer seen as one-shot applications but as various and complex multimodal scenarios. Current use of SFM and ph...
We present an approach and a tool to answer the need for effective, generic and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so t...
Cemeteries are being considered as a symbol of love, religion, and culture across the globe. The maps of cemetery and grave are the interest of individuals and communities, who wants to identify the r...
This work studies the problem of automatically penalizing intentional or unintentional data breach (APDB) by a receiver/custodian receiving confidential data from a sender. We solve this problem by au...
For the past 10 years, the Philippines has seen and experienced the growing force of different natural disasters and because of this the Philippine governement started an initiative to use LiDAR techn...
In this paper a method of detecting buildings in dense populated city areas using a three-dimensional model, produced by aerial images, is described. Further to the detection of the outline of the bui...
The Noise Protocol Framework, introduced recently, allows for the design and construction of secure channel protocols by describing them through a simple, restricted language from which complex key de...
This work proposes the first fine-grained configurable cell array specifically tailored for cryptographic implementations. The proposed architecture can be added to future FPGAs as an application-spec...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...