搜索结果: 1-15 共查到“Analyzing”相关记录175条 . 查询时间(0.062 秒)
Study analyzing cells' blueprints reveals new patterns in the global distribution and diversity of ocean microbes(图)
Study analyzing cells blueprints reveals new patterns global distribution diversity ocean microbes
2019/12/27
A single drop of seawater can contain a wide representation of ocean microbes from around the world -- revealing new insights into the ecology, evolution and biotechnology potential of the global micr...
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
EMV Universal Composability Security Models
2019/8/19
EMV, also known as Chip and PIN, is the world-wide standard for card-based electronic payment. Its security wavers: over the past years, researchers have demonstrated various practical attacks, rangin...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
maskVerif: a formal tool for analyzing software and hardware masked implementations
Glitches Masking Formal verification
2018/6/5
Masking is a popular countermeasure for protecting both hardware and software implementations against differential power analysis. A main strength of software masking is that its security guarantees c...
MONITORING AND ANALYZING THE GEOSPATIAL PATTERNS OF THE PEARL RIVER DELTA (PRD) FROM 1960 TO 2012
Geographical Spatial Patterns Coastal Environment Landuse Coastline
2018/5/15
The Geospatial Patterns Pearl River Delta (PRD), one of the most economically-important and fastest-growing regions in China, have changed remarkably and continuously during the past decades. In this ...
EARTHQUAKE BUILDING DAMAGE MAPPING BASED ON FEATURE ANALYZING METHOD FROM SYNTHETIC APERTURE RADAR DATA
Building Damage Assessment Earthquake Emergency Feature Analysing SAR
2018/5/11
Playing an important role in gathering information of social infrastructure damage, Synthetic Aperture Radar (SAR) remote sensing is a useful tool for monitoring earthquake disasters. With the wide ap...
ANALYZING THE VELOCITY OF VEGETATION PHENOLOGY OVER THE TIBETAN PLATEAU USING GIMMS NDVI3g DATA
Vegetation Phenology Velocity GIMMS NDVI Tibetan Plateau Climate Change
2018/5/17
Global environmental change is rapidly altering the dynamics of terrestrial vegetation, and phenology is a classic proxy to detect the response of vegetation to the changes. On the Tibetan Plateau, th...
A METADATA BASED APPROACH FOR ANALYZING UAV DATASETS FOR PHOTOGRAMMETRIC APPLICATIONS
UAV Metadata Filtration Photogrammetry
2018/6/4
This paper proposes a methodology for pre-processing and analysing Unmanned Aerial Vehicle (UAV) datasets before photogrammetric processing. In cases where images are gathered without a detailed fligh...
Analyzing vegetation dynamic trend on the Mongolian Plateau based on the Hurst exponent and influencing factors from 1982-2013
remote sensing GIMMS NDVI3g vegetation dynamic trend Hurst exponent residual trend analysis Mongolian Plateau
2018/4/9
This study analyzed the spatial and temporal variations in the Normalized Difference Vegetation Index (NDVI) on the Mongolian Plateau from 1982-2013 using Global Inventory Modeling and Mapping Studies...
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
Markov Decision Process Bitcoin game theory
2017/7/19
Bitcoin has not only attracted many users but also been considered as a technical breakthrough by academia. However, the expanding potential of Bitcoin is largely untapped due to its limited throughpu...
Analyzing magma temperatures may help get closer to forecasting volcanic eruptions
temperatures volcanic eruptions
2017/7/21
Although volcanic eruptions are often quite hazardous, scientists have been unable to pinpoint the processes leading up to major eruptions – and one important limitation has been a lack of knowledge a...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of security when used with many different keys, by many different users. Its significance lies in the ...
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Homomorphic Commitment non-homomorphic
2017/5/15
In this paper we present SplitCommit, a portable and efficient C++ implementation of the recent additively homomorphic commmitment scheme of Frederiksen et al. [FJNT16]. We describe numerous optimizat...
4D RECONSTRUCTION AND VISUALIZATION OF CULTURAL HERITAGE: ANALYZING OUR LEGACY THROUGH TIME
4D Modelling Cultural Heritage Data Fusion Monitoring Visualization
2017/4/7
Temporal analyses and multi-temporal 3D reconstruction are fundamental for the preservation and maintenance of all forms of Cultural Heritage (CH) and are the basis for decisions related to interventi...