Sökresultat

Filtyp

Din sökning på "Fc coins Buyfc26coins.com is EA Sports official for FC 26 coins The service is affordable and quick..hl9L" gav 83652 sökträffar

Revisiting the Concrete Security of Goldreich's Pseudorandom Generator

Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad applications in theoretical cryptography. Following Couteau et al.’s work at ASIACRYPT 2018, this paper further studies the concrete security of one important class of local pseudorandom generators, i.e., Goldreich’s pseudorandom generators. Our first attack is of the guess-and

Learning-Based UE Classification in Millimeter-Wave Cellular Systems With Mobility

Millimeter-wave cellular communication requires beamforming procedures that enable alignment of the transmitter and receiver beams as the user equipment (UE) moves. For efficient beam tracking it is advantageous to classify users according to their traffic and mobility patterns. Research to date has demonstrated efficient ways of machine learning based UE classification. Although different machine

Minimal solvers for indoor UAV positioning

In this paper we consider a collection of relative pose problems which arise naturally in applications for visual indoor navigation using unmanned aerial vehicles (UAVs). We focus on cases where additional information from an onboard IMU is available and thus provides a partial extrinsic calibration through the gravitational vector. The solvers are designed for a partially calibrated camera, for a

Coded-BKW with Sieving

The Learning with Errors problem (LWE) has become a central topic in recent cryptographic research. In this paper, we present a new solving algorithm combining important ideas from previous work on improving the BKW algorithm and ideas from sieving in lattices. The new algorithm is analyzed and demonstrates an improved asymptotic performance. For Regev parameters q = n^2 and noise level \sigma = n

Evaluating Security of Software Through Vulnerability Metrics

Understanding and measuring security of softwarein terms of vulnerability metrics is important when reviewingand deciding between softwares. The large number of disclosedvulnerabilities will continue to expose software intensivesystems and products to attacks, and the choice of thirdparty software will affect stability and reliability of productsincorporating this software. We collect CVE data fro

Group affiliation detection in a challenging environment

Social interaction sensing and indoor positioning using are widely researched. However, many use cases only need to determine proximity, and not the exact location. In this paper, we describe two methods to determine which meeting each user is participating in using proximity data collected from a challenging real-world office.We show that the RSSI threshold approach to detecting proximity is not

Eliminating time dispersion from visco-elastic simulations with memory variables

In recent years, it has been recognized that the seismic wave equation solved with a finite-difference method in time causes a predictable and removable error through the use of so-called time-dispersion transforms. These transforms were thought not to apply to visco-elastic media. However, in this paper we demonstrate that the time-dispersion transforms remain applicable when the visco-elastic wa

Multi-source acquisition based on the principles of signal apparition

Signal apparition is a recent signal processing advance that has numerous applications in seismic data acquisition and processing. In this paper we review the basic principles of signal apparition and discuss applications related to simultaneous source acquisition. We discuss the generalization of the technique to large number of sources and the application in a full 3D configuration enabling larg

Deficiencies in healthcare prior to suicide and actions to deal with them : A retrospective study of investigations after suicide in Swedish healthcare

Objectives The overall aim of this study was to aggregate the conclusions of all investigations conducted after suicides reported to the supervisory authority in Sweden in 2015, and to identify deficiencies in healthcare found in these investigations; the actions proposed to deal with the deficiencies; the level of the organisational hierarchy (micro-meso-macro) in which the deficiencies and actio

Stability of signal apparition

The recently introduced method of `signal apparition' offers a fundamentally different approach to separation of multiple interfering sources, by using a periodic sequence of source signatures along one source line. This leads to exact separation of signals in diamond-shaped regions of the frequency-wavenumber domain which are twice as large compared to those recovered by other methods. In this pa

Time to peak effect of aspirin-induced platelet inhibition and ex vivo effects of desmopressin: An observational study

Objective: To investigate time to maximal platelet inhibition after an oral loading dose of ASA. The effect of ex vivo reversal platelet inhibition by desmopressin (DDAVP) was also studied. Methods: Ten healthy volunteers were given a 300 mg ASA-tablet. Blood was sampled at 0, 15, 30, 60, 120 and 180 minutes. DDAVP was added to the samples taken at 120 minutes. Samples were analysed with a Multi

An agent-based model of the local spread of SARS-CoV-2 : Modeling study

Background: The spread of SARS-CoV-2, originating in Wuhan, China, was classified as a pandemic by the World Health Organization on March 11, 2020. The governments of affected countries have implemented various measures to limit the spread of the virus. The starting point of this paper is the different government approaches, in terms of promulgating new legislative regulations to limit the virus d

3D Human Pose and Shape Estimation Through Collaborative Learning and Multi-View Model-Fitting

3D human pose and shape estimation plays a vital role in many computer vision applications. There are many deep learning based methods attempting to solve the problem only relying on single-view RGB images for training the network. However, since some public datasets are captured from multi-view cameras system, we propose a novel method to tackle the problem by putting optimization-based multi-vie

On-demand Key Distribution for Cloud Networks

Emerging fine-grained cloud resource billing creates incentives to review the software execution footprint in virtual environments. Operators can use novel virtual execution environments with ever lower overhead: from virtual machines to containers, to unikernels and serverless functions. However, the execution footprint of security mechanisms in virtualized deployments has either remained the sam

Flowrider: Fast On-Demand Key Provisioning for Cloud Networks

Increasingly fine-grained cloud billing creates incentives to review the software execution footprint in virtual environments. For example, virtual execution environments move towards lower overhead: from virtual machines to containers, unikernels, and serverless cloud computing. However, the execution footprint of security components in virtualized environments has either remained the same or eve