>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Perspective相关记录710条 . 查询时间(0.062 秒)
Drought stress commonly happens more than once during the life cycle of perennial trees. Stress memory endows better capacity to cope with repeated stresses for plants, while the underlying mechanisms...
A literature review on ultrathin films of cellulose is presented. The review focuses on different deposition methods of the films-all the way from simple monocomponent films to more elaborate multicom...
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel wit...
Inspired by Maurer's universal zero knowledge (UZK) abstract perspective and building on legally fair contract signing protocols without keystones, we propose and analyze the security of the first UZK...
A new proof is given for the correctness of the powers of two descent method for computing discrete logarithms. The result is slightly stronger than the original work, but more importantly we provide ...
Objective. To take a systematic approach to exploring patient safety teaching in health care curricula, particularly in relation to how educators ensure students achieve patient safety competencies. ...
Social media is rapidly emerging as a potential resource of information capable to support natural disasters management. Despite the growing research interest focused on using social media during natu...
Social media is rapidly emerging as a potential resource of information capable to support natural disasters management. Despite the growing research interest focused on using social media during natu...
Signcryption is a public-key cryptographic primitive, originally introduced by Zheng (Crypto '97), that allows parties to establish secure communication without the need of prior key agreement. Instea...
The cybercrime and cyber terrorism raging today are the most visible symptoms of a more pervasive problem concerning cyber security. How to establish a fair and just governance regime in cyberspace an...
This chapter describes Peter L. Montgomery's modular multiplication method and the various improvements to reduce the latency for software implementations on devices which have access to many computat...
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among ...
We introduce a prototypical methodological framework for a place-based GIS-RS system for the spatial delineation of place while incorporating spatial analysis and mapping techniques using methods from...
Despite the enormous popularity of terrestrial laser scanners in the field of Geodesy, economic aspects in the context of data acquisition are mostly considered intuitively. In contrast to established...
Different applications or users need different abstraction of spatial models, dimensionalities and specification of their datasets due to variations of required analysis and output. Various approaches...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...