派博傳思國(guó)際中心

標(biāo)題: Titlebook: Visual Heritage in the Digital Age; Eugene Ch‘ng,Vincent Gaffney,Henry Chapman Book 2013 Springer-Verlag London 2013 Computational Archael [打印本頁(yè)]

作者: decoction    時(shí)間: 2025-3-21 16:31
書(shū)目名稱Visual Heritage in the Digital Age影響因子(影響力)




書(shū)目名稱Visual Heritage in the Digital Age影響因子(影響力)學(xué)科排名




書(shū)目名稱Visual Heritage in the Digital Age網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Visual Heritage in the Digital Age網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Visual Heritage in the Digital Age被引頻次




書(shū)目名稱Visual Heritage in the Digital Age被引頻次學(xué)科排名




書(shū)目名稱Visual Heritage in the Digital Age年度引用




書(shū)目名稱Visual Heritage in the Digital Age年度引用學(xué)科排名




書(shū)目名稱Visual Heritage in the Digital Age讀者反饋




書(shū)目名稱Visual Heritage in the Digital Age讀者反饋學(xué)科排名





作者: inflame    時(shí)間: 2025-3-21 20:25

作者: 金絲雀    時(shí)間: 2025-3-22 03:20

作者: 寡頭政治    時(shí)間: 2025-3-22 08:08
Springer Series on Cultural Computinghttp://image.papertrans.cn/v/image/983730.jpg
作者: 季雨    時(shí)間: 2025-3-22 08:50

作者: 推測(cè)    時(shí)間: 2025-3-22 15:31
Eleanor Ramseyanalysis attack, against unprotected or protected devices and exploiting profiled or non-profiled leakage models. Then, we provide various experiments to quantify these improvements. Finally, we discuss the optimality of our strategy and its implications for the security evaluation of leakage-resilient cryptographic hardware.
作者: Filibuster    時(shí)間: 2025-3-22 18:17
Simon Fitchonstruction, we deviate from the usual approach of embedding a certificate chain in the credential. Instead, we introduce a novel approach for which we identify a new primitive we call . (DMS) as the main ingredient. This primitive may be of independent interest. We also give a first instantiation of DMS with efficient protocols.
作者: Hemodialysis    時(shí)間: 2025-3-23 01:10

作者: Arthr-    時(shí)間: 2025-3-23 03:50

作者: languor    時(shí)間: 2025-3-23 09:33

作者: Bmd955    時(shí)間: 2025-3-23 11:58
Cettina Santagati,Mariateresa Galizia,Graziana D’Agostinoability of the Signal protocol. Our analysis shows that building a deniability proof for Signal is non-trivial and requires very strong assumptions on the underlying mathematical groups where the protocol is run.
作者: Polydipsia    時(shí)間: 2025-3-23 13:52

作者: Hypomania    時(shí)間: 2025-3-23 19:44
Visualising Space and Movement: A Multidisciplinary Approach to the Palace of Diocletian, Splitted results from the 3D laser scanning of the Mausoleum and its surroundings and GPR in the Peristyle of the Palace to make suggestions about the nature of that space and how it might have changed over time.
作者: 去世    時(shí)間: 2025-3-23 22:12
Reconstructing a Painful Past: A Non-Invasive Approach to Reconstructing Lager Norderney in Alderneyy that addresses all of the physical and cultural layers associated with this painful period of history, it has been possible to generate resources that mitigate against some of the issues surrounding the investigation of the site.
作者: 友好    時(shí)間: 2025-3-24 06:05

作者: Immunotherapy    時(shí)間: 2025-3-24 07:18
box tracing. Their schemes are based on multiple polynomials and our attack use a combination between different polynomials. The latter scheme can be broken by other attacks which use secret values of the key generation polynomial or use partial keys.
作者: 你敢命令    時(shí)間: 2025-3-24 12:37
?iga Kokalj,Peter Pehani,Helen Goodchild,Vincent Gaffney,Kri?tof O?tir, mobile attestation device that can be plugged into the attested device. We evaluated . on two real-world devices, namely a syringe pump and a drone. Our evaluation shows that . adds negligible performance overhead and prevents data-only attacks, by validating critical data in memory.
作者: Goblet-Cells    時(shí)間: 2025-3-24 15:25
AGTB algorithm) to recover the LSBs of secret keys from the noisy sequences. In this paper, we propose an error correction algorithm that, like the AGTB algorithm, focuses on only a single type of error. We evaluate our algorithm using numerical experiments that reveal that our algorithm achieves a higher recovery rate than the AGTB algorithm.
作者: AIL    時(shí)間: 2025-3-24 20:02

作者: 能量守恒    時(shí)間: 2025-3-25 00:48

作者: 減至最低    時(shí)間: 2025-3-25 04:38
A Theoretical Framework for Stigmergetic Reconstruction of Ancient Text using nature-inspired approaches and new mobile digitising technology. It covers groundwork done to date for supporting a full-scale stigmergy reconstruction of cuneiform tablets and provides hypothetical scenarios within a theoretical framework for testing ‘in the wild’.
作者: 按時(shí)間順序    時(shí)間: 2025-3-25 10:36
Situating Cultural Technologies Outdoors: Empathy in the Design of Mobile Interpretation of Rock Artitates empathy between users and designers, and allows the existing archaeological content, the public’s fascination with the ‘cryptic’ meaning of the rock art sites and the technological, environmental and personal situation of the user to be explored and to inspire technological development.
作者: rectum    時(shí)間: 2025-3-25 15:29

作者: Moderate    時(shí)間: 2025-3-25 18:08

作者: BILL    時(shí)間: 2025-3-25 23:26

作者: Inexorable    時(shí)間: 2025-3-26 00:09

作者: OASIS    時(shí)間: 2025-3-26 05:45
A Theoretical Framework for Stigmergetic Reconstruction of Ancient Textd and communicated using clay tablets for thousands of years across the entirety of the Ancient Near East. Remnants of the medium are now stored worldwide in many of collections and time required for the joining of the fragments using traditional methodologies means that the information recorded wit
作者: 走路左晃右晃    時(shí)間: 2025-3-26 10:04
Multi-Touch Tables for Exploring Heritage Content in Public Spaces access to collections. Designing applications for this type of environment where a wide variety of people can use the table raises unique interaction issues that need to be addressed. This chapter initially provides a detailed review of research studies that have investigated the impact of multi-to
作者: 小官    時(shí)間: 2025-3-26 14:03

作者: 種子    時(shí)間: 2025-3-26 17:17

作者: Gleason-score    時(shí)間: 2025-3-26 23:04
Urban Scrawl: Reconstructing Urban Landscapes Using Documentary Sourcesandscape under study to currently exist. For urban landscapes that are no longer extant, however, there is a large amount of data in a non-digital format that can potentially be mined to reconstruct in detail those areas which are now physically beyond the reach of archaeologists. This chapter aims
作者: HEAVY    時(shí)間: 2025-3-27 04:53
Crossing Borders: A Multi-Layer GIS Mapping Framework for the Cultural Management of the Mundo Maya tural management of the Mundo Maya region. The challenges of bringing together an extremely large dataset derived from a variety of sources and across five Central American countries were significant. Data of various quality and integrity were integrated and prepared for internet use. The final mapp
作者: 驚惶    時(shí)間: 2025-3-27 07:35
Situating Cultural Technologies Outdoors: Empathy in the Design of Mobile Interpretation of Rock Artcal approach adopted in the Rock art mobile project (RAMP) which addresses the challenge of designing and delivering mobile interpretation at three Neolithic and Early Bronze Age rock art areas in Northumberland, UK. RAMP proposes a departure from the more traditional design approaches of delivering
作者: Annotate    時(shí)間: 2025-3-27 13:21
Digital Reconstruction of Archaeological Sites and Monuments: Some Experiences in South-Eastern Sicin about cultural heritage. Among all the possible methods for acquiring data, those related to 3D laser scanners (Time of flight or structured light) stand out. By using these technologies it is possible to sample, in a short time and with great accuracy, millions of points from real world objects o
作者: fluffy    時(shí)間: 2025-3-27 15:43
Simulation and Visualisation of Agent Survival and Settlement Behaviours in the Hunter-Gatherer Color generating new knowledge in those areas that sparse information, acquired through traditional methods, does not allow researchers to make informed decisions about past behaviour. This is particularly important following the development of remote sensing technologies that, in marine environments, a
作者: 蜈蚣    時(shí)間: 2025-3-27 21:23

作者: 撫育    時(shí)間: 2025-3-28 01:59
Time and Tide: Modelling the Effects of Landscape Change on Population Support in the Southern Northe occupation of this landscape has remained poorly understood due to its inaccessibility. This chapter presents a first attempt to use digital technologies and modelling to understand the nature of the human occupation of these currently inaccessible landscapes and their associated demography. The m
作者: ABHOR    時(shí)間: 2025-3-28 06:04
“There’s an App For That”: Building Smartphone Applications to Improve the Ergonomics of Landscape Sw can these powerful, compact, user-friendly devices be used to improve an individual’s interpretation and understanding of a landscape? This chapter discusses the development and testing of a dedicated Smartphone application for Apple’s iOS, which allows users to explore archaeological information
作者: HEW    時(shí)間: 2025-3-28 08:11
Book 2013 in global society. .Visual. .Heritage in the Digital Age. presents the state-of-the-art in the application of digital technologies to heritage studies, with the chapters collectively demonstrating the ways in which current developments are liberating the study, conservation and management of the pa
作者: Feckless    時(shí)間: 2025-3-28 11:38

作者: 致敬    時(shí)間: 2025-3-28 14:52

作者: 兇殘    時(shí)間: 2025-3-28 22:33
nt black-box tracing against self-defensive pirates, where ., . are the total number of subscribers and the maximum number of colluders. After that, in 2006, they presented a hierarchical key assignment method to reduce the ciphertext size into 4.?+?5?+?log(./2.) by combining a complete binary tree
作者: Cryptic    時(shí)間: 2025-3-28 22:54

作者: 邪惡的你    時(shí)間: 2025-3-29 04:53

作者: Hamper    時(shí)間: 2025-3-29 07:47

作者: 鄙視    時(shí)間: 2025-3-29 12:52

作者: ALLEY    時(shí)間: 2025-3-29 16:31

作者: 褲子    時(shí)間: 2025-3-29 20:27

作者: HARP    時(shí)間: 2025-3-30 00:45
Caroline Sturdy Colls,Kevin Collsng a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be po
作者: Injunction    時(shí)間: 2025-3-30 07:44

作者: Charade    時(shí)間: 2025-3-30 09:32
?iga Kokalj,Peter Pehani,Helen Goodchild,Vincent Gaffney,Kri?tof O?tirputing components, or rely on strict timing constraints. In this paper, we present a novel remote attestation approach, called ., that tackles these practical limitations by leveraging DMA (direct memory access). Since DMA does not require CPU time, . even allows attestation of devices with real-tim
作者: 空洞    時(shí)間: 2025-3-30 14:11
Areti Galani,Aron Mazel,Deborah Maxwell,Kate Sharpethe middle state of a cipher and encrypt it twice under two smaller independent permutations. Thus, forkciphers produce two output blocks in one primitive call..Andreeva et al.?proposed ., a tweakable .-based forkcipher that splits the state after five out of ten rounds. While their authenticated en
作者: esoteric    時(shí)間: 2025-3-30 20:25
Cettina Santagati,Mariateresa Galizia,Graziana D’Agostinoplication, yet no formal proof has appeared in the literature. In this paper, we present what we believe is the first formal study of the offline deniability of the Signal protocol. Our analysis shows that building a deniability proof for Signal is non-trivial and requires very strong assumptions on
作者: 完成才能戰(zhàn)勝    時(shí)間: 2025-3-30 23:36
highly input-dependent behavior. Therefore, we must carefully implement the binary GCD used in cryptographic systems. However, it has been noted that the binary GCD algorithm implemented in OpenSSL 1.1.0-1.1.0h and 1.0.2b-1.0.2o is not secure. Aldaya et al. presented this vulnerability at CHES2019.
作者: 嬰兒    時(shí)間: 2025-3-31 01:20
Eugene Ch′ng,Vincent L. Gaffneyhas grown, so too has the tension between privacy and utility. Unfortunately, current techniques lean too much in favor of functional requirements over protecting the privacy of users. For example, the most prominent proposals for measuring the relative popularity of a website depend on the deployme
作者: 監(jiān)禁    時(shí)間: 2025-3-31 06:21
Philip Murgatroydvices and applications, attacks targeting them have gained popularity. Recent large-scale attacks such as Mirai and VPNFilter highlight the lack of comprehensive defenses for IoT devices. Existing security solutions are inadequate against skilled adversaries with sophisticated and stealthy attacks a
作者: 小說(shuō)    時(shí)間: 2025-3-31 11:08

作者: 思考    時(shí)間: 2025-3-31 14:45
Lawrence Shaw,Keith Challisenvironments while considering the instant changes in a communication group. However, with the ever-increasing number of connected devices, traditional DGKA protocols have performance challenges since each member in the group has to make several computationally intensive operations while verifying t
作者: Perennial長(zhǎng)期的    時(shí)間: 2025-3-31 19:59
nts improve the reliability of protection methods. Usage of ICT tools for communicating sensor measurement in power networks demands immunity and resiliency of the associated protection scheme against false data injection attack (FDIA). Immunity against malicious manipulation of sensor information i




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
绩溪县| 四川省| 门源| 弥勒县| 鄄城县| 乳山市| 卓尼县| 呼和浩特市| 寿光市| 铜鼓县| 德令哈市| 孟连| 五峰| 西安市| 顺义区| 藁城市| 长阳| 南丹县| 奉节县| 麻栗坡县| 高陵县| 鄂州市| 海林市| 五河县| 南召县| 灵宝市| 邳州市| 苏尼特左旗| 施秉县| 钟山县| 安平县| 安宁市| 诏安县| 昂仁县| 大余县| 浮山县| 商都县| 镇安县| 登封市| 天祝| 沽源县|