>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 mind相关记录93条 . 查询时间(0.171 秒)
Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential to disrupt the foundation of e-commerce, Internet-of-Things (IoT), and smart cities. In the ...
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Introduction to the special issue 'The Effects of Literacy on Cognition and Brain Functioning'
Secure messaging apps have enjoyed huge uptake, and with the headline figure of one billion active WhatsApp users there has been a corresponding burst of academic research on the topic. One might ther...
Cryptographic implementations are vulnerable to side-channel analysis. Implementors often opt for masking countermeasures to protect against these types of attacks. Masking countermeasures can ensure ...
In this chapter, I consider two hypotheses that have informed recent work in experimental philosophy of mind. The first is a positive hypothesis put forward by Fiala, Arico, and Nichols (FAN): Categor...
A recent focus of Philip Kitcher’s research has been, somewhat surprisingly in the light of his earlier work, the philosophical analyses of literary works and operas. Some may see a discontinuity in K...
The ultimate goal of artificial intelligence (AI) research is to create a system with human level intelligence. Many researchers conceded that human-like interaction in a social context to be critical...
In early 1927, Pascual Jordan (1927b) published his version of what came to be known as the Dirac-Jordan statistical transformation theory. Later that year and partly in response to Jordan, John von N...
Background: More evidence is needed to conclude that a specific program of exercise and/or cognitive training warrants prescription for the prevention of cognitive decline. We examined the effect of a...
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes kno...
Using EasyCrypt, we formalize a new modular security proof for one-round authenticated key exchange protocols in the random oracle model. Our proof improves earlier work by Kudla and Paterson (ASIACRY...
Dave Striver loved the university. He loved its ivy-covered clocktowers, its ancient and sturdy brick, and its sun-splashed verdant greens and eager youth. He also loved the fact that the university i...
The recently discovered “UNERTAN SYNDROME” consists of quadrupedal gait, severe mental retardation, and primitive language. This syndrome can be considered as devolution of human being, throwing a lig...
The title “Muscularity of Mindindicates the point of view that is argued in this essay. I attempt to trace the roots of higher cognitive abilities to the physiological coupling that exists between n...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...