>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Instruction相关记录164条 . 查询时间(0.093 秒)
A large part of the art of coaching is knowing when to coach. Timing is key. Context is king. Coaching is extremely strategic. In some situations, the best way to coach is to simply do nothing at all....
Minimum competencies for diagnostic tools, such as the electrocardiogram, are not well-defined in,current standards or publications. The electrocardiogram has significant pharmacotherapeutic implicati...
Objective. To compare pharmacotherapy instruction in Doctor of Pharmacy (PharmD) programs with the 2009 and 2016 American College of Clinical Pharmacy (ACCP) pharmacotherapy toolkits.Methods. A survey...
The introduction of the processor instructions AES-NI and VPCLMULQDQ, that are designed for speeding up encryption, and their continual performance improvements through processor generations, has sign...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solu...
In 2014, Smart and Vercauteren introduced a packing technique for homomorphic encryption schemes by decomposing the plaintext space using the Chinese Remainder Theorem. This technique allows to encryp...
Fault attack countermeasures can be implemented by storing or computing sensitive data in redundant form, such that the faulty data can be detected and restored. We present a class of lightweight, por...
Over the past few years, the microprocessor industry has introduced accelerated cryptographic capabilities through instruction set extensions. Although powerful and resistant to side-channel analysis ...
The x86-64 ISA sits at the bottom of the software stack of most desktop and server software. Because of its importance,many software analysis and verification tools depend, either explicitly or implic...
We study an intensive math instruction policy that assigned low-skilled ninth graders to an algebra course that doubled instructional time, altered peer composition and emphasized problem solving skil...
Lightweight implementation of Elliptic Curve Cryptography on FPGA has been a popular research topic due to the boom of ubiquitous computing. In this paper we propose a novel single instruction base...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker ...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent vulnerability to the injection of malicious code. Equally unsolved is the susceptibility of firmwar...
The Niederreiter public-key cryptosystem is based on the security assumption that decoding generic linear binary codes is NP complete, and therefore, is regarded as an alternative post-quantum solu...
Current literacy standards include students' abilities to conduct research as an inquiry process and to gather, evaluate, and synthesize information from multiple sources. Observation data from 19 gra...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...