共查询到20条相似文献,搜索用时 31 毫秒
2.
3.
2001年,《寂静岭2》的发售让这个恐怖游戏系列走向了巅峰,然而至此之后.即使是最铁杆的玩家也不得不承认该系列正在走下坡路。《寂静岭3》或许在剧情吸引力方面是最高的,但是在游戏性上却大不如前。《寂静岭4》则被人抱怨完全不像《寂静岭》。这些作品本身并不算糟糕,但销量和评价的下滑是摆在眼前的事实。因此Konami希望在第5作中.《寂静岭》能够体现新的风貌。为此,Konami将《寂静岭Ⅴ》的开发外包给了“The Collective”工作室,他们之前曾制作了“吸血鬼猎人巴菲”.《达芬奇密码》等。这次是这家小工作室接到的最大项目,他们已经倾尽全力,希望借此一炮而红。 相似文献
4.
6.
7.
8.
《艺术与设计.数码设计》2003,(5):52-53
可以体验身临其境的恐怖感的“寂静岭”系列。虽然本作没有使用Prerender,全部的电影都是Realfime,但将电影部分和游戏部分一体化之后的效果怎样呢?这里就从概念到实际制作进行详尽的介绍。 相似文献
9.
10.
刺耳的警报伴随着爆炸带来的轰鸣,乱作一片。周围震颤着,嘎啦啦作响。异常的颠簸,令我睁开眼睛,忽然发现自己躺在手推床上,有人正推着我,走过一道道昏暗的走廊。 相似文献
11.
12.
Louis Kruh 《Cryptologia》2013,37(3):259-260
Several highlights of contributions from Vint Hill Farms Station are offered as the closing of the station is reported. 相似文献
13.
ABSTRACT This paper presents a symmetric cipher that is actually a variation of the Hill cipher. The new scheme makes use of “random” permutations of columns and rows of a matrix to form a “different” key for each data encryption. The cipher has matrix products and permutations as the only operations which may be performed “efficiently” by primitive operators, when the system parameters are carefully chosen. 相似文献
14.
讨论晕渲图的特点和意义,介绍晕渲图的基本原理;给出GIS中基于DEM数据晕渲图生成的算法实现。该算法能够快速、自动地生成黑白或彩色地貌晕渲图。 相似文献
15.
William A. Kiele 《Cryptologia》2013,37(3):225-233
The Hill matrix algorithm[3], published in 1929, is known for being the first purely algebraic cryptographic system and for starting the entire field of algebraic cryptology. In this paper, an operator derived from ring isomorphism theory is adapted for use in the Hill system which greatly increases the block size that a matrix can encrypt; specifically, a k×k invertible matrix over Z n represents an invertible matrix of order k 3, which produces ciphertext blocks k 2-times as long as the original matrix could. This enhancement increases the Hill system's security considerably. 相似文献
16.
Stephan Krenn Krzysztof Pietrzak Akshay Wadia Daniel Wichs 《Computational Complexity》2016,25(3):567-605
Most entropy notions \({H(.)}\) like Shannon or min-entropy satisfy a chain rule stating that for random variables \({X,Z,}\) and \({A}\) we have \({H(X|Z,A)\ge H(X|Z)-|A|}\). That is, by conditioning on \({A}\) the entropy of \({X}\) can decrease by at most the bitlength \({|A|}\) of \({A}\). Such chain rules are known to hold for some computational entropy notions like Yao’s and unpredictability-entropy. For HILL entropy, the computational analogue of min-entropy, the chain rule is of special interest and has found many applications, including leakage-resilient cryptography, deterministic encryption, and memory delegation. These applications rely on restricted special cases of the chain rule. Whether the chain rule for conditional HILL entropy holds in general was an open problem for which we give a strong negative answer: we construct joint distributions \({(X,Z,A)}\), where \({A}\) is a distribution over a single bit, such that the HILL entropy H HILL \({(X|Z)}\) is large but H HILL \({(X|Z,A)}\) is basically zero.Our counterexample just makes the minimal assumption that \({{\mathbf{NP}} \nsubseteq{\mathbf{P/poly}}}\). Under the stronger assumption that injective one-way function exist, we can make all the distributions efficiently samplable.Finally, we show that some more sophisticated cryptographic objects like lossy functions can be used to sample a distribution constituting a counterexample to the chain rule making only a single invocation to the underlying object. 相似文献
17.
针对爬山法容易陷入局部最优,而随机重复爬山法时间开销过大的问题,将互信息与爬山法相结合,提出了MI&HC贝叶斯网络结构学习算法。首先利用互信息构建初始网络结构,再从该网络结构开始利用爬山法进行贝叶斯网络结构学习。仿真结果表明:MI&HC算法,对小型稀疏网络结构的学习效果非常好,对较大型的网络结构的学习也能得到令人满意的结果;该算法不需要节点顺序这一先验信息,却能获得与K2算法相当的学习效果。 相似文献
18.
19.
Hill Cipher is a symmetric polyalphabetic block cipher that enciphers a string of letters into another string of the same length using the linear transformation y=xK. In deciphering, the determinant value must be less than 26 and relatively prime to 26 so that the matrix K of the linear transformation is invertible in modulo 26. The Affine Hill cipher extends the concept of Hill cipher by using the non-linear transformation y=xK+b. In this paper, we extend this concept to encrypt a plaintext of blocksize m to a ciphertext of blocksize n≥m using (a) affine transformation and (b) polynomial transformation to make this cipher more secure. Here the matrix K of the transformation need not be a square matrix. To enable decryption, we state the conditions to be satisfied by K which are as follows. Case (a): (i) For affine transformation, the generalised inverse K + of the matrix K corresponding to the transformation should satisfy the equation KK +=I in modulo p where p is a chosen prime p>26. For m=n, K + is the usual inverse of the matrix K. Case(b): (i) For polynomial transformation, the generalised inverse K + should satisfy the above condition, (ii) If r is the degree of the polynomial, then choose those values of s≤r such that the sth root of modulo p exists for all elements in Z p . In other words, choose those values of s that are relatively prime to Φ(p). 相似文献
20.
中点偏移算法构建分形山的病态值分析及解决 总被引:5,自引:0,他引:5
本文在对大量数据进行检验的基础上,对建分形山的中点偏移算法及其参数进行了分析,并发现病态值的出现,经分析后,提出解决方案。 相似文献