>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到sequential相关记录219条 . 查询时间(0.078 秒)
The analysis of data stored in multiple sites has become more popular, raising new concerns about the security of data storage and communication. Federated learning, which does not require centralizin...
We study the problem of designing efficient network sequentially. In each period, the planner connects two unlinked agents in the network formed in previous periods, then the agents play a game with l...
In experimental design, a common problem seen in practice is when the result includes one binary response and multiple continuous responses. However, this problem receives scant attention. Most studie...
We propose a sequential method for implementing reconstruction regression. With a space-filling design of a small sample size, we use GP interpolation-based reconstruction regression to build initial ...
A proof of sequential work allows a prover to convince a verifier that a certain amount of sequential steps have been computed. In this work we introduce the notion of incremental proofs of sequential...
SAT-attack is known to successfully decrypt a functionally correct key of a locked combinational circuit. It is possible to extend the SAT-attack to sequential circuits through the scan-chain by selec...
Proofs of sequential work (PoSW) are proof systems where a prover, upon receiving a statement χχ and a time parameter TT computes a proof ϕ(χ,T)ϕ(χ,T) which is efficiently and publicly verif...
At ITCS 2013, Mahmoody, Moran and Vadhan [MMV'13] introduce and construct publicly verifiable proofs of sequential work, which is a protocol for proving that one spent sequential computational work re...
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
A team of scientists has developed a method to create structures whose building blocks are a millionth of a meter in size by encoding DNA with assembly instructions.The work, described in the journal ...
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
The main goal of this study was to evaluate eggplant (Solanum melongena L.) susceptibility to a sequence of stress factors during plant ontogeny based on seedling morphological, biochemical and physio...
Randomized Controlled Trials (RCTs) are currently the gold standard within evidence-based medicine. Usually, they are conducted as sequential trials allowing for monitoring for early signs of effectiv...
(Sequential) Aggregate signature schemes enable a group of users u1,…,uk with messages m1,…,mk to produce a single signature Σ which states the integrity and authenticity of all the messages m1,…,mk. ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...