搜索结果: 1-15 共查到“meets”相关记录96条 . 查询时间(0.077 秒)
DLP 3D Printing Meets Lignocellulosic Biopolymers: Carboxymethyl Cellulose Inks for 3D Biocompatible Hydrogels
hydrogel methacrylated CMC 3D printing DLP
2024/1/19
The development of new bio-based inks is a stringent request for the expansion of additive manufacturing towards the development of 3D-printed biocompatible hydrogels. Herein, methacrylated carboxymet...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Harmonic analysis meets wave equation
谐波分析 符合 波动方程
2023/5/10
Moore than meets the eye: The evolution of computing(图)
Innovation Electrical and Computer Engineering 缩放定律
2023/6/29
Responsive design meets responsibility for the planet’s future(图)
永久冻土 响应式设计 清洁能源 可持续发展 气候学
2023/6/19
The Waxy (Wx) gene responsible for amylose synthesis is an old but widely used target in quality improvements of starchy crops. New genome editing strategies were recently reported to create novel and...
Card-based Cryptography Meets Formal Verification
secure multiparty computation card-based cryptography formal verification
2019/9/17
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation (MPC) with just a deck of cards. For the sake of simplicity, this is often done using ca...
Sum-of-Squares Meets Program Obfuscation, Revisited
Sum-of-Squares Indistinguishability Obfuscation
2019/1/2
We develop attacks on the security of variants of pseudo-random generators computed by quadratic polynomials. In particular we give a general condition for breaking the one-way property of mappings wh...
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Machine Learning Robustness Analysis Supervised Learning
2018/11/21
Profiled side-channel attacks are the most powerful attacks and they consist of two steps. The adversary first builds a leakage model, using a device similar to the target one, then it exploits this l...
Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets
secure search secure report fully homomorphic encryption
2018/11/5
emph{Secure Report} is the problem of retrieving from a database table (e.g. on the cloud) all records matching specified attributes, as in SQL SELECT queries, but where the query and possibly the dat...
By 2019, big data and business analytics sales are expected to pull in $187 billion worldwide. Already making waves in this sector is Ayasdi, a company founded by a renowned mathematician and NSF awar...
2018极限科学研讨会(Workshop on Science at Extreme Scales: Where Big Data Meets Large-Scale Computing Tutorials)
2018 极限科学 研讨会
2017/12/20
The program opens with four days of tutorials that will provide an introduction to major themes of the entire program and the four workshops. The goal is to build a foundation for the participants of...
Increasingly large data sets are being ingested and produced by simulations. What experience from large-scale simulation is transferable to big data applications? Conversely, what new optimal algorith...