>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到both schemes相关记录647条 . 查询时间(0.578 秒)
In the first part, I shall present a new way to construct highly stiff stable schemes. Traditional time discretization schemes are usually based on Taylor expansions at $t_{n+\beta}$ with $\beta\in [0...
In this talk, we introduce the so-called inverse Lax-Wendroff (ILW) boundary treatment for finite difference approximations on the Cartesian mesh. As the domain boundary may intersect with the grid in...
The private information retrieval (PIR) problem was first proposed by Chor et al. in 1995, and it is a canonical problem in the study of privacy issues that arise from the retrieval of information fro...
The framework of derived algebraic geometry (DAG), developed by Toen-Vezzosi, Lurie and many others, allows us to extend Grothendieck’s theory of flag schemes of sheaves to the cases of complexes. In ...
Discuss [Bha, §2.5-2.6]. Introduce objects in Definitions 2.5.1 and 2.5.3, and cover Theorem 2.5.6, Corollary 2.5.10, Corollary 2.6.8, and Corollary 2.6.11 This is a periodic series learning seminar ...
In this talk, we consider a class of exponential time differencing (ETD) schemes for solving the nonlocal Cahn-Hilliard equation. We first use the Fourier collocation method to discretize the space do...
In this talk, we are interested in designing some efficient numerical methods for Maxwell-Debye equations in metamaterials with negative refractive index. Dimensional splitting method is used to reduc...
System optimization and control have become the key design philosophies in modern control system theories, where reinforcement learning (RL) algorithm has drawn considerable attention in recent litera...
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC). Th...
In this work we apply the systematic approach of game-based security specifications and proofs by reductions, to the design and evaluation of public key infrastructure (PKI) schemes. The importance of...
Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from Intellectual Property (IP) piracy by untrusted entities in the design and fabrication process. It obfu...
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...