>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到degenerate e相关记录88条 . 查询时间(0.078 秒)
In this talk I will present one of our recent work in rigorous derivation of the degenerate parabolic-elliptic Keller-Segel system. We establish the classical solution theory of the degenerate parabol...
In this talk, we consider the large time behavior of the weak solution to the free boundary problem for one-dimensional isentropic compressible Navier-Stokes equations with degenerate viscosity and va...
In this paper, we describe several practically exploitable fault attacks against OpenSSL's implementation of elliptic curve cryptography, related to the singular curve point decompression attacks of B...
2018年3月20日,控制领域国际顶级期刊《Automatica》刊发了中国地质大学自动化学院宗小峰教授的“随机系统稳定性方面新成果”--Stability of stochastic functional differential systems using degenerate Lyapunov functionals and applications。
A Degenerate Grouping Power Attack (DGPA) is a type of Partitioning Power Analysis (PPA) used to extract secret keys from the power sidechannel signal of an encryption algorithm running on a device al...
The N M R spectroscopy of molecules undergoing rapid exchange between diamagnetic and paramagnetic environments is well understood and is exemplified in studies of fast electron transfer between an or...
Invalid curve attacks are a well-known class of attacks against implementations of elliptic curve cryptosystems, in which an adversary tricks the cryptographic device into carrying out scalar multipl...
This paper is devoted to hydrodynamic limits for collisional linear kinetic equations. It is a classical result that under certain conditions on the collision operator, the long time/small mean free p...
We propose that a nonthermal X-ray arc inside the remnant of Tycho's supernova (SN) represents the interaction between the SN ejecta and the companion star's envelope lost in the impact of the explosi...
We consider a mirror-symmetric resonator with two ports. We show that, when excited from a single port, complete absorption can be achieved through critical coupling to degenerate resonances with oppo...
The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem(PI). In this paper, we discuss the difficulty of pairing inversion on the generalized ...
Traditional geometry-based approach can maintain the characteristics of vector data. However, complex interpolation calculations limit its applications in high resolution and multi-source spatial da...
We establish higher-order weighted Sobolev and Holder regularity for solutions to variational equations de ned by the elliptic Heston operator, a linear second-order degenerate-elliptic operator aris...
The Heston stochastic volatility process is a degenerate diffusion process where the degeneracy in the diffusion coefficient is proportional to the square root of the distance to the boundary of the h...
The Heston stochastic volatility process is a degenerate di usion process where the degeneracy in the di usion coecient is proportional to the square root of the distance to the boundary of the half-...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...