>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到transformations相关记录192条 . 查询时间(0.05 秒)
To explore rapid anthocyanin (Anth) detection technology based on remote sensing (RS) in tree peony leaves, we considered 30 species of tree peonies located in Shaanxi Province, China. We used an SVC ...
For an integrable hierarchy which possesses a bihamiltonian structure with semisimple hydrodynamic limit, we prove that the linear reciprocal transformation with respect to any of its symmetry transfo...
To manage atmospheric carbon dioxide and convert the gas into a useful product, Cornell scientists have dusted off an archaic – now 120 years old – electrochemical equation. The group aims to thwart t...
To manage atmospheric carbon dioxide and convert the gas into a useful product, Cornell scientists have dusted off an archaic – now 120 years old – electrochemical equation. The group aims to thwart t...
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
While many spectral transformation techniques have been applied on spectral mixture analysis (SMA), few study examined their necessity and applicability. This paper focused on exploring the difference...
HElib is a software library that implements homomorphic encryption (HE), with a focus on effective use of "packed" ciphertexts. An important operation (which is used in bootstrapping, as well as in ot...
We describe a technique to formally verify the security of masked implementations against side-channel attacks, based on elementary circuit transformations. We describe two complementary approaches: a...
Machine learning models hosted in a cloud service are increasingly popular but risk privacy: clients sending prediction requests to the service need to disclose potentially sensitive information. In t...
Predicate encodings are information-theoretic primitives that can be transformed generically into predicate encryption schemes for a broad class of predicates (Wee, TCC 2014; Chen, Gay, Wee, EUROCRY...
The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advan...
Many older maps were created using reference coordinate systems which are no longer available, either because no information to a datum was taken in the first place or the reference system is forgotte...
Growth charts such as those published by the National Center for Health Statistics (NCHS) consist of a set of smoothed percentile curves showing the distribution of different aspects of body size f...
In the rich literature of secure multi-party computation (MPC), several important results rely on “protocol transformations,” whereby protocols from one model of MPC are transformed to protocols from ...
Computational notions of entropy have recently found many applications, including leakageresilient cryptography, deterministic encryption or memory delegation. The two main types of results which ma...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...