>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Trade-off相关记录27条 . 查询时间(0.093 秒)
Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using dif...
Trajectory datasets are being generated in great volumes due to high levels of Global Positioning System (GPS) and Location-Based Services (LBS) use. Such data are increasingly being collected for a v...
Enumeration algorithms in lattices are a well-known technique for solving the Short Vector Problem (SVP) and improving blockwise lattice reduction algorithms. Here, we propose a new algorithm for enum...
We present size-space trade-offs for the polynomial calculus(PC) and polynomial calculus resolution (PCR) proof sys-tems. These are the first true size-space trade-offs in any algebraic proof system, ...
Finite-element methods are a powerful numerical simulation tool for modeling seismic events, as they allow three-dimensional complex models to be solved. We used a three-dimensional finite-element app...
Gupta and Kumar (ZW) intrnduced a random network model for studying the way throughput scales in a wireless network when the nudes are fixed, and showed that the throughput per source-destinatinn pair...
The fi e rst kibbutz, called Degania, was established southwest of the Sea of rst kibbutz, called Degania, was established southwest of the Sea of Galilee in 1910, but the vast majority of kibbutzim...
Short-term tradeoffs between productivity and safety often exist in the operation of critical facilities such as nuclear power plants, offshore oil platforms, or simply individual cars. For example, i...
The hippocampus and related structures are thought to be capable of 1) representing cortical activity in a way that minimizes overlap of the representations assigned t~ different cortical patterns (pa...
Several lattice-based cryptosystems require to sample from a discrete Gaussian distribution over the integers. Existing methods to sample from such a distribution either need large amounts of memory o...
Several types of countermeasures against side-channel attacks are known. The one called masking is of great interest since it can be applied to any protocol and/or algorithm, without nonetheless requi...
We develop a coherent framework for integrative simultaneous analysis of the explorationexploitation and model order selection tradeoffs. We improve over our preceding results on the same subject ...
We propose and investigate an energy-saving algorithm for DOCSIS-3.0 cable access networks. Numerical simulations indicate a possible 17.4% energy-saving for 8000 cable modems,but also reveal a fundam...
Time, cost and quality are among the major objectives of any project .In recent years, the demands of project stakeholders regarding reductions in the total cost and time of a project along with achie...
Abstract—A space bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space bounded read-write work tapes, and an unbounded stack. Stack Machines with a logarithmic s...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...