>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Scheme相关记录1071条 . 查询时间(0.125 秒)
We focus on numerical study of the dynamical Ginzburg-Landau equations under the temporal gauge, and propose a decoupled numerical scheme based on the finite element method. For the variable A, the se...
We aim to find the time-dependent source term in the diffusion equation from the boundary measurement, which allows for the possibility of tracing back the source of pollutants in the environment. Bas...
Weitzman (1979) introduced the Pandora Box problem as a model for sequential search with inspection costs, and gave an elegant index-based policy that attains provably optimal expected payoff. In vari...
A temporally second-order accurate, fully discrete finite element method is proposed and analyzed for the magnetohydrodynamic (MHD) equations. A modified Crank-Nicolson method is used to discretize th...
Consumer expenditures in the United Kingdom account for over 50% of Gross Domestic Product on the expenditure side, yet their impact on economic activity is often Global geometric structures live on m...
甲烷(CH4)与CO相比具有优越的经济价值和应用前景,是光还原CO2的理想产品。然而,CO2转化效率低和生产选择性差是其实际应用的障碍。因此,如何开发高效、廉价、可选择性生产高附加值产物的光还原CO2催化剂是一项紧迫而具有挑战性的课题。
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
We introduce novel efficient and transparent construction of the polynomial commitment scheme. A polynomial commitment scheme allows one side (the prover) to commit to a polynomial of predefined degre...
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
Abstract. The extremely efficient Rabin-Williams signature scheme relies on decryption of a quadratic equation in order to retrieve the original message. Customarily, square roots are found using the ...
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
In 2017 Kyung-Ah Shim et al proposed a multivariate signature scheme called Himq-3 which is a submission to National Institute of Standards and Technology (NIST) standardization process of post-quantu...
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
We introduce the WIDESEAS protocol for lattice-based Private Information Retrieval (PIR), and we give performance numbers for its recent implementation in the EncryptedQuery open-source PIR software. ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...