>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到general相关记录1015条 . 查询时间(0.121 秒)
Recent observations have indicated that warm water has been discharged near the light water reactor at the Yongbyon Nuclear Scientific Research Center in North Korea, which is consistent with the purp...
Similar to the role of Markov decision processes in reinforcement learning, Markov games (also known as stochastic games) form the basis for the study of multi-agent reinforcement learning and sequenc...
I will review the recent progress, including my own contribution, in addressing the Kerr Stability Conjecture (克尔时空稳定性猜想)and the Strong Cosmic Censorship Hypothesis (强宇宙监督假设),both of which are among t...
We expect that the study of pluricanonical systems of varieties of general type with many global forms can be reduced to the study of pluricanonical systems of varieties of lower dimensions. We show t...
The IAEA Department of Nuclear Safety and Security will host 14 side events, including five ESPACE events and two tours, during the 66th IAEA General Conference, to be held in Vienna from 26 – 30 Sept...
Researchers have discovered a novel way to perform “general inverse design” with reasonably high accuracy. This breakthrough paves the way for further development of a burgeoning and fast-moving field...
新乡学院英国概况课件 General Elections。
2019年9月19日,华南师范大学心理学院博士后、特聘副研究员常帅博士在经典高水平实验心理学杂志Journal of Experimental Psychology: General(5年影响因子5.3)上以第一作者身份发表论文“The functional effects of voluntary and involuntary phantom color on conscious awaren...
广东工业大学自动化学院国际贸易实务电子课件Unit 2 general procedure。
Starting from the one-way group action framework of Brassard and Yung (Crypto '90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no lo...
We study leakage-resilient continuously non-malleable secret sharing, as recently intro- duced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can continuously tamper and leak from a...
This paper describes a new public coin, succinct interactive zero-knowledge argument for NP under standard cryptographic hardness assumptions—without requiring a trusted setup. In particular, our argu...
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the collection of authorized sets is called the access structure. For over 30 years, it was known that any (mono...
In this work we continue the study on the round complexity of secure multi-party computation with black-box simulation in the simultaneous broadcast model where all the parties get the output.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...