نتایج جستجو برای: hybrid schemes

تعداد نتایج: 289827  

2017
Franz Chouly Patrick Hild Yves Renard

In a previous paper [4], we adapted Nitsche’s method for the approximation of the linear elastodynamic unilateral contact problem. The space semi-discrete problem was analyzed and some schemes (θ-scheme, Newmark and a new hybrid scheme) were proposed and proved to be well-posed under appropriate CFL conditons. In the present paper we look at the stability properties of the above-mentioned schem...

Journal: :CoRR 2015
Roman Dovgopol Matthew Rosonke

In general when considering cache coherence, write back schemes are the default. These schemes invalidate all other copies of a data block during a write. In this paper we propose several hybrid schemes that will switch between updating and invalidating on processor writes at runtime, depending on program conditions. We created our own cache simulator on which we could implement our schemes, an...

2000
George A. Gravvanis

A new class of hybrid schemes and composite inner-outer iterative schemes in conjunction with Picard and Newton methods based on explicit approximate inverse arrowtype matrix techniques is introduced. Isomorphic methods in conjunction with explicit preconditioned schemes based on approximate inverse matrix techniques are presented for the efficient solution of arrow-type linear systems. Applica...

2006
James Birkett Alexander W. Dent Gregory Neven Jacob C. N. Schuldt

We propose new instantiations of chosen-ciphertext secure identitybased encryption schemes with wildcards (WIBE). Our schemes outperform all existing alternatives in terms of efficiency as well as security. We achieve these results by extending the hybrid encryption (KEM–DEM) framework to the case of WIBE schemes. We propose and prove secure one generic construction in the random oracle model, ...

1994
Fabrice Moscheni

The wavelet transform has proved its eeciency in removing spatial redundancy. In the framework of hybrid coding schemes, this paper studies the way to combine the wavelet transform and a block matching motion estimation technique. Diierent coding schemes are presented which diier through the data on which the motion estimation and motion compensation are respectively applied. Simulations result...

Journal: :Journal of Systems Architecture - Embedded Systems Design 2014
Young-Kyoon Suh Bongki Moon Alon Efrat Jin-Soo Kim Sang-Won Lee

Flash memory devices commonly rely upon traditional address mapping schemes such as page mapping, block mapping or a hybrid of the two. Page mapping is more flexible than block or hybrid mapping without being restricted by block boundaries. However, its mapping table tends to grow large quickly as the capacity of flash memory devices does. To overcome this limitation, we propose novel mapping s...

2000
Brett J. Young Randal W. Beard Jonathan R. Lawton

| This paper presents hybrid control schemes which are used for practical stabilization of a diierentially driven mobile robot. The control schemes are shown to have desirable characteristics for a regulation scheme, i.e., have gains which are easy to tune, correspond to the physical geometry, and address the eeects of sensor noise. By taking into account the geometry and dynamics of the proble...

2001
Xiaoguang Wang X Wang

We provide several schemes to construct the continuous-variable SWAP gate and present a Hermitian generalized many-body continuous controlled-NOT gate. We introduce and study the hybrid controlled-NOT gate and controlledSWAP gate, and their physical realizations are discussed in trapped-ion systems. These continuous-variable and hybrid quantum gates may be used in the corresponding continuous-v...

2013
V. Gayoso Martínez L. Hernández Encinas Martín Muñoz

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...

2017
Florian Göpfert Christine van Vredendaal Thomas Wunderer

Recently, an increasing amount of papers proposing postquantum schemes also provide concrete parameter sets aiming for concrete post-quantum security levels. Security evaluations of such schemes need to include all possible attacks, in particular those by quantum adversaries. In the case of lattice-based cryptography, currently existing quantum attacks are mainly classical attacks, carried out ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید