نتایج جستجو برای: عصاره گیرها extractors

تعداد نتایج: 13934  

2014
Yundi Qian William B. Haskell Albert Xin Jiang Milind Tambe

Protecting our environment and natural resources is a major global challenge. “Protectors” (law enforcement agencies) try to protect these natural resources, while “extractors” (criminals) seek to exploit them. In many domains, such as illegal fishing, the extractors know more about the distribution and richness of the resources than the protectors, making it extremely difficult for the protect...

2002
Susan Elliott Sim Richard C. Holt Steve M. Easterbrook

In this paper, we take the concept of benchmarking as used extensively in computing and apply it to evaluating C++ fact extractors. We demonstrated the efficacy of this approach by developing a prototype benchmark, CppETS 1.0 (C++ Extractor Test Suite, pronounced see-pets) and collecting feedback in a workshop setting. The CppETS benchmark characterises C++ extractors along two dimensions: Accu...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2018
Tom Gur Igor Shinkar

A (k, ε)-non-malleable extractor is a function nmExt : {0, 1}×{0, 1} → {0, 1} that takes two inputs, a weak source X ∼ {0, 1} of min-entropy k and an independent uniform seed s ∈ {0, 1}, and outputs a bit nmExt(X, s) that is ε-close to uniform, even given the seed s and the value nmExt(X, s′) for an adversarially chosen seed s′ 6= s. Dodis and Wichs (STOC 2009) showed the existence of (k, ε)-no...

2002
Ziv Bar-Yossef Luca Trevisan Omer Reingold Ronen Shaltiel

We prove (mostly tight) space lower bounds for “streaming” (or “on-line”) computations of four fundamental combinatorial objects: error-correcting codes, universal hash functions, extractors, and dispersers. Streaming computations for these objects are motivated algorithmically by massive data set applications and complexity-theoretically by pseudorandomness and derandomization for spacebounded...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ولی عصر (عج) - رفسنجان - دانشکده کشاورزی 1393

بخش وسیعی از خاک های دنیا از جمله ایران، جزء خاک های آهکی می باشند که به دلیل ph بالا و تثبیت بسیاری از عناصر غذایی کم مصرف از جمله مس، کمبود این عناصر مشاهده می شود. از آنجا که مقدار مس کل خاک اطلاعات زیادی درباره ی مقدار قابل استفاده ی آن توسط گیاهان نمی دهد، قابلیت استفاده مس در 12 خاک آهکی با دامنه وسیعی از خصوصیات شیمیایی با عصاره گیرهای mehlich1،mehlich3 ، edta-nh4oac،edta ، dtpa-naoac،dt...

2008
Marcin Iwanowski

The paper presents a novel approach to the classification of binary image pixels which is based on mathematical morphology. The proposed method makes use of new operators of class extractors to extract from the original image pixels belonging to pre-defined classes. Classes consist of pixels characterized by particular morphological properties. In the paper, a general scheme of morphological cl...

Journal: :IACR Cryptology ePrint Archive 2017
Maciej Obremski Maciej Skorski

Universal hashing found a lot of applications in computer science. In cryptography the most important fact about universal families is the so called Leftover Hash Lemma, proved by Impagliazzo, Levin and Luby. In the language of modern cryptography it states that almost universal families are good extractors. In this work we provide a somewhat surprising characterization in the opposite directio...

Journal: :IACR Cryptology ePrint Archive 2014
Kenji Yasunaga Kosuke Yuzawa

Fuller et al. (Asiacrypt 2013) studied on computational fuzzy extractors, and showed, as a negative result, that the existence of a computational “secure sketch” implies the existence of an information-theoretically secure sketch with slightly weaker parameters. In this work, we show a similar negative result such that, under some computational assumption, the existence of a computational fuzzy...

2011
François Fleuret Philip Abbet Charles Dubout Leonidas Lefakis

It has been demonstrated repeatedly that combining multiple types of image features improves the performance of learning-based classification and regression. However, no tools exist to facilitate the creation of large pools of feature extractors by extended teams of contributors. The MASH project aims at creating such tools. It is organized around the development of a collaborative web platform...

2015
Wei Dai

Randomness is crucial to computer science, both in theory and applications. In complexity theory, randomness augments computers to offer more powerful models. In cryptography, randomness is essential for seed generation, where the computational model used is generally probabilistic. However, ideal randomness, which is usually assumed to be available in computer science theory and applications, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید