نتایج جستجو برای: sensitive synthetic schemes zero

تعداد نتایج: 657628  

Journal: :IEEE Transactions on Signal Processing 2021

We study a new stochastic multi-player multi-armed bandits (MP-MAB) problem, where the reward distribution changes if collision occurs on arm. Existing literature always assumes zero for involved players happens, but applications such as cognitive radio, more realistic scenario is that reduces ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

this thesis deals with the construction of some function algebras whose corresponding semigroup compactification are universal with respect to some properies of their enveloping semigroups. the special properties are of beigan a left zero, a left simple, a group, an inflation of the right zero, and an inflation of the rectangular band.

Journal: :CoRR 2008
Dima Grigoriev Vladimir Shpilrain

We propose a general way of constructing zero-knowledge authentication schemes from actions of a semigroup on a set, without exploiting any specific algebraic properties of the set acted upon. Then we give several concrete realizations of this general idea, and in particular, we describe several zero-knowledge authentication schemes where forgery (a.k.a. impersonation) is NP-hard. Computational...

Journal: :Comput. J. 1992
Mike Burmester Yvo Desmedt Thomas Beth

Secure identification is an important security issue to avoid computer fraud due to masquerading. This can be achieved with zero-knowledge based smart cards. We present very efficient new zero-knowledge schemes in a general algebraic setting. Particular cases of our scheme improve the performance of the Guillou-Quisquater and the Chaum-Evertsevan de Graaf schemes. Our scheme is formally proven ...

2014
Maheswara Rao Valluri

A zero-knowledge authentication scheme is a type of authentication scheme, which gives no knowledge beyond the authenticity identifying an entity and is probabilistic than deterministic authentication scheme. This paper proposes Diffie-Hellman and Fiat-Shamir like zero-knowledge authentication schemes on general non-commutative groups. The key idea of our proposal is that for a given non-commut...

2007
Sang-Woon Jeon Sae-Young Chung

This paper proposes a low-complexity scheduling algorithm with opportunistic channel state feedback using zero-forcing dirty paper coding (ZF-DPC) or zero-forcing (ZF). Whereas some existing schemes suffer a delay to update the serving users, the proposed algorithm continues to update the serving users immediately at each opportunistic channel feedback. Due to this dynamic serving user adaptati...

2006
MOHAMMED A AL-FAYOUMI SATTAR J ABOUD

Since the invention of the first idea of digital signatures relied on public key algorithms many properties are added, and numerous novel schemes are developed. Besides this grow, a novel idea in identification schemes relied on public key algorithms is also presented, that is zero knowledge proof of identity. However, along with this development many remarkable schemes for instance the Fiat-Sh...

2013

In the previous two Chapters, we proposed fraction nonconforming nonparametric control charts to monitor process location and process variability. It is also shown that performance of proposed control charts are superior to that of the Shewhart X and sign charts. If process is running in an in-control state for a long period, it will reach in steady-state mode. In order to characterize long-ter...

2013
Xianwen Ding Xiaofeng Li

In this paper, we extract the waterline from synthetic aperture radar (SAR) images to illustrate coastline change in Shanghai, China. Nine ERS-2 and ENVISAT SAR images acquired between 1998 and 2006 were selected and a new land-water classification scheme was implemented to obtain coastline. The results show that the seaward coastline change between 1998 and 2000 is faster in the eastern part a...

1998
STERGIOS STERGIOPOULOS

Progress in the implementation of state-of-the-art signalprocessing schemes in sonar systems is limited mainly by the moderate advancements made in sonar computing architectures and the lack of operational evaluation of the advanced processing schemes. Until recently, matrix-based processing techniques, such as adaptive and synthetic-aperture processing, could not be efficiently implemented in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید