نتایج جستجو برای: theoretically and practically

تعداد نتایج: 16828404  

2016
Xiaohui Liu Shihua Luo Yijun Zuo

Depth of the Tukey median is investigated for empirical distributions. A sharper upper bound is provided for this value for data sets in general position. This bound is lower than the existing one in the literature, and more importantly derived under the fixed sample size practical scenario. Several results obtained in this paper are interesting theoretically and useful as well to reduce the co...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Jiri Barnat Petr Rockai

In light of recent shift towards shared-memory systems in parallel explicit model checking, we explore relative advantages and disadvantages of shared versus private hash tables. Since usage of shared state storage allows for techniques unavailable in distributed memory, these are evaluated, both theoretically and practically, in a prototype implementation. Experimental data is presented to ass...

2010
R.Sakthi Vignesh

Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum‟s theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time implementation problems. We further pu...

2003
Steve Babbage Christophe De Cannière Joseph Lano Bart Preneel Joos Vandewalle

Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 without the decimation of the key stream by the so-called stuttering phase. Also, two distinguishing attacks are mounted against full Sober-t32. These attacks are not practically feasible, but they are theoretically more effici...

Journal: :CoRR 2013
Evgenii Khokhryakov

Stable equilibrium study cascaded one bit sigma-delta modulator In the paper defines a boundary of stability zone for sigma-delta modulator. The boundary depends from inner sigma-delta modulator coefficients. For designing purposes such result could use to find or compare some appropriate schemes with each other. It's proved some statements and showed that boundary could be found theoretically ...

2010
Jedrzej Fulara Krzysztof Jakubczyk

Formal methods are considered to be highly expensive. Therefore, they are currently applied almost only in high risk software development. In this paper, we show that formal techniques can be also efficiently used in standard large-scale applications. We focus on the generation of specifications which state the termination condition of for loops in Java code (expressed as so called Java Modelin...

1994
Lars R. Knudsen

In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers. We introduce a new concept, practical security against linear and di erential attacks on Feistel ciphers. We give examples of such Feistel ciphers (practically) resistant to di erential attacks, linear attacks and other attacks.

2008
B. Li Y. Shen

There are four different frequencies in Galileo system, which can form more combinations than that of GPS. Therefore, it is worth, not only theoretically but also practically, to find the best or at least good combination for fast positioning. In this paper we first introduce the criteria for optimally combining the four frequencies based on 5 kinds of cost functions or constraints, then solve ...

In this paper, a new method for evaluating CMOS image sensors based on computer modeling and analysis is introduced. Image sensors are composed of different parts, each of which has a specific effect on image quality. Circuits of image sensors can be evaluated and analyzed using circuit simulators or theoretically, but these methods cannot help to produce the final image. In order to produce th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید