نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

1997
Sun Wu Chang-Chain Liao

W orld-Wide W eb (WWW) becomes extremely popular in recent y ears. However, there still exists many fundamental problems not yet solved in a satisfactory way, s u c h as the information search, distribution, caching, ltering problems, etc.. Users still often suffers from long retrieval latency, and the lack of search function which can conduct localized search or hierarchical search. In this pa...

2005
Axel Timmermann Raymond S. Bradley Michael E. Mann

We present and describe in detail the advantages and limitations of a technique that combines in an optimal way model results and proxy-data time series in order to obtain states of the climate system consistent with model physics, reconstruction of past radiative forcing and proxy records. To achieve this goal, we select among an ensemble of simulations covering the last millennium performed w...

2012
M. Tian

ID-based message recovery signature is a kind of lightweight signature. In such a signature scheme, a complicated certification system is discarded and the total length of the message and the appended signature is also shortened. Proxy signature allows an original signer to delegate a proxy signer to sign messages on its behalf, which has found numerous practical applications such as grid compu...

2001
Jonathan C. Roberts Stephen Chenney Okan Arikan D. A. Forsyth

Proxy simulations reduce the cost of simulation in large virtual worlds, such as those used in training simulations or computer games. A proxy takes the place of an accurate simulation for objects that are out of view, while the accurate model continues to manage visible objects. A proxy must ensure that objects enter the view at reasonable times throughout the simulation and in states that ref...

Journal: :Nature 1984

2016
Chunpeng Ge Jiandong Wang Liming Fang

In a conditional proxy re-encryption (C-PRE) scheme, a semi-trusted proxy can transform Alice’s ciphertext into Bob’s ciphertext without learning the underlying plaintext, if the ciphertext satisfies a certain condition. To achieve more fine-grained delegation on conditions, Fang, Wang and Ge introduced the notion of fuzzy conditional proxy re-encryption (FC-PRE), whereby the conditions is view...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید