نتایج جستجو برای: bounded bilinear map
تعداد نتایج: 264455 فیلتر نتایج به سال:
We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme for (monotone) Boolean circuits based on bilinear maps. The construction is based on secret sharing and just one bilinear map, and can be viewed as an extension of the KP-ABE scheme in [7]. Selective security of the proposed scheme in the standard model is proved, and comparisons with the scheme in [5] based on leveled m...
We study the norm derivatives in context of Birkhoff–James orthogonality real Banach spaces. As an application this, we obtain a complete characterization left-symmetric points and right-symmetric space terms derivatives. strong $$\ell _1^n$$ _\infty ^n$$ also relation defined by some newly introduced variation orthogonality. further orthogonality, approximate smoothness attainment bounded bili...
In present PET/CT scanners, PET attenuation correction is performed by relying on the information given by CT scan. In the CT-based attenuation correction methods, dual-energy technique (DECT) is the most accurate approach, which has been limited due to the increasing patient dose. In this feasibility study, we have introduced a new method that can implement dual-en...
Bilinear systems in input/output form are introduced, and represented by means of suitable rational functions in two indeterminates. Necessary and sufficient conditions for BIBO stability are derived, and compared with analogous results on 2D systems stability. Several features of the output evolutions, corresponding to finite support as well as to periodic input sequences, are discussed, and r...
We characterize the entire functions which transform a weighted Banach space of holomorphic functions on the disc of type H∞ into another such space by superposition. We also show that all the superposition operators induced by such entire functions map bounded sets into bounded sets and are continuous. Superposition operators that map bounded sets into relatively compact sets are also considered.
In this submission, we propose an efficient identity-based and implicitly authenticated key agreement protocol IDAK based on pairing techniques. Though both Weil and Tate pairing could be used for IDAK, we recommend Tate pairing for IDAK to avoid extra ephemeral value validation process. The security of IDAK was formally proved in [22] in Bellare-Rogaway model with random oracle. In additon, ID...
We show that the quantum field theoretical formulation of the τ function theory has a geometrical interpretation within the classical transformation theory of conjugate nets. In particular, we prove that i) the partial charge transformations preserving the neutral sector are Laplace transformations, ii) the basic vertex operators are Lévy and adjoint Lévy transformations and iii) the diagonal s...
Let $A$ be an abelian topological group and $B$ a trivial topological $A$-module. In this paper we define the second bilinear cohomology with a trivial coefficient. We show that every abelian group can be embedded in a central extension of abelian groups with bilinear cocycle. Also we show that in the category of locally compact abelian groups a central extension with a continuous section can b...
Visual recognition faces the difficult problem of recognizing objects despite the multitude of their appearances. Ample neuroscientific evidence shows that the cortex uses a topographic code to represent visual stimuli. We therefore develop a bilinear probabilistic model that learns transformations to build an invariant topographic code in an unsupervised way. Simulations for the simple over-co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید