نتایج جستجو برای: resilient behavior
تعداد نتایج: 633157 فیلتر نتایج به سال:
The advance of embedded systems and networking technology has facilitated a paradigm shift in engineering system design, from centralized to distributed. This shift has lead to significant interest in the design and analysis of multi-agent networks. A multi-agent network, or networked multi-agent system, consists of a set of agents, or nodes that may represent processors, robots, and so on. The...
A function f is d-resilient if all its Fourier coefficients of degree at most d are zero, i.e. f is uncorrelated with all low-degree parities. We study the notion of approximate resilience of Boolean functions, where we say that f is α-approximately d-resilient if f is α-close to a [−1, 1]-valued d-resilient function in `1 distance. We show that approximate resilience essentially characterizes ...
Flood risk in deltaic regions is increasing due to a combination of more economic activities and an increase flooding probability [...]
Practices and interventions aimed at increasing resilience in children generally focus on one of three outcomes: building the capacity to be resilient in all children (universal programs); the capacity to be resilient in vulnerable children or those facing chronic adversity; or the capacity to be resilient in children exposed to one-off traumatic events or disasters. KEY MESSAGES Is resilienc...
INTRODUCTION Differences between the tooth and implant response to load can lead to many biological and technical implications in the conditions of occlusal forces. OBJECTIVE The objective of this study was to analyze load distribution in tooth/implant-supported fixed partial dentures with the use of resilient TSA (Titan Shock Absorber, BoneCare GmbH, Augsburg, Germany) abutment and conventio...
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce a generic security mod...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید