نتایج جستجو برای: inductive time constant

تعداد نتایج: 2060363  

1997
W. E. Pickett

The strong corrugation of the V4O5 layer in the spin gap system CaV4O9 is examined for its impact on the exchange coupling constants between the spin12 V ions. Local spin density calculations show that the V spin occupies a dx22y2 orbital (x̂ and ŷ are the V-V directions) that would have vanishing second order exchange coupling if the V4O5 layer were flat. The Kanamori-Goodenough superexchange r...

2008
Andrei Galiautdinov

Building on the previous results of the Weyl chamber steering method, we demonstrate how to generate high-fidelity CNOT by direct application of certain, physically relevant Hamiltonians with fixed coupling constants containing Rabi terms. Such Hamiltonians are often used to describe two superconducting qubits driven by local rf-pulses. It is found that in order to achieve 100% fidelity in a sy...

2006
Henry Heffernan

The ideal intervention paper exercise, from the perspective of the pastoral formation of the student, can be an experience that helps to complete the student’s formation of her or his pastoral identity in a CPE Unit. The development of the paper brings into play the student’s ability to make effective use of her or his religious and spiritual heritage, theological understanding, knowledge of be...

2009
Robert Henderson

Inductive programming systems characteristically exhibit an exponential explosion in search time as one increases the size of the programs to be generated. As a way of overcoming this, we introduce incremental learning, a process in which an inductive programming system automatically modifies its inductive bias towards some domain through solving a sequence of gradually more difficult problems ...

Journal: :Theoretical Computer Science 1998

Journal: :Stochastic Processes and their Applications 1987

Journal: :SIAM Journal on Computing 1986

1995
Rolf Wiehagen Thomas Zeugmann

In designing learning algorithms it seems quite reasonable to construct them in such a way that all data the algorithm already has obtained are correctly and completely reflected in the hypothesis the algorithm outputs on these data. However, this approach may totally fail. It may lead to the unsolvability of the learning problem, or it may exclude any efficient solution of it. Therefore we stu...

2016
Cesar Pereida García Billy Bob Brumley

Side-channel attacks are a serious threat to securitycritical software. To mitigate remote timing and cachetiming attacks, many ubiquitous cryptography software libraries feature constant-time implementations of cryptographic primitives. In this work, we disclose a vulnerability in OpenSSL 1.0.1u that recovers ECDSA private keys for the standardized elliptic curve P-256 despite the library feat...

Journal: :IEEE Signal Processing Letters 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید