نتایج جستجو برای: inductive time constant
تعداد نتایج: 2060363 فیلتر نتایج به سال:
The strong corrugation of the V4O5 layer in the spin gap system CaV4O9 is examined for its impact on the exchange coupling constants between the spin12 V ions. Local spin density calculations show that the V spin occupies a dx22y2 orbital (x̂ and ŷ are the V-V directions) that would have vanishing second order exchange coupling if the V4O5 layer were flat. The Kanamori-Goodenough superexchange r...
Building on the previous results of the Weyl chamber steering method, we demonstrate how to generate high-fidelity CNOT by direct application of certain, physically relevant Hamiltonians with fixed coupling constants containing Rabi terms. Such Hamiltonians are often used to describe two superconducting qubits driven by local rf-pulses. It is found that in order to achieve 100% fidelity in a sy...
The ideal intervention paper exercise, from the perspective of the pastoral formation of the student, can be an experience that helps to complete the student’s formation of her or his pastoral identity in a CPE Unit. The development of the paper brings into play the student’s ability to make effective use of her or his religious and spiritual heritage, theological understanding, knowledge of be...
Inductive programming systems characteristically exhibit an exponential explosion in search time as one increases the size of the programs to be generated. As a way of overcoming this, we introduce incremental learning, a process in which an inductive programming system automatically modifies its inductive bias towards some domain through solving a sequence of gradually more difficult problems ...
In designing learning algorithms it seems quite reasonable to construct them in such a way that all data the algorithm already has obtained are correctly and completely reflected in the hypothesis the algorithm outputs on these data. However, this approach may totally fail. It may lead to the unsolvability of the learning problem, or it may exclude any efficient solution of it. Therefore we stu...
Side-channel attacks are a serious threat to securitycritical software. To mitigate remote timing and cachetiming attacks, many ubiquitous cryptography software libraries feature constant-time implementations of cryptographic primitives. In this work, we disclose a vulnerability in OpenSSL 1.0.1u that recovers ECDSA private keys for the standardized elliptic curve P-256 despite the library feat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید