نتایج جستجو برای: sandiness parameter

تعداد نتایج: 214916  

2014
J. Gaspar C. Minteer R. Sayler Y. Wamishe T. Kring

Bacterial Panicle Blight (BPB) is a seedand residue-borne disease caused by the pathogens Burkholderia glumae and B. gladioli. In recent years, the incidence and severity of BPB appears to be correlated with the increases in abundance of insect pests of rice in Arkansas, notably rice stink bug [Oebalus pugnax (F.); RSB]. The objective of this study was to investigate the extent to which the BPB...

Journal: :IACR Cryptology ePrint Archive 2013
Xiang Xie Rui Xue

In this work, we present two Key-Policy Attribute-Based Encryption (ABE) schemes for some subclass of circuits based on the Learning with Error (LWE) assumption. Our constructions are selectively secure in the standard model. More specifically, our first construction supports a subclass of circuits with polynomially bounded depth. We call this subclass the OR-restricted circuits which means tha...

2012
Malika Izabachène Benoît Libert

Off-line e-cash systems are the digital analogue of regular cash. One of the main desirable properties is anonymity: spending a coin should not reveal the identity of the spender and, at the same time, users should not be able to double-spend coins without being detected. Compact e-cash systems make it possible to store a wallet of O(2) coins using O(L+ λ) bits, where λ is the security paramete...

2015
Marcel Keller Emmanuela Orsini Peter Scholl

We describe an actively secure OT extension protocol in the random oracle model with efficiency very close to the passively secure IKNP protocol of Ishai et al. (Crypto 2003). For computational security parameter κ, our protocol requires κ base OTs, and is the first practical, actively secure protocol to match the cost of the passive IKNP extension in this regard. The added communication cost i...

2000
Paola Flocchini Evangelos Kranakis Nicola Santoro Danny Krizanc Flaminia L. Luccio

An anonymous ring network is a ring where all processors (vertices) are totally indistinguishable except for their input value. Initially, to each vertex of the ring is associated a value from a totally ordered set; thus, forming a multiset. In this paper we consider the problem of sorting such a distributed multiset and we investigate its relationship with the election problem. We focus on the...

1997
Gerit P. Sonntag Thomas Portele Barbara Heuft

As an alternative to synthesis-by-rule, the use of neural networks in speech synthesis has been successfully applied to prosody generation, yet it is not known precisely which input parameters are responsible for good results. The approach presented here tries to quantify the contribution of each input parameter. This is done first by comparing the mean errors of networks trained with only one ...

Journal: :European Journal of Operational Research 2007
Jean-Luc Marichal

We define an aggregation function to be (at most) k-intolerant if it is bounded from above by its kth lowest input value. Applying this definition to the discrete Choquet integral and its underlying capacity, we introduce the concept of k-intolerant capacities which, when varying k from 1 to n, cover all the possible capacities on n objects. Just as the concepts of k-additive capacities and p-s...

2012
Shahram Khazaei Tal Moran Douglas Wikström

We construct a provably secure mix-net from any CCA2 secure cryptosystem. The mix-net is secure against active adversaries that statically corrupt less than λ out of k mix-servers, where λ is a threshold parameter, and it is robust provided that at most min(λ− 1, k − λ) mix-servers are corrupted. The main component of our construction is a mix-net that outputs the correct result if all mix-serv...

2015
Sanghyun Park Jinsul Kim Yonggwan Won

In this paper we propose a new solution which utilizing the Gyro Sensor and Tilt Sensor in real-time controlling the balance of wheelchair seat. The existing wheelchair systems have the risk of falling when users go uphill because of the uneven weight allocation. But when applying our new method, the wheelchair seat can automatically adjust to maintain the balance therefore provides a safer and...

Journal: :IACR Cryptology ePrint Archive 2010
Niels Ferguson Stefan Lucks Kerry A. McKay

This paper provides three improvements over previous work on analyzing CubeHash, based on its classes of symmetric states: (1) We present a detailed analysis of the hierarchy of symmetry classes. (2) We point out some flaws in previously claimed attacks which tried to exploit the symmetry classes. (3) We present and analyze new multicollision and preimage attacks. For the default parameter sett...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید