نتایج جستجو برای: parameter

تعداد نتایج: 214899  

2013
Shai Halevi Tal Malkin Fernando Krell

Basics We will use the following parameters: • n, the security parameter.

2014
Mohamed Ali Khenissi Fathi Essalmi Mohamed Jemni Kinshuk Ting-Wen Chang

Working memory capacity is one of the most important learner's characteristics that can be used as an input parameter for personalizing learning in order to improve the learning process. Therefore, knowing learner’s working memory capacity and personalizing the learning contents according to learner’s working memory capacity levels are important research issues. This paper proposes an approach ...

Journal: :IACR Cryptology ePrint Archive 2011
ZiJie Xu Ke Xu

We had found functions can be used to fix bits [2] by given differences. We use these functions build a message expansion function. In the message expansion function, there are some bits include message bits and incremental bits produced from message bits, these bits will be used as parameter of date-depend function. This message expansion function will fixed at lease n × 5 . 5 bits with given ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1372

این پایان نامه به بررسی و مقایسه دو موضوع مطابقه میان فعل و فاعل (از نظر شخص و مشار) و هسته عبارت در دو زبان انگلیسی و آذربایجانی می پردازد. اول رابطه دستوری مطابقه مورد بررسی قرار می گیرد. مطابقه به این معناست که فعل مفرد به همراه فاعل مفرد و فعل جمع به همراه فاعل جمع می آید. در انگلیسی تمام افعال، بجز فعل بودن (to be) از نظر شمار با فاعلشان فقط در سوم شخص مفرد و در زمان حال مطابقت نشان میدهند...

Journal: :Combinatorics, Probability & Computing 2015
Deepak Bal Anthony Bonato Bill Kinnersley Pawel Pralat

We consider a variant of the game of Cops and Robbers, called Lazy Cops and Robbers, where at most one cop can move in any round. We investigate the analogue of the cop number for this game, which we call the lazy cop number. Lazy Cops and Robbers was recently introduced by Offner and Ojakian, who provided asymptotic upper and lower bounds on the lazy cop number of the hypercube. By coupling th...

Journal: :CoRR 2017
Abhisek Ukil

Publications are increasingly (often wrongly) being used as research outputs. Furthermore, ‘impacts’ of such publications are often (wrongly as well) measured using ‘citations’. Popular metric, like the ‘Hirsch index’, or ‘h-index’ is used as yardstick for judging the quality of individual researchers. However, there are many controversies around it, whether it is a good yardstick, which could ...

2014
Koji Nuida Kaoru Kurosawa

In this paper, we construct a fully homomorphic encryption (FHE) scheme over integers with the message space ZQ for any prime Q. Even for the binary case Q = 2, our decryption circuit has a smaller degree than that of the previous scheme; the multiplicative degree is reduced from O(λ(log λ)) to O(λ), where λ is the security parameter. We also extend our FHE scheme to a batch FHE scheme.

2013
Mikel D. Petty

A confidence interval is an interval (i.e., a range of values) estimate of a parameter of a population (e.g., a mean) calculated from a sample drawn from the population. A confidence interval has an associated confidence level, which is frequency with which a calculated confidence interval is expected to contain the population parameter. Confidence intervals are of interest in modeling and simu...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 1999
Fabio Lavagetto Roberto Pockaj

In this paper we propose a method for implementing a high-level interface for the synthesis and animation of animated virtual faces that is in full compliance with MPEG-4 specifications. This method allows us to implement the Simple Facial Object profile and part of the Calibration Facial Object Profile. In fact, starting from a facial wire-frame and from a set of configuration files, the devel...

Journal: :J. Comb. Theory, Ser. B 2003
Ed Swartz

A g-element for a graded R-module is a one-form with properties similar to a Lefschetz class in the cohomology ring of a compact complex projective manifold, except that the induced multiplication maps are injections instead of bijections. We show that if k(∆) is the face ring of the independence complex of a matroid and the characteristic of k is zero, then there is a non-empty Zariski open su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید