>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到combinatorial相关记录105条 . 查询时间(0.066 秒)
Over the past years, CRISPR/Cas-mediated genome editing has revolutionized plant genetic studies and crop breeding. Specifically, due to its ability to simultaneously target multiple genes, the multip...
Consider a finite set of segments on a plane with endpoints in the general position. In [1] Sylvester posted a problem of finding the measure of the set of lines intersecting all of this segments. In ...
In this talk, I will overview the general flavor for the topic of “combinatorial statistics”, and I will describe some recent progress on shotgun assembling problems as well as random graph matching p...
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can ...
ISCO(International Symposium on Combinatorial Optimization) is a biennial symposium with its first issue held in Hammamet, Tunisia in March 2010, its second one in Athens, Greece in April 2012, its th...
CSC18 will be the 8th workshop in a series that provides a top-tier forum for presenting original research on the design, implementation, application, and evaluation of combinatorial algorithms and da...
We propose a protocol to securely compute the solution to the (single source) Shortest Path Problem, based on Dijkstra's algorithm and Secure Multiparty Computation. Our protocol improves state of the...
In language, a small number of meaningless building blocks can be combined into an unlimited set of meaningful utterances. This is known as combinatorial structure. One hypothesis for the initial emer...
Combinatorial methods are a promising modern approach to software testing. In particular, pairwise testing, which requires testing all pairs of possible values for any pair of input parameters, has sh...
In 1996, Jackson and Martin proved that a strong ideal ramp scheme is equivalent to an orthogonal array. However, there was no good characterization of ideal ramp schemes that are not strong. Here we ...
Public key broadcast encryption is a cryptographic method to securely transmit a message from anyone to a group of receivers such that only privileged users can decrypt it. A secure multicast system a...
Glitches represent a great danger for hardware implementations of cryptographic schemes. Their intrinsic random nature makes them difficult to tackle and their occurrence threatens side-channel protec...
In this paper, we consider methods whereby a subset of players in a (k,n)(k,n)-threshold scheme can ``repair'' another player's share in the event that their share has been lost or corrupted. This wil...
We study several stochastic combinatorial problems, includ-ing the expected utility maximization problem, the stochas-tic knapsack problem and the stochastic bin packing prob-lem. A common technical c...
We consider the stochastic geometry model where the location of each node is a random point in a given metric space,or the existence of each node is uncertain. We study the problem-s of computing the ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...