>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Being Rational相关记录277条 . 查询时间(0.049 秒)
为深入践行“健康中国2030”战略、充分激发食品学子的实践精神与创新潜能,2023年9月20日晚,由瑞仙贸易(上海)有限公司与江南大学食品学院联合举办的首届“Rational杯”食品加工创新大赛在食品楼D912报告厅正式启动。瑞仙贸易(上海)有限公司总经理俞文军、市场总监栾斌、应用研发总监唐学燕、华东区域总监吴建友、华东区域经理杨博,食品学院党委副书记李雷、副院长程力、学工办主任李金杰、教学中心副...
In the last decade, there has been a growing interest in the study of rational points on homogeneous spaces of linear algebraic groups defined over fields having good arithmetical properties other tha...
A difference field is a field with a distinguished automorphism. Automorphisms of a finite field are powers of the Frobenius map. In this talk, I will discuss how to estimate the number of rational po...
The full Kostant-Toda lattice defined on simple Lie algebras can be viewed as finite version of KP type hierarchies. In this talk I will show you how to explicitly construct (all) rational solutions o...
The method of moving planes and moving quadrics expresses the implicit equation of a rational parametric surface as a compact determinant. Efficient computation of the moving planes and moving quadric...
Honest majority is a vital assumption of Bitcoin-style blockchains. However, recent 51% attacks render this assumption unrealistic in practice. In this paper, we analyse two possible 51% attacks launc...
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamotostyle consensus, we p...
A paper by Karati and Sarkar at Asiacrypt'17 has pointed out the potential for Kummer lines in genus one, by observing that its SIMD-friendly arithmetic is competitive with the status quo. A more rece...
We point out an implicit unproven assumption underlying the security of rational proofs of storage that is related to a concept we call weak randomized compression.
The rational polynomial coefficients (RPC) model is a generalized sensor model, which can achieve high approximation accuracy. And it is widely used in the field of photogrammetry and remote sensing. ...
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
This paper presents the basic concepts of the Edwards curves, twisted Edwards curves and the point addition laws on these curves. The main result is the parameterization of the Edward curve with the g...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
Secure Message Transmission (SMT) is a two-party cryptographic scheme by which a sender securely and reliably sends messages to a receiver using nn channels. Suppose that an adversary corrupts at most...
Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive proofs in which the prover is rational, and may deviate from the protocol for increasing his reward. Guo et al....

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...