搜索结果: 1-15 共查到“Input”相关记录252条 . 查询时间(0.236 秒)
Optimal Input Features for Tree Species Classification in Central Europe Based on Multi-Temporal Sentinel-2 Data
tree species classification Sentinel-2 multi-temporal Wienerwald biosphere reserve
2024/1/23
Detailed knowledge about tree species composition is of great importance for?forest?management. The two identical European Space Agency (ESA) Sentinel-2 (S2) satellites provide data with unprecedented...
Modelling climate change impacts on maize yields under low nitrogen input conditions in sub-Saharan Africa
crop simulation model ensemble modelling model intercomparison smallholder farming systems uncertainty
2023/12/21
Smallholder farmers in sub-Saharan Africa (SSA) currently grow rainfed maize with limited inputs including fertilizer. Climate change may exacerbate current production constraints. Crop models can hel...

南京农业大学农学院《Trends in Plant Science》上发表张文利课题组“Low-input single-cell based chromatin profiling in plants”(图)
张文利 基因 植物 细胞
2023/10/28
2023年2月22日,南京农业大学农学院张文利课题组受邀在Trends in Plant Science上发表了题为“Low-input single-cell based chromatin profiling in plants”的综述文章。该综述总结了低样品量/单细胞水平下鉴定全基因组染色质修饰的方法,并比较了基于ChIP-seq 以及CUT&RUN/Tag鉴定方法在哺乳类动物和植物的应用进...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Functional-Input Gaussian Processes
泛函 输入 高斯过程
2023/4/25
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Reevaluation of the carbon emissions embodied in global value chains based on an inter-country input-output model with multinational enterprises
跨国企业 国家间 投入产出模式 全球价值链 碳排放
2023/5/9
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Physically Unclonable Function Machine Learning Modelling Attack
2019/7/15
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Cryptocurrencies Lattice-Based Cryptography Post-Quantum Cryptography
2019/5/28
This paper presents the Lattice-based Ring Confidential Transactions (Lattice RingCT v2.0) protocol. Unlike the previous Lattice RingCT v1.0 (LRCT v1.0) protocol, the new protocol supports Multiple-In...
From Single-Input to Multi-Client Inner-Product Functional Encryption
Decentralized multi-client functional encryption inner products
2019/5/21
We present a new generic construction of multi-client functional encryption (MCFE) for inner products from single-input functional inner-product encryption and standard pseudorandom functions. In spit...
Ad Hoc Multi-Input Functional Encryption
cryptographic protocols multi input functional encryption
2019/4/8
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent ...
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
AES Advanced Encryption Standard Side-channel
2019/4/3
Considering AES sub-steps that can be attacked with a small guess space, the most practicable is to target SubBytes of extremal rounds. For its contrast between candidates (non-linearity) and that the...
In this note, we show that a strong notion of KDM security cannot be obtained by any encryption scheme in the auxiliary input setting, assuming Learning With Errors (LWE) and one-way permutations. The...
On ELFs, Deterministic Encryption, and Correlated-Input Security
deterministic public key encryption lossy functions
2019/2/28
We construct deterministic public key encryption secure for any constant number of arbitrarily correlated computationally unpredictable messages. Prior works required either random oracles or non-stan...
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
functional encryption inner product tight security
2019/2/27
Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signature and more...
华南理工大学计算机科学与工程学院计算机组成与体系结构课件ch7 input and output
华南理工大学计算机科学与工程学院 计算机组成与体系结构 课件 ch7 input and output
2019/1/26
华南理工大学计算机科学与工程学院计算机组成与体系结构课件ch7 input and output。
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation
Indistinguishability Obfuscation Auxiliary-Input Point Obfuscation
2018/11/2
Differing-inputs obfuscation (diO), first proposed by Barak et. al. [4], provides stronger security than that provided by indistinguishability obfuscation (iO). An iO scheme provides indistinguishabil...