>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到trade-offs相关记录35条 . 查询时间(0.137 秒)
In order to quantify the plant species diversity characteristics of Pinus massoniana plantations with different stand densities in the Danjiangkou reservoir area of Hubei Province and the relationship...
Forests mitigate climate change by storing carbon and reducing emissions via substitution effects of wood products. Additionally, they provide many other important ecosystem services (ESs), but are vu...
How people fish matters as much as the quantity they’ve harvested, say University of Maine researchers Kara Pellowe and Heather Leslie.Their study in Ecosphere details the impacts of size-selective fi...
Concrete security proofs give upper bounds on the attacker's advantage as a function of its time/query complexity. Cryptanalysis suggests however that other resource limitations - most notably, the at...
Our results extend and improve upon previous work of Bai-Laarhoven-Stehlé [ANTS'16] and Herold-Kirshanova [PKC'17], with better complexities for arbitrary tuple sizes and offering tunable time-memory ...
Proofs of space (PoS) were suggested as more ecological and economical alternative to proofs of work, which are currently used in blockchain designs like Bitcoin. The existing PoS are based on rather ...
Organisms in nature adapt and evolve in complex environments. For example, when subjected to changes in nutrients, antibiotics, and predation, microbes in the wild face the challenge of adapting multi...
The paradigm shift from an information-oriented Internet into an Internet of Services (IoS) has opened up virtually unbounded possibilities for creating and deploying new services. In this reshaped IC...
Deduplication removes redundant copies of files or data blocks stored on the cloud. Client-side deduplication, where the client only uploads the file upon the request of the server, provides major sto...
Multi-input functional encryption is a paradigm that allows an authorized user to compute a certain function ---and nothing more--- over multiple plaintexts given only their encryption. The particular...
In this paper, we present a variant of Diem’s Oe(q) index calculus algorithm to attack the discrete logarithm problem (DLP) in Jacobians of genus 3 non-hyperelliptic curves over a finite field Fq. W...
Embedded microcontroller applications often experience multiple limiting constraints: memory, speed, and for a wide range of portable devices, power. Applications requiring encrypted data must simulta...
The dual-execution protocol of Mohassel & Franklin (PKC 2006) is a highly efficient (each party garbling only one circuit) 2PC protocol that achieves malicious security apart from leaking an arbitrar...
We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 was designed to be strictly sequential (i.e., not easily parallelizable), providing strong security even again...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...