搜索结果: 1-15 共查到“知识库 combinatorial”相关记录95条 . 查询时间(0.054 秒)
Covering the Combinatorial Design Space of Multiplex CRISPR/Cas Experiments in Plants
combinatorial gene knockout libraries crop breeding experimental design multiplex CRISPR/Cas screens plant genetic studies
2023/11/28
Over the past years, CRISPR/Cas-mediated genome editing has revolutionized plant genetic studies and crop breeding. Specifically, due to its ability to simultaneously target multiple genes, the multip...
Efficient Message Authentication Codes with Combinatorial Group Testing
Message authentication code Combinatorial group testing Data corruption
2019/4/23
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can ...
An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions
secure multi-party computation applied cryptography shortest path problem
2017/10/9
We propose a protocol to securely compute the solution to the (single source) Shortest Path Problem, based on Dijkstra's algorithm and Secure Multiparty Computation. Our protocol improves state of the...
Signal dimensionality and the emergence of combinatorial structure
Signal spaces Artificial language experiments Linguistic modalities
2017/8/31
In language, a small number of meaningless building blocks can be combined into an unlimited set of meaningful utterances. This is known as combinatorial structure. One hypothesis for the initial emer...
Optimal Ramp Schemes and Related Combinatorial Objects
secret sharing combinatorial cryptography
2017/5/23
In 1996, Jackson and Martin proved that a strong ideal ramp scheme is equivalent to an orthogonal array. However, there was no good characterization of ideal ramp schemes that are not strong. Here we ...
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
broadcast encryption secure multicast wildcard
2017/5/15
Public key broadcast encryption is a cryptographic method to securely transmit a message from anyone to a group of receivers such that only privileged users can decrypt it. A secure multicast system a...
A Methodology for the Characterisation of Leakages in Combinatorial Logic
side-channel analysis hardware countermeasures glitches
2016/12/10
Glitches represent a great danger for hardware implementations of cryptographic schemes. Their intrinsic random nature makes them difficult to tackle and their occurrence threatens side-channel protec...
In this paper, we consider methods whereby a subset of players in a (k,n)(k,n)-threshold scheme can ``repair'' another player's share in the event that their share has been lost or corrupted. This wil...
Stochastic Combinatorial Optimization via Poisson Approximation
Stochastic Knapsack Stochastic Bin Packing Expected Util- ity Maximization
2016/1/23
We study several stochastic combinatorial problems, includ-ing the expected utility maximization problem, the stochas-tic knapsack problem and the stochastic bin packing prob-lem. A common technical c...
Approximating the Expected Values for Combinatorial Optimization Problems over Stochastic Points
Approximating Expected Values Combinatorial Optimization Problems Stochastic Points
2016/1/22
We consider the stochastic geometry model where the location of each node is a random point in a given metric space,or the existence of each node is uncertain. We study the problem-s of computing the ...
Quadratic Core-Selecting Payment Rules for Combinatorial Auctions
games group decisions bidding: auctions
2015/9/18
We report on the use of a quadratic programming technique in recent and upcoming spectrum auctions in Europe. Specifically, we compute a unique point in the core that minimizes the sum of squared devi...
Activity Rules for the Combinatorial Clock Auction
Auctions combinatorial auctions package bidding
2015/9/18
In the original proposal for the combinatorial clock auction (Ausubel, Cramton and
Milgrom, 2006), a revealed-preference approach was taken to limiting bidders’ activity,
based on their earlier ac...
MULTISCALE LANDSCAPE REPRESENTATION DERIVED FROM REMOTE SENSING IMAGES USING SPATIAL SUBPIXEL MODELS AND COMBINATORIAL MAPS
landscapes multiscale subpixel graphs combinatorial maps
2015/8/19
Landscapes can be modelled as sets of homogeneous objects (landscape elements) forming areas of characteristic patterns (landscape units).The common way to represent landscapes is by vector GIS data s...
COMBINATORIAL HOPF ALGEBRAS AND GENERALIZED DEHN-SOMMERVILLE RELATIONS
Hopf algebra, character, generalized Dehn-Sommerville relations
2015/8/14
A combinatorial Hopf algebra is a graded connected Hopf algebra over
a field k equipped with a character (multiplicative linear functional) : H → k.
We show that the terminal object in the categor...
Semidefinite programming relaxations of non-convex problems in control and combinatorial optimization
Applications of semidefinite programming combinatorial optimization quadratic semi-definite programming bilinear matrix inequality
2015/8/11
We point out some connections between applications of semidefinite programming in control and in combinatorial optimization. In both fields semidefinite programs arise as convex relaxations of NP-hard...