搜索结果: 1-15 共查到“知识库 a tutorial”相关记录22条 . 查询时间(0.054 秒)
This tutorial demonstrates how cryptographic security notions, constructions, and game-based security proofs can be formalized using the CryptHOL framework. As a running example, we formalize a varian...
A Tutorial Review of Functional Connectivity Analysis Methods and Their Interpretational Pitfalls
functional connectivity (FC) coherence analysis phase synchronization granger causality electrophysiology oscillations
2016/5/3
Oscillatory neuronal activity may provide a mechanism for dynamic network coordination. Rhythmic neuronal interactions can be quantified using multiple metrics, each with their own advantages and disa...
How To Simulate It - A Tutorial on the Simulation Proof Technique
secure computation the simulation technique tutorial
2016/1/27
One of the most fundamental notions of cryptography is that of \emph{simulation}. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, ...
A tutorial on geometric programming
Convex optimization Geometric programming Generalized geometric programming Interior-point methods
2015/8/10
A geometric program (GP) is a type of mathematical optimization problem characterized by objective and constraint functions that have a special form. Recently developed solution methods can solve even...
AN E-LEARNING TUTORIAL FOR RADAR REMOTE SENSING WITH RAT
Content development Assessments and Tests Blended Learning
2015/8/6
E-Learning materials and courses are becoming increasingly established at German universities. One reason for this is that technical prerequisites for successful e-learning – such as private internet ...
Integrating probabilistic models of perception and interactive neural networks: a historical and tutorial review
interactive activation context in perception neural networks probabilistic computation generative models
2015/6/23
This article seeks to establish a rapprochement between explicitly Bayesian models of contextual effects in perception and neural network models of such effects, particularly the connectionist interac...
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
Hidden Markov Models Selected Applications Speech Recognition
2015/1/27
Although initially introduced and studied in the late 1960s and early 1970s, statistical methods ofMarkov source or hidden Markov modeling have become increasingly popular in the last several years. T...
Compressed sensing for practical optical imaging systems: a tutorial
a tutorial practical optical imaging systems
2014/4/16
he emerging field of compressed sensing has potentially powerful implications for the design of optical imaging devices. In particular, compressed sensing theory suggests that one can recover a scene ...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a \emph...
Tutorial Accounting Fundamentals: A New Look of British and American Accounting System
Accounting Fundamentals American Accounting British Accounting Students’ Perceptions
2013/2/23
This paper aims to highlight the perception of graduate and undergraduate students regarding accounting fundamentals across British system and American system. The design of this paper is to derive a ...
Kneadings, Symbolic Dynamics and Painting Lorenz Chaos. A Tutorial
kneading invariant symbolic dynamics T-points Lorenz attractor chaos homoclinic and heteroclinic orbits
2012/4/26
A new computational technique based on the symbolic description utilizing kneading invariants is proposed and verified for explorations of dynamical and parametric chaos in a few exemplary systems wit...
A tutorial on project management from a theory of constraints perspective
critical chain project management theory of constraints tutorial
2011/10/15
Managing projects is a difficult undertaking-a large number of projects fail to be completed on time, on budget, or to specifications. In traditional project management literature, researchers critici...
A key problem in statistical modeling is model selection, how to choose a model at an appropriate level of complexity.
The expectation-maximization (EM) algorithm introduced by Dempster et al [12] in 1977 is a
very general method to solve maximum likelihood estimation problems. In this informal report,
we review the...
The Face-to-Face and the Online Learner:A Comparative Study of Tutorial Support for Open and Distance Language Learning and the Learner Experience with Audio-Graphic SCMC
Face-to-Face Learner Experience Distance Language Learning Online Learner
2009/8/19
This paper reports on a large-scale quantitative study into the student population of the online
and face-to-face versions of a language course to find out whether there are any salient
differences....