搜索结果: 1-15 共查到“Counting”相关记录126条 . 查询时间(0.078 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:From curve counting on Calabi-Yau 4-folds to quasimaps for quivers with potentials
Calabi-Yau 曲线计数 4-folds
2023/4/23
From counting blood cells to motion capture, sensors drive patient-centered research(图)
计数血细胞 动作捕捉 传感器
2023/6/8
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Probabilistic Counting Differential Privacy Randomized Response
2019/7/15
Data minimization has become a paradigm to address privacy concerns when collecting and storing personal data. In this paper we present two new approaches, RSTxFM and RRTxFM, to estimate the cardinali...
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
P2KMV analytical expectations
2018/3/9
In this paper, we propose P2KMV, a novel privacy-preserving counting sketch, based on the k minimum values algorithm. With P2KMV, we offer a versatile privacy-enhanced technology for obtaining statist...
Universally Verifiable MPC with Applications to IRV Ballot Counting
IRV Ballot Counting MPC
2018/3/8
We present a very simple universally verifiable MPC protocol. The first component is a threshold somewhat homomorphic cryptosystem that permits an arbitrary number of additions (in the source group), ...
Counting Chromosomes:Plant Scientists Solve A Century-Old Mystery About Reproduction(图)
Counting Chromosomes Plant Scientists Century-Old Mystery Reproduction
2018/2/1
Counting is vital in nature. Counting chromosomes is something that most animals, plants and even single-celled organisms need to know how to do to assure viability and to reproduce. Today, a team of ...
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
implementation side channels
2018/1/12
Motivated by the need to assess the concrete security of a device after a side channel attack, there has been a flurry of recent work designing both key rank and key enumeration algorithms. Two main c...
2018年SPIE光学感应,成像和光子计数会议(SPIE Optical Sensing,Imaging,and Photon Counting:From X-Rays to Thz)
2018年 SPIE 光学感应,成像和光子计数 会议
2017/11/27
Nano-structuring of optoelectronic devices enables photonic detectors, sensors, and imagers with functionalities and properties that surpass traditional bulk devices in virtually any metric; for examp...
2017OSA光学传感、成像和光子计数专题会议(Optical Sensing, Imaging,and Photon Counting:Nanostructured Devices and Applications 2017)
2017 OSA 光学传感、成像和光子计数 专题会议
2017/4/25
2017OSA光学传感、成像和光子计数专题会议(Optical Sensing, Imaging,and Photon Counting:Nanostructured Devices and Applications 2017)。
2017SPIE光子计数应用会议(2017 Conference on Photon Counting Applications)。
Model-counting Approaches For Nonlinear Numerical Constraints
Side-channel Attacks Modulo Exponentiation Quantitative Information Flow
2017/3/21
Model counting is of central importance in quantitative reasoning about systems. Examples include computing the probability that a system successfully accomplishes its task without errors, and measuri...
An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity
Sequence Linear Complexity k-Error Linear Complexity
2016/12/7
The linear complexity and kk-error linear complexity of sequences are important measures of the strength of key-streams generated by stream ciphers. The counting function of a sequence complexity meas...
Counting and Exploring Sizes of Markov Equivalence Classes of Directed Acyclic Graphs
Directed acyclic graphs Markov equivalence class Size distribution Causal- ity
2016/1/26
When learning a directed acyclic graph (DAG) model via observational data, one gener-ally cannot identify the underlying DAG, but can potentially obtain a Markov equivalence class. The size (the numbe...
Multiple Target Counting and Tracking using Binary Proximity Sensors: Bounds, Coloring, and Filter
Multiple Target Counting Tracking using Binary Proximity Sensors Bounds Coloring Filter
2016/1/22
Binary proximity sensors (BPS) provide extremely low cost and privacy preserving features for tracking mobile targets in smart environment, but great challenges are posed for track-ing multiple target...