>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Distance相关记录457条 . 查询时间(0.187 秒)
Best subset selection is an important problem in regression analysis,which has many applications in computer science and medicine. However, the existing best subset selection methods have some limitat...
Construction has begun of a 23-kilometre-long pipe that will transport nuclear-generated heat from the Haiyang nuclear power plant in China's Shandong province to a wider area, State Power Investment ...
We present a Bayesian approach to inverse scattering problems of reconstructing the rotation angle in clockwise direction of an acoustically sound-soft obstacle from phaseless far-field data in two di...
How to select the active variables which have significant impact on the event of interest is a very important and meaningful problem in the statistical analysis of ultrahigh-dimensional data. In many ...
Polaritons offer the best of two very different worlds. These hybrid particles combine light and molecules of organic material, making them ideal vessels for energy transfer in organic semiconductors....
It has long been recognized that variations in sea surface temperature in the tropical Pacific affect global climate. The episodic warming of the tropical Pacific during El Niño events causes the...
Due to high biomass and an ability to accumulate metals, fast-growing tree species are good candidates for phytoremediation. However, little is known about the long-distance transport of heavy metals ...
Sampling from the lattice Gaussian distribution plays an important role in various research fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is advanced in several f...
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an nn-bit input and a fixed nn-bit target vector is smaller than some p...
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats b...
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...