>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Existence相关记录323条 . 查询时间(0.13 秒)
For the classical N-body problem, Maderna-Venturelli [Ann. Math. 2020] proved the existence of hyperbolic motions with any positive energy constant, starting from any configuration and along any nonco...
The class of strongly quasiconvex functions was introduced in the famous paper of B.T. Polyak in 1966. It is the natural extension of the class of strongly convex functions, its applications emcompass...
In this talk, we shall prove the global existence and the large time decay estimate of solutions to compressible Prandtl system with small initial data, which is analytical in the tangential variable....
In this talk, we prove that Bernoulli percolation on graph undergoes a non-trivial phase transition if the graph has bounded degrees and random walk on the graph has a heat kernel with rapid decay. Th...
New evidence confirms that first-ever pictures do capture the birth of a pair of planets orbiting the star PDS 70.Using a new infrared pyramid wavefront sensor for adaptive optics correction at the...
New evidence confirms that first-ever pictures do capture the birth of a pair of planets orbiting the star PDS 70.Using a new infrared pyramid wavefront sensor for adaptive optics correction at the...
Recently, Lyubashevsky & Seiler (Eurocrypt 2018) showed that small polynomials in the cyclotomic ring Zq[X]/(Xn+1)Zq[X]/(Xn+1), where nn is a power of two, are invertible under special congruence cond...
How much we say, to whom, and when, is inherently telling, even if the contents of our communication is unclear. In other words: encryption is not enough; neither to secure privacy, nor to maintain co...
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt’95 (adapted to Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making such attacks wo...
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
In this work, we study the feasibility of ZK proofs using non-black-box simulation. Our main result is that three round private-coin ZK proofs for NP do not exist (even w.r.t. non-black-box simulation...
The contribution is focused on Alessandro Antonelli’s project for the seat of the new italian parliament in Turin. The project, unrealized, began back in 1860, when the annexation to the Piedmont of T...
Lin and Tessaro (Eprint 2017/250) recently proposed indistinguishability obfuscation and functional encryption candidates and proved their security based on a standard assumption on bilinear maps and ...
A (t,s,v)(t,s,v)-all-or-nothing transform is a bijective mapping defined on ss-tuples over an alphabet of size vv, which satisfies the condition that the values of any tt input co-ordinates are comple...
An attempt to resolve the controversy regarding the solution of the Sleeping Beauty Problem in the framework of the Many-Worlds Interpretation led to a new controversy regarding the Quantum Sleeping B...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...