>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Rate相关记录1277条 . 查询时间(0.14 秒)
In this contribution, novel bio-derived rosin acid ester compounds have been developed and used as internal electron donors to prepare MgCl2?supported titanium catalysts for propylene polymerization. ...
Mature forest ecosystems are the most considerable reservoir of organic carbon (OC) among terrestrial ecosystems. The effect of soil type on aboveground OC stocks and their annual increases (AI) of ov...
The effects of composite fabrication, such as pre-curing, curing temperature, and cooling rate, were studied. In this work, the pre-curing was defined as heat treatment of Multi-Walled Carbon Nanotube...
We consider the semiclassical limit from the Hartree equation with Coulomb interaction potential to the Vlasov–Poisson equation. Using a new stability estimate for the difference of the square roots o...
Zero-One Composite Optimization (0/1-COP) is a prototype of nonsmooth, non- convex optimization problems and it has attracted much attention recently. Augmented Lagrangian Method (ALM) has stood out a...
In this talk, we present the pointwise convergence of one-point large deviations rate functions (LDRFs) of the spatial finite difference method and further the fully discrete method based on the tempo...
Fishery collapses can be difficult to forecast and prevent due to hyperstability, a phenomenon where catch rates remain high even as fish abundance declines. In a recent Canadian Journal of Fishe...
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and applications. However, despite tremendous work and progress, all known constructions have prohibitively large public ...
Environmental epidemiologists studying the presence of polyfluoroalkyl substance, PFAS, compounds in new mothers and their babies found that women with gestational diabetes had a significantly higher ...
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-homomorphic encryption schemes to obtain constructions with new properties. Specifically, we present ...
We revisit the concept of *non-malleable* secret sharing (Goyal and Kumar, STOC 2018) in the computational setting. In particular, under the assumption of one-to-one one-way functions, we exhibit a *c...
For the case of split-state tampering, we establish the existence of rate-one continuously non-malleable codes with computational security, in the (non-programmable) random oracle model. We further ex...
Quasi-cyclic moderate density parity check codes allow the design of McEliece-like public-key encryption schemes with compact keys and a security that provably reduces to hard decoding problems for qu...
The success rate is the most common evaluation metric for measuring the performance of a particular side channel attack scenario. We improve on an analytic formula for the success rate.
Although the study of this embedding problem is of independent theoretical interest, we present a few representative applications to secure computation. We construct a linear number of oblivious trans...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...