搜索结果: 1-15 共查到“optimality”相关记录83条 . 查询时间(0.062 秒)
深圳大学管理学院运筹学课件 POST OPTIMALITY ANALYSIS。
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Coppersmith's method lattices polynomial congruences
2016/12/9
We draw a new connection between Coppersmith's method for finding small solutions to polynomial congruences modulo integers and the capacity theory of adelic subsets of algebraic curves. Coppersmith's...
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
symmetric searchable encryption provable security secret-key cryptography
2016/1/27
Symmetric Searchable Encryption (SSE) is a very efficient and practical way for data owners to outsource
storage of a database to a server while providing privacy guarantees. Such SSE schemes enable
...
Optimality of Pairwise Blocked Definitive Screening Designs
Blocking Definitive screening design Optimality Generalized minimum aberration Fold-over
2016/1/26
Definitive screening designs are a new class of three-level designs which are shown superior to the classical central composite designs in response surface methodology. They can be constructed by inse...
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
indistinguishability proofs conditional equivalence random systems
2016/1/23
Most cryptographic security proofs require showing that two systems are indistinguishable. A central tool in such proofs is that of a game, where winning the game means provoking a certain condition...
Optimality of Pairwise Blocked Definitive Screening Designs
Blocking Definitive screening design Optimality Generalized minimum aberration Fold-over
2016/1/20
Definitive screening designs are a new class of three-level designs which are shown superior to the classical central composite designs in response surface methodology. They can be constructed by inse...
On the Optimality of Differential Fault Analyses on CLEFIA
CLEFIA Differential Fault Analysis Fault Attack
2016/1/8
Differential Fault Analysis is a powerful cryptanalytic tool to reveal secret keys of cryptographic algorithms. By corrupting the computation of an algorithm, an attacker gets additional information a...
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Cryptographic protocols secure multi-party computation fairness
2016/1/3
In his seminal result, Cleve [STOC’86] established that secure distributed computation—
guaranteeing fairness—is impossible in the presence of dishonest majorities. A generous number
of proposals fo...
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
XLS CMC Luby-Rackof
2015/12/31
It is well known that three and four rounds of balanced Feistel
cipher or Luby-Rackoff (LR) encryption for two blocks messages are
pseudorandom permutation (PRP) and strong pseudorandom permutation
...
A note on the optimality of frequency analysis vs. ℓp-optimization
Property-Preserving Encrypted Databases
2015/12/18
Naveed, Kamara, and Wright’s recent paper “Inference Attacks on Property-Preserving Encrypted
Databases” (ACM-CCS 2015) evaluated four attacks on encrypted databases, such as those based
on the desi...
The Complexity of Ranking Hypotheses in Optimality Theory
Complexity Ranking Hypotheses Optimality Theory
2015/9/7
Given a constraint set with k constraints in the framework of Optimality Theory (OT), what is its capacity as a classification scheme for linguistic data? One useful measure of this capacity is the si...
There are several ways in which the algorithmic acquisition of language knowledge and behavior can be studied. One important area of research is the computational modeling of human language acquisitio...
Optimality Theory
Optimality Theory McCarthy
2015/8/25
Ren′e Kager’s textbook is one of the first to cover Optimality Theory (OT), a declarative
grammar framework that swiftly took over phonology after it was introduced by
Prince, Smolensky, and M...
Counter Braids: Asymptotic Optimality of the Message Passing Decoding Algorithm
Counter structure braids high-speed link counter braid
2015/8/21
A novel counter architecture, called Counter Braids, has recently been proposed for per-flow counting on high-speed links. Counter Braids has a layered structure and compresses the flow si...
Recovering Edges in Ill-Posed Inverse Problems: Optimality of Curvelet Frames
Ill-Posed Inverse Problems Regularization
2015/8/21
We consider a model problem of recovering a function f(x1; x2) from noisy Radon
data. The function f to be recovered is assumed smooth apart from a discontinuity
along a C2 curve { i.e. an edge. We ...