>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到Characterizing相关记录69条 . 查询时间(0.062 秒)
The aroma profile of raw pu’er tea (RPT) depends on its storage duration (2–10 years) and storage conditions (wet-hot or dry-cold environment). We analyzed the major odorants of RPT samples by perform...
Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building block for several cryptographic schemes in recent years. Recently, two lattice subfield attacks and a subring atta...
Linicrypt (Carmer & Rosulek, Crypto 2016) refers to the class of algorithms that make calls to a random oracle and otherwise manipulate values via fixed linear operations. We give a characterization o...
A basic question of cryptographic complexity is to combinatorially characterize all randomized functions which have information-theoretic semi-honest secure 2-party computation protocols. The correspo...
Evaluating the side-channel attacks (SCAs) resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metr...
Although the chemical, physical, and nutritional properties of bovine milk have been extensively studied, only a few studies have attempted to characterize milk-synthesizing genes using RNA-seq data. ...
The well known impossibility result of Cleve (STOC 1986) implies that in general it is impossible to securely compute a function with complete fairness without an honest majority. Since then, the ac...
The Schrodinger’s cat thought experiment highlights the counterintuitive concept of entan-glement in macroscopically distinguishable systems. The hallmark of entanglement is the detection of strong co...
Vegetation plays an important role in the exchange of carbon dioxide, water, and energy between the land surface and the atmosphere. LAI, defined as one-half the total green leaf area per unit of grou...
Although forest fragmentation and degradation have been recognized as one of major threats to wild panda population, little is known about the relationship between panda distribution and forest fragme...
The encryption scheme NTRU is designed over a quotient ring of a polynomial ring. Basically, if the ring is changed to any other ring, NTRU-like cryptosystem is constructible.
This article describes the development of artifact collection and scoring procedures to characterize classroom practice in mathematics and science. A data collection tool called the “Scoop Notebook” w...
Using a kinetic model of epitaxial growth, we describe how geometry controls kinetic pathways through which external deposition influences the state of a vicinal surface. The state of the surface is d...
We characterize when the elementary diagram of a mutually algebraic structure has a model complete theory, and give an explicit description of a set of existential formulas to which every formula i...
This article focuses on the analysis and prediction of corrections, defined as turns where a user tries to correct a prior error made by a spoken dialogue system. We describe our labeling procedure of...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...