搜索结果: 1-15 共查到“知识库 PROGRAMMING”相关记录290条 . 查询时间(0.106 秒)
*Constrained* pseudorandom functions allow for delegating ``constrained'' secret keys that let one compute the function at certain authorized inputs---as specified by a constraining predicate---while ...
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Secret sharing Information inequalities Rank inequalities
2017/9/25
We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of s...
Vitamin D prenatal programming of childhood metabolomics profiles at age 3 y
airway inflammation, metabolomics, polyunsaturated fatty acids, prenatal programming, vitamin D
2018/11/16
Background: Vitamin D deficiency is implicated in a range of common complex diseases that may be prevented by gestational vitamin D repletion. Understanding the metabolic mechanisms related to in uter...
Vitamin D prenatal programming of childhood metabolomics profiles at age 3 y
airway inflammation metabolomics polyunsaturated fatty acids prenatal programming vitamin D
2018/11/20
Background: Vitamin D deficiency is implicated in a range of common complex diseases that may be prevented by gestational vitamin D repletion. Understanding the metabolic mechanisms related to in uter...
Analysis of AES, SKINNY, and Others with Constraint Programming
Differential Cryptanalysis Integral Cryptanalysis Constraint Programming
2017/2/24
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show ...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
New implementation of OGC Web Processing Service in Python programming language.PyWPS-4 and issues we are facing with processing of large raster data using OGC WPS
OGC Web Processing Service OGC WPS PyWPS Open Source Software Free Software FOSS4G OSGeo Python Server
2016/11/24
The OGC® Web Processing Service (WPS) Interface Standard provides rules for standardizing inputs and outputs (requests and responses) for geospatial processing services, such as polygon overlay. ...
Determining the optimal selling time of cattle:A stochastic dynamic programming approach
decision analysis farm management simulation
2016/11/11
The world meat market demands competitiveness, and optimal livestock replacement decisions can help to achieve this goal. In the article, there is introduced a novel discrete stochastic dynamic progra...
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming
Conversion Bilinear Groups Integer Programming
2016/6/6
Bilinear-type conversion is to convert cryptographic schemes designed over symmetric groups instantiated with imperilled curves into ones that run over more secure and efficient asymmetric groups. In ...
We present Sequoia, a programming language designed to facilitate the development of memory hierarchy aware parallel programs that remain portable across modern machines featuring different memory hie...
Programming the Memory Hierarchy Revisited: Supporting Irregular Parallelism in Sequoia
Programming Memory Hierarchy Revisited Supporting Irregular Parallelism Sequoia
2016/5/24
We describe two novel constructs for programming parallel machines with multi-level memory hierarchies: call-up, which allows a child task to invoke computation on its parent, and spawn, which spawns ...
Regent: A High-Productivity Programming Language for HPC with Logical Regions
Regent Legion logical regions task-based runtimes
2016/5/24
We present Regent, a high-productivity programming language for high performance computing with logical regions. Regent users compose programs with tasks (functions eligible for parallel execution) an...
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
public-key cryptography zero-knowledge efficiency
2016/5/9
These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of thi...
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Finite automaton ARX cipher Modulo addition
2016/4/7
Inspired by Fu et al. work on modeling the exclusive-or differential property of the modulo addition as an mixed-integer programming problem, we propose a method with which any finite automaton can be...
TV BROADCASTING FREQUENCY PROGRAMMING BASED ON GIS
Shoreline Frequency Programming Spatial Analysis Spatial Visualization Data Integration Model Assistant Decision-making
2016/3/17
In recently years, GIS has a high-speed development and has made a great progress in its own field. This paper applies theory and method of geographic information system to TV Broadcasting frequency p...