>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到codes相关记录339条 . 查询时间(0.093 秒)
水稻起源于热带和亚热带,对低温十分敏感,当温度低于15℃时水稻便无法正常生长。有统计显示,每年低温冷害导致我国水稻减产约50亿kg。近年来,因直播稻大面积推广以及水稻种植区域不断由热带、亚热带向高海拔、高纬度地区扩张,水稻遭受低温冷害的频率有增加趋势。低温冷害已成为限制我国水稻生产的一大瓶颈。因此,挖掘调控水稻耐冷性的关键基因,研究其作用机理,对防控水稻低温冷害具有重要意义。
Framatome received approval from the US Nuclear Regulatory Commission (NRC) to apply the company's suite of Advanced Codes and Methods to operating conditions with uranium-235 enrichments above the in...
Reed-Solomon (RS) codes are widely used in distributed storage systems, such as HDFS, Google File System II, etc. Generally, a data file is encoded into an RS codeword and stored in n storage nodes wi...
Twisted generalized Reed-Solomon (TGRS) codes get much attention recently. In this talk, we focus on a class of TGRS codes with general ?? twists. Conditions to be MDS or self-dual are discussed.
In distributed storage systems, erasure codes are deployed to ensure system reliability with low storage overhead. Minimum storage cooperative regenerating codes are a class of erasure codes that prov...
2022年6月17日下午,国家级人才称号获得者,清华大学殷柳国教授来中北大学信息与通信工程学院作“Generalized Sparse Codes for Non-Gaussian Channels: Code Design,Algorithms, and Applications”专题报告。本次专题报告是南邮80周年校庆之际通信与信息工程学院举办的第10次“通院学术大讲堂”校庆系列报告会。本次报...
上海财经大学信息管理与工程学院数据挖掘课件 Data Mining with R(Codes)。
Rank metric is a very promising research direction for code-based cryptography. In fact, thanks to the high complexity of generic decoding attacks against codes in this metric, it is possible to easil...
Cryptographic constructions based on hard lattice problems have emerged as a front runner for the standardization of post quantum public key cryptography. As the standardization process takes place, o...
Non-malleable codes are encoding schemes that provide protections against various classes of tampering attacks. Recently Faust et al. (CRYPTO 2017) initiated the study of space- bounded non-malleable ...
It was recently proved that twisted Reed--Solomon codes represent a family of codes which contain a large amount of MDS codes, non-equivalent to Reed--Solomon codes. As a consequence, they were propos...
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can ...
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs in ICS 2010, have emerged in the last few years as a fundamental object at the intersection of cryptography and coding theory. Non-ma...
We construct efficient, unconditional non-malleable codes that are secure against tampering functions computed by decision trees of depth d=n1/4−o(1)d=n1/4−o(1). In particular, each bit of...
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. As this additional ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...