>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Competition相关记录286条 . 查询时间(0.078 秒)
Machine learning is nowadays supplanting or extending human expertise in many domains ranging from board games to text translation. Correspondingly, the use of such tools is also on the rise in comput...
The Open Source Geospatial Foundation’s (OSGeo) vision is to empower everyone, from pre-university students to professionals, with open source geospatial applications, tools and resources. In 2017, OS...
One of the 3 tracks of iDASH Privacy & Security Workshop 2017 competition was to execute a whole genome variants search on private genomic data. Particularly, the search application was to find the to...
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, Ketje Jr, ICEPOLE-128a, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver a...
The paper analyses the effects of asymmetric competition on food industry with product substitutability by establishing a two-stage dynamic game model. The equilibrium is captured under both the Courn...
Forest canopy structure is composed by the various species. Sun light is a main factor to affect the crown structures after tree competition. However, thinning operation is an appropriate way to contr...
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and proper...
The purpose of the study was to measure the demands of off-road cycling via portable spirometry, leg-power output (PO), heart rate (HR) and blood lactate (BLa) concentration. Twenty-four male competit...
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 48 remaining first-round s...
In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security, e...
For optimal speed, please run our manually optimized code. Our compiler-generated code results in 1% to 2% larger circuit sizes than the manually optimized code. The difference in actual running tim...
Password hashing is the common approach for maintaining users’ password-related information that is later used for authentication. A hash for each password is calculated and maintained at the servic...
3D city model reconstruction is one of the main application of airborne laser scanning system. Roof detection is a primary step which needs to find each roof from irregular point clouds with noise poi...
We estimate the value of competition in United States Forest Service (USFS) timber auctions, in the context of the Reagan administration’s bailout of firms that faced substantial losses on existing co...
I examine Health Maintenance Organizations’ (HMOs) voluntary disclosure of product quality, which is not as complete as unraveling theories predict. After controlling for cost and demand factors, I &...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...