>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Cut相关记录181条 . 查询时间(0.187 秒)
探讨建立高效液相色谱质谱-串联质谱联合检测(liquid chromatography-tandem mass spectrometry,LC-MS/MS)技术检测新生儿干血斑甲基丙二酸(methylmalonic acid,MMA)和同型半胱氨酸(homocysteine,Hcy)cut-off值的方法。方法?收集本院分娩的新生儿MS/MS筛查中C3、C3/C2和C3/C0任一指标偏高的正常干血...
Cut-and-choose (C&C) is the standard approach to making Yao’s garbled circuit two-party computation (2PC) protocol secure against malicious adversaries. Traditional cut-and-choose operates at the leve...
Cost-aware cut-and-choose game is a fundamental technique that has many cryptographic applications. Best existing solutions of this game assumed for simplicity that the number of challenges is publicl...
Garbled RAM, introduced by Lu and Ostrovsky (Eurocrypt 2013), provides a novel method to garble RAM (Random Access Machine) programs directly. It can be seen as a RAM analogue of Yao's garbled circuit...
The Learning with Errors (LWE) is one of the most promising primitive for post-quantum cryptography due to its strong security reduction from the worst-case of NP-hard problems and its lightweight ope...
LiDAR (Light Detection and Ranging) is a routinely employed technology as a 3-D data collection technique for topographic mapping. Conventional workflows for analyzing LiDAR data require the ground to...
古建墙壁题记毛笔文字受霉变污染影响,字迹不清,不利于辨识,而传统算法对文字图像进行分割时未充分考虑污染和文字的特征信息,结果中往往存在误分割或缺损现象。本研究提出一种结合图像偏振信息的多特征引导Grab Cut分割算法,该方法首先对采集的0°、45°、90°、135°四个角度偏振图像进行斯托克斯解算,得到偏振度特征图;然后利用SLIC对可见光相机采集的题记图像进行超像素分割,并提取超像素的颜色特征...
Secure two party computation (2PC) is a well-studied problem with many real world applications. Due to Cleve’s result on general impossibility of fairness, however, the state-of-the-art solutions on...
With relatively few exceptions, the literature on efficient (practical) secure computation has focused on secure two-party computation (2PC). It is, in general, unclear whether the techniques used t...
Protocols for secure two-party computation enable a pair of mistrusting parties to compute a joint function of their private inputs without revealing anything but the output. One of the fundamental te...
In secure two-party computation protocols, the cut-and-choose paradigm is used to prevent the malicious party who constructs the garbled circuits from cheating. In previous realization of the cutand-...
In recent years, secure two-party computation (2PC) has been demonstrated to be feasible in practice. However, all efficient general-computation 2PC protocols require multiple rounds of interaction ...
In this paper we present an identity-set-based broadcast encryption scheme with three working modes: positive membership (Select-mode), all member (All-mode), and negative membership (Cut-mode) over t...
Divisible e-cash, proposed in 1991 by Okamoto and Ohta, addresses a practical concern of electronic money, the problem of paying the exact amount. Users of such systems can indeed withdraw coins of ...
Taking advantages of geo-spatial technology integrated with monitoring methods, and aiming at high-cut slope monitoring and management, this paper proposed a new concept of high-cut slope geo-spatial ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...