>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 transformations相关记录188条 . 查询时间(0.109 秒)
To explore rapid anthocyanin (Anth) detection technology based on remote sensing (RS) in tree peony leaves, we considered 30 species of tree peonies located in Shaanxi Province, China. We used an SVC ...
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
While many spectral transformation techniques have been applied on spectral mixture analysis (SMA), few study examined their necessity and applicability. This paper focused on exploring the difference...
HElib is a software library that implements homomorphic encryption (HE), with a focus on effective use of "packed" ciphertexts. An important operation (which is used in bootstrapping, as well as in ot...
We describe a technique to formally verify the security of masked implementations against side-channel attacks, based on elementary circuit transformations. We describe two complementary approaches: a...
Machine learning models hosted in a cloud service are increasingly popular but risk privacy: clients sending prediction requests to the service need to disclose potentially sensitive information. In t...
Predicate encodings are information-theoretic primitives that can be transformed generically into predicate encryption schemes for a broad class of predicates (Wee, TCC 2014; Chen, Gay, Wee, EUROCRY...
The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advan...
Many older maps were created using reference coordinate systems which are no longer available, either because no information to a datum was taken in the first place or the reference system is forgotte...
Growth charts such as those published by the National Center for Health Statistics (NCHS) consist of a set of smoothed percentile curves showing the distribution of different aspects of body size f...
In the rich literature of secure multi-party computation (MPC), several important results rely on “protocol transformations,” whereby protocols from one model of MPC are transformed to protocols from ...
Computational notions of entropy have recently found many applications, including leakageresilient cryptography, deterministic encryption or memory delegation. The two main types of results which ma...
It can be concluded from an analysis and comparison of the legal and accounting concepts related to the amendment of the Transformation of Business Companies and Cooperatives Act and Regulation 500, t...
At Eurocrypt 2010, Freeman presented a framework to convert cryptosystems based on compositeorder groups into ones that use prime-order groups. Such a transformation is interesting not only from a c...
The main objective of the remotely sensed data fusion is to create an integrated composite image of improved information and enhanced interpretability. This data have geospatial details about earth’s ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...