>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到Expander相关记录17条 . 查询时间(0.08 秒)
Any dd-regular graph on nn vertices with spectral expansion λλ satisfying n=Ω(d3log(d)/λ)n=Ω(d3log⁡(d)/λ) yields a O(λ3/2d)O(λ3/2d)-non-malleable code in the split-state model.
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur depen...
Our proofs are based on a new search-to-decision reduction for expander-based functions. This extends a previous reduction of the first author (STOC 2012) which was applicable for the special case of ...
Threshold secret sharing is a protocol that allows a dealer to share a secret among nn players so that any coalition of tt players learns nothing about the secret, but any t+1t+1 players can reconstru...
We develop new schemes for deterministically updating a stored cryptographic key that provide security against an internal adversary who can control the update computation and leak bounded amounts of ...
A growth and digestibility study was conducted using Osmanabadi goat male kids by feeding complete diets in the form of mash or expander extruded pellets containing different levels of red gram (Cajan...
Chunked codes are a variation of random linear network codes with low computational complexities. In chunked codes, the packets in a file are grouped into small (non-overlapped or overlapped) chunks, ...
A novel planar zoom module (PZM) is presented in this article. The PZM is realized by integrating optical elements on its surfaces with the folding optical axis and performing the zoom function by tra...
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
We investigate deterministic design matrices for the fundamental problems of error prediction and model selection. Our deterministic design matrices are constructed from unbalanced expander graphs, a...
Using the construction of a nonorientable Curtis-Tits group of type A˜n, we obtain new explicit families of expander graphs of valency five for unitary groups over finite fields.
Rapid maxillary expansion (RME) in the adult is thought to be an unreliable procedure with several adverse side effects and, consequently, surgically assisted RME is considered the preferred proce...
The aim of this study was to determine the sagittal, transverse, and vertical effects of a Nitanium maxillary expansion appliance on dentofacial structures in patients with bilateral posterior cross...
This prospective clinical study evaluated the short-term treatment effects of acrylic-splint rapid maxillary expander in conjunction with lower Schwarz appliance (RME-Sz) therapy to the acrylic-spli...
We propose constructing provable collision resistant hash functions from expander graphs. As examples, we investigate two specific families of optimal expander graphs for provable hash function cons...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...