Summary: [For the entire collection see Zbl 0753.00021.] We provide a new sorting algorithm which is optimal with respect to several known, and new, measur... C Levcopoulos,O Petersson - Springer-Verlag 被引量: 67发表: 1989年 Study of Preprocessing Methods for the Determination of Crystallin...
SummaryChromated copper arsenate (CCA) wood-treating solutions are infrequently re-used and are often disposed of by many pilot-plant operations and by most research laboratories. Disposal of toxic CCA is difficult and expensive. This paper discusses laboratory precipitation treatments to facilitate separ...
Cholangiocarcinoma (CCA) is a heterogeneous group of malignancies that can emerge at every point of the biliary tree, from the canals of Hering to the main bile duct1,2. According to their anatomical location, CCAs are classified as intrahepatic (iCCA), perihilar (pCCA) and distal CCA (dCCA...
performance of proposed soft label method, some classification experiments are performed on ORL human face dataset (free available at: <http://www.uk.research.att.com/facedatabase.html>) and 10 UCI machine learning repository (free available at: <http://www.ics.uci.edu/~mlearn/MLSummary....
1. Summary of our IND-CCA notions for PKE. 31 basic rationale for the no-challenge-decryption condition, namely that if the adversary queries C∗ it wins trivially, holds true regardless of the phase in which the query is made and thus supports either choice. The existence of this choice...
This article provides information on research conducted by the Research Board of the English Institute in November 1982 into the usefulness of current cost accounting (CCA) to coincide with the expiry of the three-year e...
Summary: We give the first perfectly rerandomizable, Replayable-CCA (RCCA) secure encryption scheme, positively answering an open problem of {\\it R.~Canetti, H.~Krawczyk} and {\\it J.~B.~Nielsen} ["Relaxing chosen-ciphertext security", ... M Prabhakaran,M Rosulek - Advances in Crypto...
Summary以青岛市为研究区,利用1990、2000、2006和2011年遥感数据、社会经济统计数据等,采用多变量分析方法定量分析了近20年青岛市土地利用变化的驱动因子。首先对1990和2011年土地利用变化数据进行叠加分析,提取出主要土地利用类型发生变化的斑块,构建土地利用变化样本数据矩阵;然后提取变化图斑对应驱动因子的栅格数据,构建土...
Summary: Imagine many small devices send data to a single receiver, encrypted using the receiver's public key. Assume an adversary that has the power to ad... S Fehr,D Hofheinz,E Kiltz,... - International Conference on Theory & Applications of Cryptographic Techniques 被引量: 128发表: 2010...
(See next section for details and Table 1 for summary.) On the other hand, important messages can be very short; A PIN number typically consists of 4 digits. And such a short information would be often used in applications that have sharp limitations in bandwidth or storage where saving ...