>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到exponential相关记录267条 . 查询时间(0.265 秒)
In this talk, I shall explain the work of G. Faltings on a p-adic Simpson correspondence, using exponential twisting. This reinterpretation of the correspondence makes clearer analogy between the p-ad...
In this talk, we consider normalized solutions of nonlinear Schrodinger equations in the plane when the nonlinearity satisfies an exponential critical growth. To study the normalized solutions by usin...
When two balls in a metric space have small intersection? We give some natural conditions to guarantee an exponential decay on the volume of such intersections. Our proof is conceptually simple, makin...
In this talk, we consider a class of exponential time differencing (ETD) schemes for solving the nonlocal Cahn-Hilliard equation. We first use the Fourier collocation method to discretize the space do...
I will present the joint work with Jialun Li and Pratyush Sarkar in the talk. As a final work to establish that the frame flows for geometrically finite hyperbolic manifolds of arbitrary dimensions ar...
I will present the joint work with Jialun Li and Pratyush Sarkar in the talk. As a final work to establish that the frame flows for geometrically finite hyperbolic manifolds of arbitrary dimensions ar...
A secret sharing scheme allows a dealer to distribute shares of a secret among a set of nn parties P={p1,…,pn}P={p1,…,pn} such that any authorized subset of parties can reconstruct the secret, yet any...
Rank estimation is an important tool for a side-channel evaluations laboratories. It allows estimating the remaining security after an attack has been performed, quantified as the time complexity and ...
A secret-sharing scheme for a monotone Boolean (access) function F:{0,1}n→{0,1}F:{0,1}n→{0,1} is a randomized algorithm that on input a secret, outputs nn shares s1,…,sns1,…,sn such that for any (x1,…...
Despite fifteen years of research on the round complexity of non-malleable commitments, their exact round complexity has remained open. In particular, the goal of achieving non-malleable commitment pr...
A new method for determining the relative Faraday cup efficiency (RFCE) for nine Faraday cups has been developed using 86Sr, 87Sr, and 88Sr isotope signals, and the exponential mass fractionation law...
Indistinguishability obfuscation (iO) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose iO and other minimalistic assum...
Consider a superdiffusion X on R d corresponding to the semilinear operator A(u) = Lu + βu − ku 2 , where L is a second order elliptic operator, β(·) is in the Kato class and bounded from above,...
Consider a superdiffusion X on R d corresponding to the semilinear operator A(u) = Lu + βu − ku 2 , where L is a second order elliptic operator, β(·) is in the Kato class and bounded from above,...
The paper is about algorithms for the inhomogeneous short integer solution problem: Given (A, s) to find a short vector x such that Ax ≡ s (mod q). We consider algorithms for this problem due to Cam...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...