>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到quadratic相关记录260条 . 查询时间(0.073 秒)
Stability conditions on triangulated categories are introduced by Bridgeland. For 3-Calabi-Yau triangulated categories from quivers with potentials, the space of stability conditions on this triangula...
Viewingtheadditiveeigenvaluesasamapwithrespecttodomainperturbationbyscal- ing, we show that this map enjoys some regularity. Precisely, let c(λ) be the additive eigenvalue with respect to (1 + r(λ))Ω,...
Sparsity is a naturally occurring characteristic in many real-world applications including signal denoising, outlier detection, and finance. On one hand, sparsity assumption allows people to tackle in...
Let $k$ be a field of characteristic 0 and let $C$ be the a smooth affine curve over $k$. We will first discuss applications of strong approximation to the theory of integral quadratic forms over $C$....
获得准确、连续性好的电场分布数据是开展时间投影电离室(TPC)探测器模拟计算的重要基础。本文基于常用的有限元程序ANSYS,实现了TPC探测器3D电场计算及电场数据在探测器模拟程序GARFIELD中的读入。采用Quadratic Shepard插值法,对电场数据进行了插值处理。计算结果表明,Quadratic Shepard插值法能在周围插值点分布极端不均匀情况下获得较为准确的结果。Quadrat...
We study a question whether the currently known families of quadratic APN polynomials are pairwise different up to CCZ-equivalence. We reduce the list of these families to those CCZ-inequivalent to ea...
We develop exact formulas for the distribution of quadratic residues and non-residues in sets of the form a+X={(a+x)modn∣x∈X}a+X={(a+x)modn∣x∈X}, where nn is a prime or the product of two primes and X...
At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against the boomerang attack which ...
We show that the correlation of any quadratic Boolean function can be read out from its so-called disjoint quadratic form. We further propose a polynomial-time algorithm that can transform an arbitrar...
Despite recent advances in the area of pairing-friendly Non-Interactive Zero-Knowledge proofs, there have not been many efficiency improvements in constructing arguments of satisfiability of quadratic...
Machine learning and group testing are quite useful methods for many different fields such as finance, banks, biology, medicine, etc. These application domains use quite sensitive data, and huge amoun...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation character...
In August 2015 the cryptographic world was shaken by a sudden and surprising announcement by the US National Security Agency (NSA) concerning plans to transition to post-quantum algorithms. Since this...
Asymptotically faster quantum algorithms to solve multivariate quadratic equations.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...