>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Biased相关记录62条 . 查询时间(0.094 秒)
We design an efficient method for sampling a large batch of dd independent coins with a given bias p∈[0,1]p∈[0,1]. The folklore secure computation method for doing so requires O(λ+logd)O(λ+log⁡d...
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in pub...
The Social Psychology of Biased Self-Assessment     Social  Psychology  Biased  Self-Assessment       font style='font-size:12px;'> 2018/11/22
Objective: To describe the psychological mechanisms that underlie biased self-assessment and suggest pedagogical techniques to counter them. Findings: Since the psychological mechanisms that underlie...
Recently, we showed that the controlled-NOT function is a permutation that cannot be inverted in subexponential time in the worst case [Quantum Information Processing. 16:149 (2017)]. Here, we show th...
Gleaning data from old rocks may result in bias. Now, geophysicists have a way to improve their methods to overcome challenges in studying the history of the Earth's core and magnetic field that make ...
Multiple sensors are used in a variety of geolocation systems. Many use Time Difference of Arrival (TDOA) or Received Signal Strength (RSS) measurements to estimate the most likely location of a signa...
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
We report a free-space entanglement-based quantum key dis-tribution experiment, implementing the biased basis protocol between two sites which are 15.3 km apart. Photon pairs from a polarization-entan...
Secure Key Generation from Biased PUFs     implementation  PUFs  key generation       font style='font-size:12px;'> 2015/12/29
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typically require an error-correcting mechanism (e.g. based on the code-offset method) for dealing wi...
Analyzing the Efficiency of Biased-Fault Based Attacks     Differential Attack  Fault Intensity  Biased Fault       font style='font-size:12px;'> 2015/12/29
The traditional fault analysis techniques developed over the past decade rely on a fault model, a rigid assumption about the nature of the fault. A practical challenge for all faults attacks is to i...
Biased fault attacks such as the Differential Fault Intensity Analysis (DFIA) have been a major threat to cryptosystems in recent times. DFIA combines principles of side channel analysis and fault ...
The DOP Estimation Method Is Biased and Inconsistent     DOP Estimation Method  Biased  Inconsistent       font style='font-size:12px;'> 2015/8/27
A data-oriented parsing or DOP model for statistical parsing associates fragments of linguistic representations with numerical weights, where these weights are estimated by normalizing the empirical f...
A simple variation of the standard biased competition model is shown, via some trivial mathematical manipulations, to be identical to predictive coding. Specifically, it is shown that a particular imp...
Attention acts, through cortical feedback pathways, to enhance the response of cells encoding expected or predicted information. Such observations are inconsistent with the predictive coding theory of...
Riffle shuffles with biased cuts     card shuffl  ing  biased cuts  quasisymmetric functions       font style='font-size:12px;'> 2015/7/7
The well-known Gilbert-Shannon-Reeds model for riffle shuffles assumes that the cards are initially cut‘about in half’ and then riffled together. We analyze a natural variant where t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...