工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 人工智能 计算机系统结构 计算机软件 计算机工程 计算机应用 计算机科学技术其他学科
搜索结果: 1-9 共查到计算机科学技术 Extension相关记录9条 . 查询时间(0.214 秒)
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
We present and test an extension of slow feature analysis as a novel approach to nonlinear blind source separation. The algorithm relies on temporal correlations and iteratively reconstructs a set of ...
Supervised learning from high-dimensional data, e.g., multimedia data, is a challenging task. We propose an extension of slow feature analysis (SFA) for supervised dimensionality reduction called grap...
An efficient, high-order, conservative method named the spectral difference method has been developed recently for conservation laws on unstructured grids. It combines the best features of struc...
Domain Extension for MACs Beyond the Birthday Barrier.     Domain Extension  MACs  Birthday Barrier.       font style='font-size:12px;'> 2012/12/3
Given an n-bit to n-bitMAC (e.g., a fixed key blockcipher) withMAC security ε against q queries, we design a variable-length MAC achieving MAC security O(εq poly(n)) against queries of total length qn...
In the educational setting, the Internet is profiteering among academics and students. In fact, this has changed the functioning of the educational establishments. However, the success of use of the I...
In this paper, we present our solutions for the WikipediaMM task at ImageCLEF 2008. The aim of this task is to investigate effective retrieval approaches in the context of a large-scale and heterogene...
A UML 2.0/OCL Extension for Designing Secure Data Warehouses     Secure Data Warehouse  UML profile  OCL  security  confidentiality       font style='font-size:12px;'> 2014/3/12
At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were develo...
An Attribute-Based Delegation Model and Its Extension     Access Control  RBAC  Delegation  Attribute       font style='font-size:12px;'> 2014/3/12
In existing delegation models, delegation security entirely depends on delegators and security administrators, for delegation constraint in these models is only a prerequisite condition. This paper pr...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...