搜索结果: 1-9 共查到“计算机科学技术 Extension”相关记录9条 . 查询时间(0.214 秒)
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
block ciphers key-length extension provable security ideal-cipher model
font style='font-size:12px;'>
2016/1/22
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
An Extension of Slow Feature Analysis for Nonlinear Blind Source Separation
slow feature analysis nonlinear blind source separation independent component analysis
font style='font-size:12px;'>
2015/7/15
We present and test an extension of slow feature analysis as a novel approach to nonlinear blind source separation. The algorithm relies on temporal correlations and iteratively reconstructs a set of ...
How to Solve Classification and Regression Problems on High-Dimensional Data with a Supervised Extension of Slow Feature Analysis
Slow feature analysis feature extraction classifi cation regression pattern recognition training graphs nonlinear dimensionality reduction supervised learning high-dimensional data implicitly supervised image analysis
font style='font-size:12px;'>
2015/7/10
Supervised learning from high-dimensional data, e.g., multimedia data, is a challenging task. We propose an extension of slow feature analysis (SFA) for supervised dimensionality reduction called grap...
Spectral Difference Method for Unstructured Grids II: Extension to the Euler Equations
High-order conservation laws unstructured grids spectral difference spectral collocation method Euler equations.
font style='font-size:12px;'>
2015/7/2
An efficient, high-order, conservative method named the spectral difference method has been developed recently for conservation laws on unstructured grids. It combines the best features of struc...
Domain Extension for MACs Beyond the Birthday Barrier.
Domain Extension MACs Birthday Barrier.
font style='font-size:12px;'>
2012/12/3
Given an n-bit to n-bitMAC (e.g., a fixed key blockcipher) withMAC security ε against q queries, we design a variable-length MAC achieving MAC security O(εq poly(n)) against queries of total length qn...
Student Use of the Internet: an extension of TAM in technical and vocational institutions in Brunei Darussalam
Internet usage technology adoption model technical & vocational students
font style='font-size:12px;'>
2009/12/8
In the educational setting, the Internet is profiteering among academics and students. In fact, this has changed the functioning of the educational establishments. However, the success of use of the I...
PKU at ImageCLEF 2008: Experiments with Query Extension Techniques for Text-Base and Content-Based Image Retrieval
PKU at ImageCLEF 2008 Experiments with Query Extension Techniques Text-Base Content-Based Image Retrieval
font style='font-size:12px;'>
2013/7/17
In this paper, we present our solutions for the WikipediaMM task at ImageCLEF 2008. The aim of this task is to investigate effective retrieval approaches in the context of a large-scale and heterogene...
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
Secure Data Warehouse UML profile OCL security confidentiality
font style='font-size:12px;'>
2014/3/12
At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were develo...
An Attribute-Based Delegation Model and Its Extension
Access Control RBAC Delegation Attribute
font style='font-size:12px;'>
2014/3/12
In existing delegation models, delegation security entirely depends on delegators and security administrators, for delegation constraint in these models is only a prerequisite condition. This paper pr...