>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到G-computation相关记录745条 . 查询时间(0.163 秒)
In this talk, we discuss the approximation and computation for the linear and nonlinear eigenvalue problems in photonic crystals. We discretize the shifted Maxwell operator with edge finite elements a...
认知科学是研究包括心理科学和计算科学在内的多个学科,在对智能本源的共同兴趣基础上诞生的新兴学科。”认知和计算的关系“是认知科学的核心理论问题,也是新一代人工智能的核心基础科学问题。报告从认知科学发展的角度,系统介绍了”认知和计算关系“研究的历史。在认知科学的经典符号主义和联结主义时代,物理符号系统和多层知觉机都是图灵机等价的系统,因此可以认为认知是图灵可计算的。在当今的具身认知科学中,该问题尚无明...
The key to electrochemical energy storage systems such as Li/Na-ion batteries is materials. The traditional method for exploring new materials is trial-and-error, which often takes a dozen years durin...
Phononic crystals are composite materials with periodic distribution of two or more media. The difficulty of computing the band structure of the phononic crystals lies in capturing the complex geometr...
As scientists push the boundaries of machine learning, the amount of time, energy, and money required to train increasingly complex neural network models is skyrocketing. A new area of artificial inte...
何勇教授团队长期致力于同步自动机领域的研究,近期在该研究方向取得新进展。研究成果以“Extremal synchronizing circular automata”为题,于2021年12月8日在线发表于Information and Computation杂志上,该期刊是中国计算机学会(CCF)指定的A类学术期刊。
Two of the most sought-after properties of Multi-party Computation (MPC) protocols are fairness and guaranteed output delivery (GOD), the latter also referred to as robustness. Achieving both, however...
Secure Multi-Party Computation (MPC) enables a group of nn distrusting parties to jointly compute a function using private inputs. MPC guarantees correctness of computation and confidentiality of inpu...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPDZ2kZ2k that allows for secure multiparty computation (MPC) in the dishonest majority setting over the ring of integer...
Secure Multi-party Computation (MPC) with small population and honest majority has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer...
Transport layer: Although significantly improved, the performance of 2PC is still prohibitive for practical systems. Contrary to the common belief that bandwidth is the remaining bottleneck for 2PC im...
Verifiable computing (VC) is a complexity-theoretic method to secure the integrity of computations. The need is increasing as more computations are outsourced to untrusted parties, e.g., cloud platfor...
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead t...
One of the main goals of securing data transmission is focused on the security of cloud data storage. In this paper, we describe several cryptographic techniques which can be used to address the relev...
Secure multi-party computation permits evaluation of any desired functionality on private data without disclosing the data to the participants and is gaining its popularity due to increasing collectio...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...