>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到error相关记录519条 . 查询时间(0.06 秒)
Forest biomass measurement or estimation is critical for forest monitoring at the stand scale, but errors among different estimations in stand investigation are unclear. Thus, the Pinus densata natura...
In this paper, we will provide the the finite element method for the electro-osmotic flow in micro-channels, in which a convection-diffusion type equation is given for the charge density ρe. A time-di...
In quantum information theory, the error exponents characterize the best rate of exponential convergence of the error towards 0 or 1, as the number of copies of the underlying resources increases. In ...
We focus on numerical study of the dynamical Ginzburg-Landau equations under the temporal gauge, and propose a decoupled numerical scheme based on the finite element method. For the variable A, the se...
We establish improved uniform error bounds for the time-splitting methods for the long-time dynamics of the nonlinear Schr\"odinger equation (NLSE) with weak nonlinearity. By a new technique of regula...
Quantum error correction theory lies at the heart of universal quantum computing. So far, people do not find or realize good-enough error correction codes yet. In this talk, I will survey the foundati...
There is a big gap between the so-called NISQ (noisy intermediate-scale quantum) and FTQ (fault-tolerant quantum) computing. Recently, we introduced QEQ (quasi-exact quantum) computing, which lies in ...
In this paper, a posteriori error estimate of a weak Galerkin (WG) finite element method for solving H(curl)-elliptic problems is designed and analyzed. Firstly, a WG method for H(curl)-elliptic probl...
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. As this additional ...
Lattice-based cryptography is one of the leading candidates for NIST's post-quantum standardisation effort, providing efficient key encapsulation and signature schemes. Most of these schemes base thei...
Decryption failure is a common phenomenon in most lattice-based public-key schemes. To reduce the rate of decryption failure, application of error correction code can be helpful. However, the literatu...
Randomness is an essential part of any secure cryptosystem, but many constructions rely on distributions that are not uniform. This is particularly true for lattice based cryptosystems, which more oft...
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have ...
Current estimation techniques for the probability of decryption failures in Ring/Mod-LWE/LWR based schemes assume independence of the failures in individual bits of the transmitted message to calculat...
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daeman and Rijmen (2007) had obtained the distributions of the correlations ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...