>>>
搜索结果: 1-15 共查到range相关记录685条 . 查询时间(0.182 秒)
A popular self-normalization (SN) approach in time series analysis uses the variance of a partial sum as a self-normalizer. This is known to be sensitive to irregularities such as persistent autocorre...
Graphs -- data structures that show relationships among objects -- are highly versatile. It's easy to imagine a graph depicting a social media network's web of connections.But graphs are also used in ...
Seed vigour significantly influences the seed production and plant regeneration performance. The capability of NIR spectroscopy to identify seed vigour across multiple tree species rapidly and cost-ef...
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and applications. However, despite tremendous work and progress, all known constructions have prohibitively large public ...
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
Orthotropic tension behaviors of poplar and Chinese fir were investigated at a wide relative humidity (RH) range. Background and Objectives: Poplar and Chinese fir are typical plantation tree species ...
Dynamic searchable symmetric encryption (DSSE) allows a client to search or update over an outsourced encrypted database. Range query is commonly needed (AsiaCrypt'18) but order-preserving encryption ...
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
The present paper illustrates a part of the methodological process of image-based acquisition developed for the documentation of the historical city center of Bethlehem, in the Middle East territory. ...
Metric documentation of buildings requires the connection of different spaces, such as rooms, corridors, floors, and interior and exterior spaces. Images and laser scans have to be oriented and regist...
Haryana state is an intensively cultivated state, and deficient in natural forests. One of the mandate of Haryana Forest Department (HFD) is to afforest for maintenance of environmental stability and ...
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
2018年,国际著名期刊《Journal of Hydrology》刊发了中国地质大学关于美国西部怀俄明州拉勒米地区山区裂缝性花岗岩地下水系统综合表征的研究成果。论文第一作者为资源学院2015级博士研究生任双坡。该研究成果来源于资源学院姚光庆教授科研团队与美国怀俄明大学地质系Ye Zhang教授合作项目。论文第一作者赴美国怀俄明大学联合培养期间受到学校“研究生国际交流基金”资助。
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
Efficient Range ORAM with O(log2N) Locality     ORAMs  RAM       2018/5/23
Oblivious RAM protocols (ORAMs) allow a client to access data from an untrusted storage device without revealing to that device any information about their access pattern. Typically this is accomplish...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...