>>>
搜索结果: 1-15 共查到知识库 Topology相关记录143条 . 查询时间(0.156 秒)
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network with unknown communication graph, where each party only knows its neighbors, to construct a complete ...
A distributed computation in which nodes are connected by a partial communication graph is called topology-hiding if it does not reveal information about the graph beyond what is revealed by the outpu...
A distributed computation in which nodes are connected by a partial communication graph is called \emph{topology-hiding} if it does not reveal information about the graph (beyond what is revealed by t...
The logical theory of branching space-times (Belnap, Synthese 1992), which provides a relativistic framework for studying objective indeterminism, remains mostly disconnected from the discussion of sp...
Stephen Hawking, among others, has proposed that the topological stability of a property of spacetime is a necessary condition for it to be physically significant. What counts as stable, however, depe...
In the early 1920s, Hans Reichenbach and Kurt Lewin presented two topological accounts of time that appear to be interrelated in more than one respect. Despite their different approaches, their underl...
The Aharonov-Bohm effect is typically called ``topological.'' But it seems no more topological than magnetostatics, electrostatics or Newton-Poisson gravity (or just about any radiation, propagation f...
In this paper, we introduce a semi-automated topology generator for 3-D objects, CC-Modeler (CyberCity Modeler).Given the data as point clouds measured on Analytical Plotters or Digital Stations, we p...
This paper’s origin is to reach for a way for automatic initiation of shape hypothesis for Model Based Image Analysis (MBIA) in the specific case of agricultural fields. A solution is to start with lo...
We present a topology-based key setup protocol (ToBKeS) to facilitate the plug and play deployment of cryptography, in networks with known topology. This protocol uses the topology to authenticate ...
Abstract. With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solut...
We study the Reliable Broadcast problem in incomplete networks against a Byzantine adversary. We examine the problem under the locally bounded adversary model of Koo (2004) and the general adversary...
Secure Multi-party Computation (MPC) is one of the foundational achievements of modern cryptography, allowing multiple, distrusting, parties to jointly compute a function of their inputs, while revea...
This paper gives some mathematical methods for the automatic analysis and determination of forest management parameters in particular for the measurements of geometrical sizes on terrestrial scanning ...
Active contour models have been part of extensive research since their introduction in the late eighties, because their concept of coupling the image data with shape control is a powerful method to de...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...