搜索结果: 76-90 共查到“Application”相关记录3032条 . 查询时间(0.326 秒)
EXPLORING SCHEMA MATCHING TO COMPARE GEOSPATIAL STANDARDS: APPLICATION TO UNDERGROUND UTILITY NETWORKS
Schema matching geospatial standard underground utility network
<
2018/11/9
This paper proposes a preliminary analysis of whether a schema matching approach can be applied for the comparison and possible the selection of geospatial standards. Schema matching is tested in the ...
A SWEEP-PLANE ALGORITHM FOR THE SIMPLIFICATION OF 3D BUILDING MODELS IN THE APPLICATION SCENARIO OF WIND SIMULATIONS
3D City models Automated Processing BRep
<
2018/11/9
As the number of virtual 3D city models is steadily increasing, so are the possible applications that take advantage of them. 3D models can be used for applications that range from simple graphic visu...
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Block cipher LowMC Picnic signature algorithm linear equivalence
<
2018/8/28
LowMC is a block cipher family that is optimized for practical instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. It was designed in 2015 by Albrecht e...
Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities
interactive proof sigma protocol witness indistinguishability
<
2018/8/16
We propose a generic construction of a Σ-protocol of commit-and-prove type, which is an \textsc{and}-composition of Σ-protocols on the statements that include a common commitment. Our protocol enables...
The Application of Classification Trees to Pharmacy School Admissions
Application Classification Pharmacy School
<
2018/11/22
In recent years, the American Association of Colleges of Pharmacy (AACP) has encouraged the application of big data analytic techniques to pharmaceutical education. Indeed, the 2013-2014 Academic Affa...
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
indistinguishability obfuscation functional encryption pseudo-randomness
<
2018/7/9
We construct indistinguishability obfuscation from subexponentially secure Learning With Errors (LWE), bilinear maps, a constant-locality Pseudo Random Generator (PRG), and a new tool called Pseudo Fl...
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
N-term Karatsuba Algorithm Specific trinomials Bit-parallel Multiplier
<
2018/6/19
We show that such a type of trinomial combined with the nn-term KA can fully exploit the spatial correlation of entries in related Mastrovito product matrices and lead to a low complexity architecture...
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
indistinguishability oracle silencing provable security
<
2018/6/5
Often the simplest way of specifying game-based cryptographic definitions is apparently barred because the adversary would have some trivial win. Disallowing or invalidating these wins can lead to com...
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
MPC cryptographic protocols
<
2018/5/22
Recent improvements in the state-of-the-art of MPC for non-full-threshold access structures introduced the idea of using a collision-resistant hash functions and redundancy in the secret-sharing schem...
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
Linkable Ring Signature Lattice-Based Cryptography Post-Quantum Cryptography
<
2018/5/2
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which enables the public to verify if two or more signatures were generated by same signatory, whilst still ...
Fine-Grained and Application-Ready Distance-Bounding Security
DB-security properties DB protocols
<
2018/5/2
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...
APPLICATION OF INSAR TECHNOLOGY IN GEOGRAPHICAL SITUATION MONITORING
InSAR Geographical situation monitoring D-InSAR The terrain Deformation Interference figure Application
<
2018/5/15
In this paper, based on the geographical situation monitoring project of the earthquake zone of ludian county, zhaotong city, yunnan province,using the data of the radarsat-2 satellite (time frame is ...
CONSTRUCTION AND APPLICATION OF ENHANCED REMOTE SENSING ECOLOGICAL INDEX
Enhanced Remote Sensing Ecological Index Ecosystem Ecological Environment Quality
<
2018/5/15
In order to monitor the change of regional ecological environment quality, this paper use MODIS and DMSP / OLS remote sensing data, from the production capacity, external disturbance changes and human...
THE APPLICATION OF CHINESE HIGH-SPATIAL-RESOLUTION REMOTE SENSING SATELLITE IMAGE IN LAND LAW ENFORCEMENT INFORMATION EXTRACTION
land use high resolution batch process geoprocessing model information extraction mapping
<
2018/5/15
Chinese high -resolution (HR) remote sensing satellites have made huge leap in the past decade. Commercial satellite datasets, such as GF-1, GF-2 and ZY-3 images, the panchromatic images (PAN) resolut...
APPLICATION OF MULTI-SOURCE REMOTE SENSING IMAGE IN YUNNAN PROVINCE GRASSLAND RESOURCES INVESTIGATION
Remote Sensing Image Grassland Resources NDVI Grassland Degradation Vegetation Coverage Ecological Protection
<
2018/5/14
Trough mastering background information of Yunnan province grassland resources utilization and ecological conditions to improves grassland elaborating management capacity, it carried out grassland res...