Results 1 - 10
of
10,419
Results to Key Assumptions
, 2007
"... Adelaide University to strengthen teaching and research in the field of international economics and closely related disciplines. Its specific objectives are: • to promote individual and group research by scholars within and outside the Adelaide University • to strengthen undergraduate and post-gradu ..."
Abstract
- Add to MetaCart
Adelaide University to strengthen teaching and research in the field of international economics and closely related disciplines. Its specific objectives are: • to promote individual and group research by scholars within and outside the Adelaide University • to strengthen undergraduate and post-graduate education in this field • to provide shorter training programs in Australia and elsewhere • to conduct seminars, workshops and conferences for academics and for the wider community • to publish and promote research results • to provide specialised consulting services • to improve public understanding of international economic issues, especially among policy makers and shapers Both theoretical and empirical, policy-oriented studies are emphasised, with a particular focus on developments within, or of relevance to, the Asia-Pacific
Entity Authentication and Key Distribution
, 1993
"... Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of these p ..."
Abstract
-
Cited by 578 (13 self)
- Add to MetaCart
Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment
RETHINKING A KEY ASSUMPTION ABOUT THE NATURE OF TIME
"... To move forward is to concoct new patterns of thought, which in turn dictate the design of the models and experiments. Easy to say, difficult to achieve [1].-- Edward O. Wilson Abstract. This essay challenges an assumption, far too commonly held within the scientific community, that the operational ..."
Abstract
- Add to MetaCart
To move forward is to concoct new patterns of thought, which in turn dictate the design of the models and experiments. Easy to say, difficult to achieve [1].-- Edward O. Wilson Abstract. This essay challenges an assumption, far too commonly held within the scientific community, that the operational
Burer’s Key Assumption for Semidefinite and Doubly Nonnegative Relaxations
, 2010
"... Abstract. Burer has shown that completely positive relaxations of nonconvex quadratic programs with nonnegative and binary variables are exact when the binary variables satisfy a so-called key assumption. Here we show that introducing binary variables to obtain an equivalent problem that satisfies t ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Burer has shown that completely positive relaxations of nonconvex quadratic programs with nonnegative and binary variables are exact when the binary variables satisfy a so-called key assumption. Here we show that introducing binary variables to obtain an equivalent problem that satisfies
Public-key cryptosystems based on composite degree residuosity classes
- IN ADVANCES IN CRYPTOLOGY — EUROCRYPT 1999
, 1999
"... This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes: a trapdoor permutation and two homomorphic probabilist ..."
Abstract
-
Cited by 1009 (4 self)
- Add to MetaCart
This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes: a trapdoor permutation and two homomorphic
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
- CRYPTO '98
, 1998
"... A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. There appears to be no previous cryptosystem in the literature that enjoys both of these properties simu ..."
Abstract
-
Cited by 540 (17 self)
- Add to MetaCart
A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. There appears to be no previous cryptosystem in the literature that enjoys both of these properties
Experimental investigation of key assumptions in analytical failure criteria for sheet metal forming”,
- Proceedings of NAMRI,
, 2011
"... ABSTRACT In this paper, the key assumptions in the M-K and effective stress ratio models are investigated for AISI 1018 steel specimens with a thickness of 0.78 mm using experimental and numerical data from Marciniak tests. The experimental procedure included Digital Imaging Correlation (DIC) to me ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
ABSTRACT In this paper, the key assumptions in the M-K and effective stress ratio models are investigated for AISI 1018 steel specimens with a thickness of 0.78 mm using experimental and numerical data from Marciniak tests. The experimental procedure included Digital Imaging Correlation (DIC
Blind Beamforming for Non Gaussian Signals
- IEE Proceedings-F
, 1993
"... This paper considers an application of blind identification to beamforming. The key point is to use estimates of directional vectors rather than resorting to their hypothesized value. By using estimates of the directional vectors obtained via blind identification i.e. without knowing the arrray mani ..."
Abstract
-
Cited by 719 (31 self)
- Add to MetaCart
range of parameters, even when the array is perfectly known to the informed beamformer. The key assumption blind identification relies on is the statistical independence of the sources, which we exploit using fourth-order cumulants. A computationally efficient technique is presented for the blind
Anomaly Detection: A Survey
, 2007
"... Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and c ..."
Abstract
-
Cited by 540 (5 self)
- Add to MetaCart
and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal
Quantum Gravity
, 2004
"... We describe the basic assumptions and key results of loop quantum gravity, which is a background independent approach to quantum gravity. The emphasis is on the basic physical principles and how one deduces predictions from them, at a level suitable for physicists in other areas such as string theor ..."
Abstract
-
Cited by 572 (11 self)
- Add to MetaCart
We describe the basic assumptions and key results of loop quantum gravity, which is a background independent approach to quantum gravity. The emphasis is on the basic physical principles and how one deduces predictions from them, at a level suitable for physicists in other areas such as string
Results 1 - 10
of
10,419