Chen

Results: 5791



#Item
121

Reduction-Based Creative Telescoping for Fuchsian D-finite Functions1 Shaoshi Chen KLMM, AMSS, Chinese Academy of Sciences, Beijing, 100190, (China) Mark van Hoeij

Add to Reading List

Source URL: www.koutschan.de

Language: English - Date: 2017-05-08 15:36:16
    122

    Optimization Based Rate Control for Multicast with Network Coding Lijun Chen† , Tracey Ho† , Steven H. Low† , Mung Chiang‡ and John C. Doyle† † Engineering & Applied Science Division, California Institute of

    Add to Reading List

    Source URL: netlab.caltech.edu

    Language: English - Date: 2007-02-02 21:31:02
      123

      APPLICATIONS OF HOMOMORPHIC ENCRYPTION David Archer, Lily Chen, Jung Hee Cheon, Ran Gilad-Bachrach, Roger A. Hallman, Zhicong Huang, Xiaoqian Jiang, Ranjit Kumaresan, Bradley A. Malin, Heidi Sofia, Yongsoo Song, Shuang W

      Add to Reading List

      Source URL: homomorphicencryption.org

      Language: English - Date: 2017-08-08 14:29:13
        124

        Supplementary Material for ”Combinatorial multi-armed bandit: general framework, results and applications”, by Wei Chen, Yajun Wang, and Yang Yuan. A. Full proof of Theorem 1 We use the following two well known bound

        Add to Reading List

        Source URL: proceedings.mlr.press

        Language: English - Date: 2018-07-16 03:38:06
          125

          On the Limitation of MagNet Defense against L1-based Adversarial Examples arXiv:1805.00310v2 [cs.CV] 9 MayPei-Hsuan Lu∗ , Pin-Yu Chen† , Kang-Cheng Chen♠ , and Chia-Mu Yu∗

          Add to Reading List

          Source URL: arxiv.org

          Language: English - Date: 2018-05-09 20:49:01
            126

            Jumping the Air Gap: Modeling Cyber-Physical A�ack Paths in the Internet-of-Things Ioannis Agadakos∗ Chien-Ying Chen∗

            Add to Reading List

            Source URL: personal.stevens.edu

            Language: English - Date: 2017-09-23 10:09:10
              127

              3D Cadastres Best Practices, Chapter 5: Visualization and New Opportunities Jacynthe POULIOT, Canada, Claire ELLUL, United Kingdom, Frédéric HUBERT, Canada, Chen WANG, China, Abbas RAJABIFARD, Australia, Mohsen KALANTA

              Add to Reading List

              Source URL: www.fig.net

              Language: English - Date: 2018-05-14 07:46:39
                128

                Anomalous and Significant Subgraph Detection in Attributed Networks Feng Chen 1, Petko Bogdanov 1, Daniel B. Neill 2, and Ambuj K. Singh 3 1

                Add to Reading List

                Source URL: cci.drexel.edu

                Language: English - Date: 2016-12-12 09:39:53
                  129Cryptography / Cryptographic software / Cryptographic protocols / Transport Layer Security / Secure communication / Cryptographic primitive / Cryptographic engineering / OpenSSL / Cryptographic hash function / Padding oracle attack / Man-in-the-middle attack / Cryptographically secure pseudorandom number generator

                  Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

                  Add to Reading List

                  Source URL: people.csail.mit.edu

                  Language: English
                  130

                  CHEN, ROBERTSON, CIPOLLA: BODY SHAPES FROM SINGLE VIEW MEASUREMENTS 1 A Practical System for Modelling Body Shapes from Single View Measurements

                  Add to Reading List

                  Source URL: mi.eng.cam.ac.uk

                  Language: English - Date: 2018-03-13 12:50:56
                    UPDATE