Scheme theory

Results: 835



#Item
81Algebraic geometry / Scheme theory / Log structure

nod-non-commentspdf

Add to Reading List

Source URL: www.kurims.kyoto-u.ac.jp

Language: English - Date: 2015-08-01 13:07:02
82Medicine / Image processing / Image segmentation / Engineering / Topology / Digital topology / Geometry / Medical image computing / Medical imaging / Image analysis / Topological space / Electromagnetism

MHRD Scheme on Global Initiative on Academic Network (GIAN) COURSE TITLE: Digital Topology and Geometry in Medical Imaging: Theory and Application Overview : Digital topology and geometry is an active research field that

Add to Reading List

Source URL: www.gian.iitkgp.ac.in

Language: English - Date: 2016-05-16 06:47:51
83Cryptography / Public-key cryptography / Commitment scheme / Cryptographic hash function / CramerShoup cryptosystem / RSA / Crypt / Digital signature

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
84Color / Perception / Vision / Computer graphics / Color space / Palette / RGB color model / HSL and HSV / Indexed color / Color theory / Chrominance / Hue

R color cheatsheet Finding a good color scheme for presenting data can be challenging. This color cheatsheet will help! R uses hexadecimal to represent colors Hexadecimal is a base-16 number system used to describe color

Add to Reading List

Source URL: www.nceas.ucsb.edu

Language: English - Date: 2013-10-16 17:23:57
85Public-key cryptography / Cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Digital signature / Commitment scheme / NP / Random oracle / Mathematical proof / Markov chain

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:57
86Software engineering / Computing / Computer programming / Compiler construction / Scope / Name resolution / Syntax / Variable / Lambda calculus / Declaration / Compiler / Scheme

Delft University of Technology Software Engineering Research Group Technical Report Series A Theory of Name Resolution with Extended Coverage and Proofs

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2015-01-30 09:52:18
87Cryptography / Abstract algebra / Algebra / Elliptic curves / Group theory / Supersingular elliptic curve / Trapdoor function / Finite fields / Elliptic curve / Lenstra elliptic curve factorization / Elliptic curve primality

A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:53
88Computational complexity theory / Theory of computation / Complexity classes / Packing problems / NP-complete problems / Bin packing problem / Approximation algorithms / Polynomial-time approximation scheme / Partition problem / NP / NC / Time complexity

Chapter 10 Bin Packing Here we consider the classical Bin Packing problem: We are given a set I = {1, . . . , n} of items, where item i ∈ I has size si ∈ (0, 1] and a set B = {1, . . . , n} of bins with capacity one

Add to Reading List

Source URL: www2.informatik.hu-berlin.de

Language: English - Date: 2014-06-25 03:14:23
89Algebra / Mathematics / Mathematical analysis / Mathematical physics / Matrix theory / Linear algebra / Stochastic processes / Lvy processes / Random matrix / Eigenvalues and eigenvectors / Brownian motion / Matrix

J Stat Phys:801–812 DOIs10955x Numerical Solution of Dyson Brownian Motion and a Sampling Scheme for Invariant Matrix Ensembles Xingjie Helen Li · Govind Menon

Add to Reading List

Source URL: www.dam.brown.edu

Language: English - Date: 2013-12-06 12:25:20
90

1 A Provably Secure Short Signature Scheme from Coding Theory Maryam Rajabzadeh Asaar∗ , Mahmoud Salmasizadeh∗ , Mohammad Reza Aref † Research Institute (Center), Sharif University of Technology, Tehran, Iran

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-28 15:17:42
    UPDATE