منابع مشابه
Strong Corruptions in Group Key Exchange Protocols
Group key exchange (GKE) protocols are foundational for the privacy and authentication issues in a variety of group applications. Participants of a GKE protocol obtain a secret shared key (group key) that can be further used in cryptographic primitives like symmetric encryption schemes and message authentication codes. Common for all GKE protocols is that during the protocol execution participa...
متن کاملZipfian corruptions for robust POS tagging
Inspired by robust generalization and adversarial learning we describe a novel approach to learning structured perceptrons for part-ofspeech (POS) tagging that is less sensitive to domain shifts. The objective of our method is to minimize average loss under random distribution shifts. We restrict the possible target distributions to mixtures of the source distribution and random Zipfian distrib...
متن کامل95st MSS-Seminar
The lack of consistence and convergence is often considered as a major drawback of smoothed particle hydrodynamics (SPH). Here, we analysis two errors introduced by typical conservative SPH approximations of the gradient of a scalar field: one (smoothing error) is due to smoothing of the gradient by an integration associated with a kernel function; the other (integration error) is due to approx...
متن کاملThe set of autotopisms of partial Latin squares
Symmetries of a partial Latin square are primarily determined by its autotopism group. Analogously to the case of Latin squares, given an isotopism Θ, the cardinality of the set PLSΘ of partial Latin squares which are invariant under Θ only depends on the conjugacy class of the latter, or, equivalently, on its cycle structure. In the current paper, the cycle structures of the set of autotopisms...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Classical Review
سال: 1904
ISSN: 0009-840X,1464-3561
DOI: 10.1017/s0009840x00990371