نتایج جستجو برای: quadruple adaptive version numbering scheme

تعداد نتایج: 608154  

Journal: :Electr. J. Comb. 2015
Sho Suda

It was shown that linked systems of symmetric designs with a1 = 0 and mutually unbiased bases (MUBs) are triply regular association schemes. In this paper, we characterize triple regularity of linked systems of symmetric designs by its Krein number. And we prove that a maximal set of MUBs carries a quadruply regular association scheme and characterize the quadruple regularity of MUBs by its par...

Journal: :IACR Cryptology ePrint Archive 2005
Carlos Coronado

This paper builds on the multi-time signature scheme proposed by Merkle. We prove that the original scheme is existentially unforgeable under adaptive chosen message attack. Moreover, we present an improved version which has three advantages: It is provably forward secure. The number of signatures that can be made with one private key is — in a practical sense — unlimited. Finally, the cost for...

Journal: :Softw., Pract. Exper. 1997
Preston Briggs Keith D. Cooper L. Taylor Simpson

Value numbering is a compiler-based program analysis method that allows redundant computations to be removed. This paper compares hash-based approaches derived from the classic local algorithm1 with partitioning approaches based on the work of Alpern, Wegman, and Zadeck2. Historically, the hash-based algorithm has been applied to single basic blocks or extended basic blocks. We have improved th...

2005
Alejandro Ribeiro Nihar Jindal

We study the Rayleigh fading relay channel. We first show that relay cooperation offers a small capacity increase with respect to the direct channel and then focus on studying the diversity-multiplexing tradeoff. We find a bound on the optimal diversity-rate function and establish that this bound is achieved by an adaptive version of the classical Markov coding scheme.

Journal: :J. Comput. Physics 2007
Boyce E. Griffith Richard D. Hornung David McQueen Charles S. Peskin

Like many problems in biofluid mechanics, cardiac mechanics can be modeled as the dynamic interaction of a viscous incompressible fluid (the blood) and a (visco-)elastic structure (the muscular walls and the valves of the heart). The immersed boundary method is a mathematical formulation and numerical approach to such problems that was originally introduced to study blood flow through heart val...

Journal: :Theoretical Computer Science 1976

Journal: :Against the Grain 1994

‎We extend the method of adaptive two-stage sequential sampling to‎‎include designs where there is more than one criteria is used in‎‎deciding on the allocation of additional sampling effort‎. ‎These‎‎criteria‎, ‎or conditions‎, ‎can be a measure of the target‎‎population‎, ‎or a measure of some related population‎. ‎We develop‎‎Murthy estimator for the design that is unbiased estimators for‎‎t...

Journal: :Psychological Bulletin 1906

Journal: :IACR Cryptology ePrint Archive 2012
Jayaprakash Kar

Confidentiality and authenticity are two fundamental security requirement of Public key Cryptography. These are achieved by encryption scheme and digital signatures respectively. Here we present a provably secure signcryption scheme in random oracle model by modifying Libert et al’s scheme [2]. Our scheme is more efficient and secure than Libert et al’s scheme. Tan [1] proved that this scheme i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید