نتایج جستجو برای: xor

تعداد نتایج: 2663  

2006
Richard Cleve William Slofstra Falk Unger Sarvagya Upadhyay

We consider a class of two-prover interactive proof systems where each prover returns a single bit to the verifier and the verifier’s verdict is a function of the XOR of the two bits received. Such proof systems, called XOR proof systems, have previously been shown to characterize MIP (= NEXP) in the case of classical provers but to reside in EXP in the case of quantum provers (who are allowed ...

2016
R Ramanathan S Severini

We study the classical and quantumvalues of a class of oneand two-party unique games, that generalizes thewell-knownXORgames to the case of non-binary outcomes. In the bipartite case the generalizedXOR (XOR-d) gameswe study are a subclass of thewell-known linear games.We introduce a ‘constraint graph’ associated to such a game, with the constraints defining the game represented by an edge-color...

Journal: :IACR Cryptology ePrint Archive 2016
Phuong Ha Nguyen Durga Prasad Sahoo

The Lightweight Secure Physically Unclonable Function (LSPUF) was proposed as a secure composition of Arbiter PUFs with additional XOR based input and output networks. But later, researchers proposed a Machine Learning (ML) based modeling attack on x-XOR LSPUF, and they also empirically showed that pure ML based modeling is not computationally scalable if the parameter x of x-XOR LSPUF is large...

2011
Seung Geol Choi Jonathan Katz Ranjit Kumaresan Hong-Sheng Zhou

Yao’s garbled-circuit approach enables constant-round secure two-party computation for any boolean circuit. In Yao’s original construction, each gate in the circuit requires the parties to perform a constant number of encryptions/decryptions, and to send/receive a constant number of ciphertexts. Kolesnikov and Schneider (ICALP 2008) proposed an improvement that allows XOR gates in the circuit t...

Journal: :Applied sciences 2022

XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle VCS to encrypt into several encrypted images, called shares. No information about the can be obtained from any shares, and after applying logical XOR operation stack these original recovered. In this paper, we present new for grayscale or color image. This scheme encrypts (or color) n meaning...

Journal: : 2023

Mazkur maqolada bo‘lajak xor sinfi o‘qituvchilarining ijodiy qobiliyatlarini rivojlantirishning zaruriyati, usul va vositalari bayon etiladi. Shuningdek mazkur muammoni tadqiq etgan olimlar fikrlari tahlil

Journal: :Computer Communications 2016
Nikolaos Papanikos Evangelos Papapetrou

Network coding is commonly used to improve the energy efficiency of network-wide broadcasting in wireless multi-hop networks. In this work, we focus on XOR-based broadcasting in mobile ad hoc networks with multiple sources. We make the observation that the common approach, which is to benefit from the synergy of XOR network coding with a CDS-based broadcast algorithm, suffers performance breakd...

Journal: :Circulation research 2008
Andrew J Webb Alexandra B Milsom Krishnaraj S Rathod Wai Lum Chu Shehla Qureshi Matthew J Lovell Florence M J Lecomte David Perrett Carmelo Raimondo Espeed Khoshbin Zubair Ahmed Rakesh Uppal Nigel Benjamin Adrian J Hobbs Amrita Ahluwalia

Reduction of nitrite (NO(2)(-)) provides a major source of nitric oxide (NO) in the circulation, especially in hypoxemic conditions. Our previous studies suggest that xanthine oxidoreductase (XOR) is an important nitrite reductase in the heart and kidney. Herein, we have demonstrated that conversion of nitrite to NO by blood vessels and RBCs was enhanced in the presence of the XOR substrate xan...

Journal: :The Journal of biological chemistry 2013
Yu Tsushima Hitoshi Nishizawa Yoshihiro Tochino Hideaki Nakatsuji Ryohei Sekimoto Hirofumi Nagao Takashi Shirakura Kenta Kato Keiichiro Imaizumi Hiroyuki Takahashi Mizuho Tamura Norikazu Maeda Tohru Funahashi Iichiro Shimomura

Obesity is often accompanied by hyperuricemia. However, purine metabolism in various tissues, especially regarding uric acid production, has not been fully elucidated. Here we report, using mouse models, that adipose tissue could produce and secrete uric acid through xanthine oxidoreductase (XOR) and that the production was enhanced in obesity. Plasma uric acid was elevated in obese mice and at...

Journal: :CoRR 2017
Suayb S. Arslan

Belief propagation or message passing on binary erasure channels (BEC) is a low complexity decoding algorithm that allows the recovery of message symbols based on bipartite graph prunning process. Recently, array XOR codes have attracted attention for storage systems due to their burst error recovery performance and easy arithmetic based on Exclusive OR (XOR)-only logic operations. Array BP-XOR...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید