نتایج جستجو برای: generalized hierarchical product
تعداد نتایج: 528583 فیلتر نتایج به سال:
Recently we generalized the max algebra system to the class of nonnegative tensors. In this paper we give some basic properties for the left (right) inverse, under the new system. The existence of order 2 left (right) inverse of tensors is characterized. Also we generalize the direct product of matrices to the direct product of tensors (of the same order, but may be different dimensions) and i...
Product codes (PCs) protect a two-dimensional array of bits using short component codes. Assuming transmission over the binary symmetric channel, the decoding is commonly performed by iteratively applying bounded-distance decoding to the component codes. For this coding scheme, undetected errors in the component decoding—also known as miscorrections— significantly degrade the performance. In th...
The notion of inner-product encryption (IPE), introduced by Katz, Sahai, and Waters at Eurocrypt 2008, is a generalization of identity-based encryption in which ciphertexts and secret keys are associated to vectors in some finite field. In an IPE scheme, a ciphertext can only be decrypted by a secret key if the vector associated with the latter is orthogonal to that of the ciphertext. In its hi...
This research introduces a row compression and nested product decomposition of an n × n hierarchical representation of a rank structured matrix A, which extends the compression and nested product decomposition of a quasiseparable matrix. The hierarchical parameter extraction algorithm of a quasiseparable matrix is efficient, requiring only O(nlog(n)) operations, and is proven backward stable. T...
Inner-product encryption (IPE) provides fine-grained access control and has attractive applications. Agrawal, Freeman, and Vaikuntanathan (Asiacrypt 2011) proposed the first IPE scheme from lattices by twisting the identity-based encryption (IBE) scheme by Agrawal, Boneh, and Boyen (Eurocrypt 2010). Their IPE scheme supports inner-product predicates over Rμ , where the ring is R = Zq . Several ...
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attributehiding in the sense of the definition by Katz, Sahai and Waters), while the existing IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and ...
This paper presents an implementation framework for spline spaces over T-meshes (and their d-dimensional analogs). The aim is to share code between the implementation of several spline spaces. This is achieved by reducing evaluation to a generalized Bézier extraction. The approach was tested by implementing hierarchical B-splines, truncated hierarchical B-splines, decoupled hierarchical B-splin...
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and...
The main objective of the M5 competition, which focused on forecasting hierarchical unit sales Walmart, was to evaluate accuracy and uncertainty methods in field identify best practices highlight their practical implications. However, can findings competition be generalized exploited by retail firms better support decisions operation? This depends extent data is sufficiently similar retailers o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید