نتایج جستجو برای: two parameter group

تعداد نتایج: 3280597  

2012
JAMES A. SELLERS Shishuo Fu J. A. SELLERS

Abstract. In 2007, Andrews and Paule introduced the family of functions ∆k(n) which enumerate the number of broken k–diamond partitions for a fixed positive integer k. In that paper, Andrews and Paule proved that, for all n ≥ 0, ∆1(2n + 1) ≡ 0 (mod 3) using a standard generating function argument. Soon after, Shishuo Fu provided a combinatorial proof of this same congruence. Fu also utilized th...

2011
A. P. G. Dowling R. J. Sayler R. D. Cartwright

Bacterial panicle blight (BPB) caused by Burkholderia glumae has become the most important disease of ‘Bengal’ rice in Arkansas. Many arthropods with the capability to vector bacteria are commonly found in rice fields; however, no link has been made to any arthropod vectors of BPB. This study sampled rice fields for the presence of BPB and any small arthropods typically implicated in disease ve...

2011
Martin Gairing Rahul Savani

We study the computational complexity of finding stable outcomes in hedonic games, which are a class of coalition formation games. We restrict our attention to a nontrivial subclass of such games, which are guaranteed to possess stable outcomes, i.e., the set of symmetric additively-separable hedonic games. These games are specified by an undirected edge-weighted graph: nodes are players, an ou...

2014
Sedanur Turgut Bora Bagis Elif Aydogan Ayaz Fatih Mehmet Korkmaz Kᘱvanç Utku Ulusoy Yildirim Hakan Bagis

PURPOSE The purpose of this study was to evaluate whether surface treatments affect the translucency of laminate veneers with different shades and thicknesses. MATERIALS AND METHODS A total of 224 disc-shaped ceramic veneers were prepared from A1, A3, HT (High Translucent) and HO (High Opaque) shades of IPS e.max Press (Ivoclar Vivadent) with 0.5 mm and 1.0 mm thicknesses. The ceramics were d...

Journal: :IACR Cryptology ePrint Archive 2017
Carmit Hazay Muthuramakrishnan Venkitasubramaniam

In this work we study the problem of private set-intersection in the multi-party setting and design two protocols with the following improvements compared to prior work. First, our protocols are designed in the so-called star network topology, where a designated party communicates with everyone else, and take a new approach of leveraging the 2PC protocol of [FNP04]. This approach minimizes the ...

Journal: :IACR Cryptology ePrint Archive 2011
Ching-Hua Yu Bo-Yin Yang

When secure arithmetic is required, computation based on secure multiplication (MULT) is much more efficient than computation based on secure boolean circuits. However, a typical application can also require other building blocks, such as comparison, exponentiation and the modulo (MOD) operation. Secure solutions for these functions proposed in the literature rely on bit-decomposition or other ...

Journal: :Mathematics and Computers in Simulation 2010
François Panneton Pierre L'Ecuyer

Besides speed and period length, the quality of uniform random number generators is usually assessed by measuring the uniformity of their point sets, formed by taking vectors of successive output values over their entire period length. For F2-linear generators, the commonly adopted measures of uniformity are based on the equidistribution of the most significant bits of the output. In this paper...

Journal: :journal of mathematical modeling 2014
jugal mohapatra

in this article, we propose an adaptive grid based on mesh equidistribution principle for two-parameter convection-diffusion boundary value problems with continuous and discontinuous data. a numerical algorithm based on an upwind finite difference operator and an appropriate adaptive grid is constructed. truncation errors are derived for both continuous and discontinuous problems. parameter uni...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید