نتایج جستجو برای: most importantly

تعداد نتایج: 1514991  

Journal: :SpringerBriefs in intelligent systems 2022

Abstract In this chapter, we define the basic ingredients of approval-based committee (ABC) voting: candidates, voters, preferences, and committees. Most importantly, present main characters book: ABC voting rules.

Journal: :Cognitive Science 2000
Richard W. Byrne

Comparative analysis of the behavior of modern primates, in conjunction with an accurate phylogenetic tree of relatedness, has the power to chart the early history of human cognitive evolution. Adaptive cognitive changes along this path occurred, it is believed, in response to various forms of complexity; to some extent, theories that relate particular challenges to cognitive adaptations can al...

2009
Mathias Herrmann Alexander May

We look at iterated power generators si = s e i−1 mod N for a random seed s0 ∈ ZN that in each iteration output a certain amount of bits. We show that heuristically an output of (1− 1 e ) logN most significant bits per iteration allows for efficient recovery of the whole sequence. This means in particular that the Blum-Blum-Shub generator should be used with an output of less than half of the b...

2005
Domingo Gómez-Pérez Jaime Gutierrez Álvar Ibeas

Let p be a prime and let a and c be integers modulo p. The quadratic congruential generator (QCG) is a sequence (vn) of pseudorandom numbers defined by the relation vn+1 ≡ av 2 n +c mod p. We show that if sufficiently many of the most significant bits of several consecutive values vn of the QCG are given, one can recover in polynomial time the initial value v0 (even in the case where the coeffi...

2004
Maria Isabel Gonzalez Vasco Mats Näslund Igor E. Shparlinski

We generalize and extend results obtained by Boneh and Venkatesan in 1996 and by González Vasco and Shparlinski in 2000 on the hardness of computing bits of the Diffie-Hellman key, given the public values. Specifically, while these results could only exclude (essentially) error-free predictions, we here exclude any non-negligible advantage, though for larger fractions of the bits. We can also d...

2016
L. Oudshoorn

While modern energy efficient low voltage designs focus on near-threshold voltage (NTV) operation for general purpose computing and exploiting an application's intrinsic error resilience by deploying probabilistic-CMOS (PCMOS) circuits for application specific computing, our results emphasize the impact of delay on PCMOS bits at NTV and lower voltage operations. This delay is very important to ...

2015
Joel Cracraft Peter Houde Simon Y. W. Ho David P. Mindell Jon Fjeldså Bent Lindow Scott V. Edwards Carsten Rahbek Siavash Mirarab Tandy Warnow M. Thomas P. Gilbert Guojie Zhang Edward L. Braun Erich D. Jarvis

Mitchell et al. argue that divergence-time estimates for our avian phylogeny were too young because of an “inappropriate” maximum age constraint for the most recent common ancestor of modern birds and that, as a result, most modern bird orders diverged before the Cretaceous-Paleogene mass extinction event 66million years ago instead of after. However, their interpretations of the fossil record ...

2006
Damien Simon Bernard Derrida

We consider the evolution of a population of fixed size with no selection. The number of generations G to reach the first common ancestor evolves in time. This evolution can be described by a simple Markov process which allows one to calculate several characteristics of the time dependence of G. We also study how G is correlated to the genetic diversity.

2005
Weidong Cui Randy H. Katz Wai-tian Tan

Compromised computers have been a menace to both personal and business computing. In this paper, we tackle the problem of automated detection of break-ins of new unknown threats such as worms, spyware and adware on personal computers. We propose Break-IN DEtectoR (BINDER), a host-based break-in detection system. Our key observation is that many break-ins make extrusions, stealthy malicious outg...

2013
Yusrila Y. Kerlooza Sarwono Sutikno Yudi S. Gondokaryono Agus Mulyana

ABSTRACT. This paper presents the architecture of the MFIBVP real-time multiplier which is ideal to be used in real-time system application. The MFIBVP technique is a combination of the MSB–First computation, the Interval-Bounded Arithmetic and the Variable-Precision computation techniques. The MFIBVP computation guarantees the computation carried out will produce high accuracy from the early c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید