نتایج جستجو برای: partial di erential equation

تعداد نتایج: 691134  

Journal: :Journal of the Indian Mathematical Society 2022

We consider the di?erential equation f<sup>''</sup> +A(z)f<sup>'</sup> +B(z)f = 0, where A(z) and B(z) are entire complex functions. improve various restrictions on coe?cients prove that all non-trivial solutions of in?nite order.

2000
Philippe J. Deschamps

Asymptotics are known to be unreliable in multivariate models with cross-equation or non-linear restrictions, and the dimension of the problem makes bootstrapping impractical. In this paper, "nite sample results are obtained by Markov chain Monte Carlo methods for a nearly non-stationary VAR, and for a di!erential dynamic demand model with homogeneity, Slutsky symmetry, and negativity. The full...

Journal: :SIAM Review 2001
Sigal Gottlieb Chi-Wang Shu Eitan Tadmor

In this paper we review and further develop a class of strong-stability preserving (SSP) high-order time discretizations for semi-discrete method-of-lines approximations of partial di erential equations. Termed TVD (total variation diminishing) time discretizations before, this class of high-order time discretization methods preserves the strong-stability properties of rst-order Euler time step...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...

2000
Yingyong Qi Jack Xin

A perception and PDE (partial di erential equation) based nonlinear transformation is proposed to process spoken words in noisy environment. The transformation was designed to reduce noise through time adaptation and spectral enhancement by evolving a focusing quadratic fourth order nonlinear PDE (the Cahn-Hillard equation). Constant, low SNR signals were adaptively decreased to reduce noise. O...

1999
Benjamin Jun

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...

2009
Lejla Batina Benedikt Gierlichs Kerstin Lemke-Rust

We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...

2002
Hanne Gottliebsen Tom Kelsey Ursula Martin

We present hidden veri cation as a means to make the power of computational logic available to users of computer algebra systems while shielding them from its complexity. We have implemented in PVS a library of facts about elementary and transcendental functions, and automatic procedures to attempt proofs of continuity, convergence and di erentiability for functions in this class. These are cal...

1998
R. W. Beard G. N. Saridis

In this paper we develop a new method to approximate the solution to the Hamilton-JacobiBellman (HJB) equation which arises in optimal control when the plant is modeled by nonlinear dynamics. The approximation is comprised of two steps. First, successive approximation is used to reduce the HJB equation to a sequence of linear partial di erential equations. These equations are then approximated ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید