نتایج جستجو برای: partial di erential equation
تعداد نتایج: 691134 فیلتر نتایج به سال:
We consider the di?erential equation f<sup>''</sup> +A(z)f<sup>'</sup> +B(z)f = 0, where A(z) and B(z) are entire complex functions. improve various restrictions on coe?cients prove that all non-trivial solutions of in?nite order.
Asymptotics are known to be unreliable in multivariate models with cross-equation or non-linear restrictions, and the dimension of the problem makes bootstrapping impractical. In this paper, "nite sample results are obtained by Markov chain Monte Carlo methods for a nearly non-stationary VAR, and for a di!erential dynamic demand model with homogeneity, Slutsky symmetry, and negativity. The full...
In this paper we review and further develop a class of strong-stability preserving (SSP) high-order time discretizations for semi-discrete method-of-lines approximations of partial di erential equations. Termed TVD (total variation diminishing) time discretizations before, this class of high-order time discretization methods preserves the strong-stability properties of rst-order Euler time step...
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...
A perception and PDE (partial di erential equation) based nonlinear transformation is proposed to process spoken words in noisy environment. The transformation was designed to reduce noise through time adaptation and spectral enhancement by evolving a focusing quadratic fourth order nonlinear PDE (the Cahn-Hillard equation). Constant, low SNR signals were adaptively decreased to reduce noise. O...
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...
We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...
We present hidden veri cation as a means to make the power of computational logic available to users of computer algebra systems while shielding them from its complexity. We have implemented in PVS a library of facts about elementary and transcendental functions, and automatic procedures to attempt proofs of continuity, convergence and di erentiability for functions in this class. These are cal...
In this paper we develop a new method to approximate the solution to the Hamilton-JacobiBellman (HJB) equation which arises in optimal control when the plant is modeled by nonlinear dynamics. The approximation is comprised of two steps. First, successive approximation is used to reduce the HJB equation to a sequence of linear partial di erential equations. These equations are then approximated ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید