نتایج جستجو برای: theoretically

تعداد نتایج: 43262  

Journal: :Physical review letters 2004
John N Bahcall M H Pinsonneault

Solar model predictions of 8B and p-p neutrinos agree with the experimentally determined fluxes (including oscillations): phi(pp)(measured)=(1.02+/-00.02+/-0.01)phi(pp)(theory) and phi(8B)(measured)=(0.88+/-0.04+/-0.23)phi(8B)(theory), 1sigma experimental and theoretical uncertainties, respectively. We use improved input data for nuclear fusion reactions, the equation of state, and the chemical...

Journal: :CoRR 2012
Ye Wang Prakash Ishwar Shantanu Rane

A special three-party secure computation problem is studied in which one of three pairwise interacting parties is required to compute a function of the sequences held by the other two when one of the three parties may arbitrarily deviate from the computation protocol (active behavioral model). For this problem, information-theoretic conditions for secure computation are developed within the rea...

2009
Kurt Lewin

Learning Objectives When you finish reading this chapter, you will be able to: Describe similarities between commonsense and scientific theories. 1. Choose a definition of scientific theory that makes the most sense 2. to you. Articulate a definition of theoretical thinking (or theorizing) and 3. theory. Further examine and test the notion of theories as stories. 4. Outline what theory/theorizi...

Journal: :SIAM Journal of Applied Mathematics 2002
Alexander Katsevich

Proposed is a theoretically exact formula for inversion of data obtained by a spiral computed tomography (CT) scan with a two-dimensional detector array. The detector array is supposed to be of limited extent in the axial direction. The main property of the formula is that it can be implemented in a truly filtered backprojection fashion. First, one performs shift-invariant filtering of a deriva...

2012
Ronan Cummins Colm O'Riordan

In this paper, we aim to investigate the practical usefulness of the Recall-Fallout Convexity Hypothesis (RFCH) for a number of document score distribution (SD) models. We compare SD models that do not automatically adhere to the RFCH to modified versions of the same SD models that do adhere to the RFCH. We compare these models using the inference of average precision as a measure of utility. F...

2011
Kazuki Uematsu Yoonkyung Lee

This paper investigates the theoretical relation between loss criteria and the optimal ranking functions driven by the criteria in bipartite ranking. In particular, the relation between AUC maximization and minimization of ranking risk under a convex loss is examined. We characterize general conditions for ranking-calibrated loss functions in a pairwise approach, and show that the best ranking ...

2009
Rafael Tonicelli Rafael Dowsley Goichiro Hanaoka Hideki Imai Jörn Müller-Quade Akira Otsuka Anderson C. A. Nascimento

Oblivious polynomial evaluation (OPE) consists of a twoparty protocol where a sender inputs a polynomial P , and a receiver inputs a single value i. At the end of the protocol, the sender learns nothing and the receiver learns P (i). This paper deals with the problem of oblivious polynomial evaluation under an information-theoretical perspective, which is based on recent definitions of Uncondit...

2009
Arpita Patra Ashish Choudhury C. Pandu Rangan

We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem with n parties, that provides information theoretic security, when t < n 3 parties are corrupted by an active adversary having unbounded computing power. In [16], the authors claimed that their protocol takes six roun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید