نتایج جستجو برای: pseudo subspace

تعداد نتایج: 66922  

Journal: :IACR Cryptology ePrint Archive 2012
Jian Zou Wenling Wu Shuang Wu Le Dong

Abstract. Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we use many techniques to improve the pseudo preimage attack on Grøstl hash function, such as subspace preimage attack and guess-and-determine technique. We present improved pseudo preimage attacks on 5-round Grøstl-256 and 8-round Grøstl-512 respectively. The complexity of the a...

Journal: :bulletin of the iranian mathematical society 2011
sh. rezapour

2001
Marina Skurichina Robert P. W. Duin

The performance of a single weak classifier can be improved by using combining techniques such as bagging, boosting and the random subspace method. When applying them to linear discriminant analysis, it appears that they are useful in different situations. Their performance is strongly affected by the choice of the base classifier and the training sample size. As well, their usefulness depends ...

2005
Dong-Soo Kim Young Ho Kim

We study Riemannian or pseudo-Riemannian manifolds which carry the space of closed conformal vector fields of at least 2-dimension. Subject to the condition that at each point the set of closed conformal vector fields spans a non-degenerate subspace of the tangent space at the point, we prove a global and a local classification theorems for such manifolds.

Journal: :CoRR 2012
Garret M. Flagg Serkan Gugercin

The ADI iteration is closely related to the rational Krylov projection methods for constructing low rank approximations to the solution of Sylvester equation. In this paper we show that the ADI and rational Krylov approximations are in fact equivalent when a special choice of shifts are employed in both methods. We will call these shifts pseudo H2-optimal shifts. These shifts are also optimal i...

2012
Garret M. Flagg Serkan Gugercin

The ADI iteration is closely related to the rational Krylov projection methods for constructing low rank approximations to the solution of Sylvester equation. In this paper we show that the ADI and rational Krylov approximations are in fact equivalent when a special choice of shifts are employed in both methods. We will call these shifts pseudo H2-optimal shifts. These shifts are also optimal i...

2016
Leonard R. Rubin L. R. RUBIN

Given an uncountable cardinal א, the product space I, I = [0, 1], is called a Tychonoff cube. A collection of closed subsets of a subspace Y of a Tychonoff cube I that covers Y determines a weak topology for Y . The collection of compact subsets of I that have a countable dense subset covers I. It is known from work of the author and I. Ivanšić that the weak topology generated by this collectio...

Journal: :Neurocomputing 2006
Alessandra Lumini Loris Nanni

In this work, we propose a multi-modal method that combines the scores of selected fingerprint matchers with the scores obtained by a Face Authenticator where the facial features are combined with pseudo-random numbers. We propose a novel method to combine the scores of fingerprint matchers based on random subspace Ensemble and we test the method on the systems submitted to FVC2004. Moreover, w...

A sequence ${T_n}_{n=1}^{infty}$ of bounded linear  operators on a separable infinite dimensional Hilbert space $mathcal{H}$ is called subspace-diskcyclic with respect to the closed subspace $Msubseteq mathcal{H},$ if there exists a vector $xin mathcal{H}$ such that the disk-scaled orbit ${alpha T_n x: nin mathbb{N}, alpha inmathbb{C}, | alpha | leq 1}cap M$ is dense in $M$. The goal of t...

2012
Pei Xiao Rui Liu

Introduction: In the recent decade, there have been significant efforts in developing multiuser detection technologies to alleviate the effect of multiple access interference (MAI) in codedivision multiple-access (CDMA) systems. Blind multiuser detection is of special interest for MAI mitigation in CDMA systems since it is impractical to assume perfect knowledge of parameters such as spreading ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید