نتایج جستجو برای: composite operations
تعداد نتایج: 256462 فیلتر نتایج به سال:
Cryptanalysis and Improvement of Yanlin and Xiaoping’s Signature Scheme based on ECDLP and Factoring
Qin Yanlin and Wu Xiaoping proposed a digital signature scheme based on elliptic curve discrete logarithm problem and factoring a composite integer. They claimed that the security of their scheme depends on solving ECDLP and factoring both. In this paper, it is shown that if anyone can solve ECDLP then he can generate a valid signature without knowledge of private keys. An improved scheme is al...
This paper presents a method for automatic reconstruction of high-level composite types during decompilation of C programs from assembly code. The proposed method is based on expressing memory access operations as pairs (base+offset), then building sets of equivalence for all memory access bases used in the program and accumulating sets of offsets for all classes of equivalent bases. Experiment...
EADOCS (Expert Assisted Design Of Composite Sandwich panels) is a multi-level and hybrid expert system for innovative conceptual design. The objectives for conceptual design support are to assess the feasibility and optimality of alternative solutions and to find the best concept for further detailed design. Case-based reasoning is applied to generate conceptual designs and to refine their stru...
A novel state feedback control technique to stabilise linear differential inclusions through composite quadratic Lyapunov functions is presented. By using a gradient-based control technique, the minimum effort control is composed through intersection and union operations, derived from the theory of R-functions. While conventional min and max compositions are recovered as a special case, it is s...
We describe an efficient method for the incremental validation of XML documents after composite updates. We introduce the class of Bounded-Edit (BE) DTDs and XML Schemas, and give a simple incremental revalidation algorithm that yields optimal performance for them, in the sense that its time complexity is linear in the number of operations in the update. We give extensive experimental results s...
The paper concerns with novel first-order methods for monotone variational inequalities. They use a very simple linesearch procedure that takes into account a local information of the operator. Also, the methods do not require Lipschitz continuity of the operator and the linesearch procedure uses only values of the operator. Moreover, when the operator is affine our linesearch becomes very simp...
We consider continuous functions that are deened by programs for their evaluation. The basic arithmetic operations and univariate special functions are real analytic in the interior of their domains. However , another frequent ingredient, the absolute value function, has a kink at the origin, which occurs similarly for max and min. A slightly more serious complication arises with the introducti...
INTRODUCTION Drape of dry fabrics or prepregs was recognised as an important feature in composites forming operations from the start. In the 1950s the first mathematical models were developed based on purely kinematic arguments. The assumption of zero fibre strains and trellis deformations led to the socalled fishnet approach. Typically, these methods require certain arbitrary constraints to re...
The 24Hour Knowledge Factory is a service oriented architecture model that goes beyond the conventional global delivery model. It involves round-the-clock operations through the establishment of three or more development teams around the globe. Complex projects are iteratively broken down into simpler modules, with each “composite persona” (CP) being responsible for one such model. Developers a...
We define an algebraic framework based on non-safe Petri nets, which allows one to express operations such as iteration, parallel composition, and transition synchronisation. This leads to an algebra of process expressions, whose constants and operators directly correspond to those used in Petri nets, and so we are able to associate nets to process expressions compositionally. The semantics of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید