نتایج جستجو برای: equivalent to 299
تعداد نتایج: 10625827 فیلتر نتایج به سال:
Case name: Doe v. Haverford College, No. 23‐299 (E.D. Pa. 02/14/23).
To the Editor:—In a recent commentary, Fleisher stated that even if ST segment trend monitoring has identified accurately a significant ST segment change, ST segment depression may not represent myocardial ischemia in younger individuals or in those with a low probability of coronary artery disease (CAD). In support of this contention, the argument is made that structural CAD usually is absent ...
In Eurocrypt’98 [1], Okamoto et al. exhibited a new trapdoor function based on the use of a special moduli (pq) allowing easy discrete logarithm computations. The authors proved that the scheme’s resistance to chosen-plaintext attacks is equivalent to factoring n. Unfortunately, the proposed scheme suffers from not being a permutation (the expansion rate is = 3), and hence cannot be used for pu...
It is well known that the extensional axiom of choice (ACext) implies the law of excluded middle (EM). We here prove that the converse holds as well if we have the intensional (‘type-theoretical’) axiom of choice ACint, which is provable in Martin-Löf’s type theory, and a weak extensionality principle (Ext−), which is provable in Martin-Löf’s extensional type theory. In particular, EM ⇔ ACext h...
In the recent years, significant progress has been made in explaining apparent hardness ofimproving over naive solutions for many fundamental polynomially solvable problems. Thiscame in the form of conditional lower bounds – reductions to one of problems assumed to behard. These include 3SUM, All-Pairs Shortest Paths, SAT and Orthogonal Vectors, and others.In the (min,+)-convolu...
This paper describes an algorithm for the construction of a certain one-dimensional cellular automaton equivalent to a given D0L system. A cellular automaton is considered equivalent to an L-system if both generates the same words in the same order. Our cellular automata produce the same words and in the same order as the given D0L system for a finite number of derivations. There is no constrai...
This paper shows the first practical semantically secure public-key encryption scheme such that its one-wayness is equivalent to general factoring in the standard model (in the sense of IND-CPA). Next our proof technique is applied to Rabin-Parlier encryption scheme and a variant of RSA-Paillier encryption scheme to prove their exactly tight one-wayness. We finally present the first KEM which i...
A graph G is Ramsey for H if every two-colouring of the edges of G contains a monochromatic copy of H. Two graphs H and H ′ are Ramsey-equivalent if every graph G is Ramsey for H if and only if it is Ramsey for H ′. In this paper, we study the problem of determining which graphs are Ramsey-equivalent to the complete graph Kk. A famous theorem of Nešetřil and Rödl implies that any graph H which ...
A common misperception within the neural network community is that even with nonlinearities in their hidden layer, autoassociators trained with backpropagation are equivalent to linear methods such as principal component analysis (PCA). Our purpose is to demonstrate that nonlinear autoassociators actually behave differently from linear methods and that they can outperform these methods when use...
MicroRNAs (miRNAs) are short non-coding RNAs that regulate the expression of protein-coding genes by partially binding to specific target sites of mRNAs. miRNAs perform important functions in complicated cellular biological processes and their abnormal expression is involved in various disorders, including cancer. Among the miRNAs, differential expression of miR-139-5p serves a significant role...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید