نتایج جستجو برای: theoretically
تعداد نتایج: 43262 فیلتر نتایج به سال:
Quantum homomorphic encryption, which allows computation by a server directly on encrypted data, is fundamental primitive out of more complex quantum cryptography protocols can be built. For such constructions to possible, encryption must satisfy two privacy properties: data ensures that the input private from server, and circuit ciphertext after does not reveal any additional information about...
Abstract We calculate the upper bounds of population theoretically stable Centaur orbits between Uranus and Neptune. These small bodies are on low-eccentricity, low-inclination in two specific bands semimajor axis, centered at ∼24.6 ∼25.6 au. They exhibit unusually long Gyr-stable lifetimes previously published numerical integrations, orders magnitude longer than that a typical Centaur. Despite...
Abstract This paper comprises the results of a design study that aims at developing theoretically and empirically based learning trajectory on statistical inference for 9th-grade students. Based theories informal inference, an 8-step was designed. The consisted two similar four step sequences: (1) experimenting with physical black box, (2) visualizing distributions, (3) examining sampling distr...
Since their introduction, hundreds of different design patterns have been discovered and documented to address a variety of problems we encounter in software design and construction. However, to use any one of these design patterns effectively and quickly, one must have access to a design pattern definition that unambiguously gives away its intended purpose, and find an easy way to choose one d...
If we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when a noisy channel is available to the parties. For instance, the Binary Symmetric Channel (BSC) has been used to implement Oblivious Transfer (OT)...
In this paper, we present a new approach to the design of probabilistic classifiers. Rather than working with a common high-dimensional feature vector, the classifier is written in terms of separate feature vectors chosen specifically for each class and their low-dimensional PDFs. While sufficiency is not a requirement, if the feature vectors are sufficient to distinguish the corresponding clas...
Single dissociations are the bread and butter of neuropsychologists, and double dissociations their chocolate cake! So it is unsurprising that developmental psychologists working on genetic disorders find the concept of double dissociations an attractive one. The following quotations bear eloquent witness to this: “... the study of mental retardation would profit from the application of the fra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید