نتایج جستجو برای: theoretically

تعداد نتایج: 43262  

Journal: :Quantum 2023

Quantum homomorphic encryption, which allows computation by a server directly on encrypted data, is fundamental primitive out of more complex quantum cryptography protocols can be built. For such constructions to possible, encryption must satisfy two privacy properties: data ensures that the input private from server, and circuit ciphertext after does not reveal any additional information about...

Journal: :The planetary science journal 2023

Abstract We calculate the upper bounds of population theoretically stable Centaur orbits between Uranus and Neptune. These small bodies are on low-eccentricity, low-inclination in two specific bands semimajor axis, centered at ∼24.6 ∼25.6 au. They exhibit unusually long Gyr-stable lifetimes previously published numerical integrations, orders magnitude longer than that a typical Centaur. Despite...

Journal: :International Journal of Science and Mathematics Education 2021

Abstract This paper comprises the results of a design study that aims at developing theoretically and empirically based learning trajectory on statistical inference for 9th-grade students. Based theories informal inference, an 8-step was designed. The consisted two similar four step sequences: (1) experimenting with physical black box, (2) visualizing distributions, (3) examining sampling distr...

2005
Sargon Hasso

Since their introduction, hundreds of different design patterns have been discovered and documented to address a variety of problems we encounter in software design and construction. However, to use any one of these design patterns effectively and quickly, one must have access to a design pattern definition that unambiguously gives away its intended purpose, and find an easy way to choose one d...

2011
Paolo Palmieri Olivier Pereira

If we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when a noisy channel is available to the parties. For instance, the Binary Symmetric Channel (BSC) has been used to implement Oblivious Transfer (OT)...

2000
Paul M. Baggenstoss Heinrich Niemann

In this paper, we present a new approach to the design of probabilistic classifiers. Rather than working with a common high-dimensional feature vector, the classifier is written in terms of separate feature vectors chosen specifically for each class and their low-dimensional PDFs. While sufficiency is not a requirement, if the feature vectors are sufficient to distinguish the corresponding clas...

Journal: :Cortex; a journal devoted to the study of the nervous system and behavior 2003
Annette Karmiloff-Smith Gaia Scerif Daniel Ansari

Single dissociations are the bread and butter of neuropsychologists, and double dissociations their chocolate cake! So it is unsurprising that developmental psychologists working on genetic disorders find the concept of double dissociations an attractive one. The following quotations bear eloquent witness to this: “... the study of mental retardation would profit from the application of the fra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید