نتایج جستجو برای: malkin

تعداد نتایج: 106  

2008
Jacob C. N. Schuldt Kanta Matsuura Kenneth G. Paterson

We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...

2005
Daniela Danciu

The paper is concerned with the improvement of sufficient conditions for the exponential stability of Hopfield-type neural networks displaying interaction delays. The results are based on a method obtained in our previous work that combines an idea suggested by Malkin for studying the absolute stability of a nonlinear system via their linearisations and a procedure proposed by Kharitonov for co...

Journal: :Journal of Mathematical Physics 2022

The time-dependent Schrödinger equation describing a generalized two-dimensional quantum parametric oscillator in the presence of time-variable external fields is solved using evolution operator method. For this, found as product exponential operators through Wei–Norman Lie algebraic approach. Then, propagator and time-evolution eigenstates coherent states are derived explicitly terms solutions...

Journal: :کیمیای هنر 0
بهروز محمودی بختیاری behrooz bakhtiari-mahmoodi [email protected] مهسا معنوی mahsa manavi [email protected]

the present study considers the issue of verbal violence in the language of drama. in the evaluation of verbal violence, jeanette malkin (2004) proposes six maxims, through which language may be considered as an arrogant element. the characters in dramatic texts (as in other literary texts) are created, developed, evolved and - in some cases - destroyed by language. in a considerable number of ...

Journal: :IBM Systems Journal 2007
Lin Luo Da Ming Hao Zhong Tian Ya Bin Dang Bo Hou Peter Malkin Shun Xiang Yang

L. Luo D. M. Hao Z. Tian Y. B. Dang B. Hou P. Malkin S. X. Yang In this paper we introduce Ariadne, an Eclipse-based system for tracking the originality of source code in collaborative software development environments in which software reuse is a common practice. We describe its architecture within the Eclipse framework, the originality metadata of which it keeps track, and the history clue—th...

1997
Dmitry V. Zenkov Anthony M. Bloch Jerrold E. Marsden

In this paper we analyze the stability of relative equilibria of nonholonomic systems (that is, mechanical systems with nonintegrable constraints such as rolling constraints). In the absence of external dissipation, such systems conserve energy, but nonetheless can exhibit both neutrally stable and asymptotically stable, as well as linearly unstable relative equilibria. To carry out the stabili...

2009

Ginzburg and Nakajima have given two different geometric constructions of quotients of the universal enveloping algebra of sln and its irre-ducible finite-dimensional highest weight representations using the convolution product in the Borel-Moore homology of flag varieties and quiver varieties respectively. The purpose of this paper is to explain the precise relationship between the two constru...

2005
ALAN L. CAREY BAI-LING WANG

We explain how multiplicative bundle gerbes over a compact, connected and simple Lie group G lead to a certain fusion category of equivariant bundle gerbe modules given by pre-quantizable Hamiltonian LG-manifolds arising from Alekseev-Malkin-Meinrenken’s quasiHamiltonian G-spaces. The motivation comes from string theory namely, by generalising the notion of D-branes in G to allow subsets of G t...

Journal: :Polymer Journal 2021

Abstract The isothermal crystallization of poly(3-hydroxybutyrate-co-3-hydroxyvalerate) was evaluated using a range models, namely, Avrami, simplified Hillier, Tobin, Malkin, Urbanovici–Segal, Velisaris–Seferis, and Hay. Two methods model evaluation were used: determination the parameters through traditional double log plots curve fitting via nonlinear, multivariable regression. Visual inspecti...

Journal: :RFC 1993
Gary Scott Malkin

This document specifies an extension of the Routing Information Protocol (RIP), as defined in [1,2], to expand the amount of useful information carried in RIP messages and to add a measure of security. This memo obsoletes RFC 1388, which specifies an update to the "Routing Information Protocol" STD 34, RFC 1058. The RIP-2 protocol analysis is documented in RFC 1721 [4]. The RIP-2 applicability ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید