نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

Journal: :Innovations in Incidence Geometry: Algebraic, Topological and Combinatorial 2009

2018
Hendrik Walther Chau-Minh Phan Lakshman N. Subbaraman Lyndon Jones

Citation: Walther H, Phan C-M, Subbaraman LN, Jones L. Differential deposition of fluorescently tagged cholesterol on commercial contact lenses using a novel in vitro eye model. Trans Vis Sci Tech. 2018;7(2): 18, https://doi.org/10.1167/ tvst.7.2.18 Copyright 2018 The Authors Purpose: We evaluate the differences in lipid uptake and penetration in daily disposable (DD) contact lenses (CL) using ...

2009
STEFAN WITZEL

We adapt and refine the methods developed in [Abr96] and [DGM] in order to establish the sphericity of the Phan geometries defined in [BGHS07] (type Bn) and [GHS03] (type Cn), and their generalizations. As applications of this sphericity we determine the topological finiteness length of the unitary form of the group Sp 2n (F q2 [t, t]) (Theorem 7.1) and give the first published proof of the Pha...

2006
E. Duchi R. Mantaci T. H. D. Phan D. Rossin

In this paper we introduce the Bidimensional Sand Pile Model (BSPM), that is, a generalization of the Sand Pile Model (SPM) with the addition of a further dimension. The SPM and some related models have been studied in many different domains and they play an important role in the theory of discrete dynamical systems. They were considered in the context of integer lattices by Brylawski in 1973. ...

ژورنال: انرژی ایران 2023

Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...

2009
Ralf Gramlich

Geometric methods in the theory of Chevalley groups and their generalisations have made tremendous advances during the last few decades. Among the most noteworthy and influential of these advances are the systematic application of the concept of amalgams based on [49], [59], [117], the local-to-global approach [134], ingenious applications of combinatorial topology and geometric group theory (a...

2012
R. Padmavathy

The Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. On the other hand, the protocol should resist all types of password guessing attacks, since the password is of low entropy. Recently Lu Cao proposed a simple three-party password based authenticated key exchange (S-3 PAKE) protocol and claim...

2008
Alice Devillers Ralf Gramlich

We prove that the complex of proper non-trivial non-degenerate subspaces of a finitedimensional vector space endowed with a non-degenerate sesquilinear form is homotopy equivalent to a wedge of spheres. Additionally, we show that the same is true for a slightly wider class of simplicial complexes, the so-called generalized Phan geometries of type An. These generalized Phan geometries occur as r...

Journal: :Journal of Pain and Symptom Management 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید