نتایج جستجو برای: rotary agitated extractors
تعداد نتایج: 13559 فیلتر نتایج به سال:
Preface Roughly speaking, a deterministic extractor is a function that 'extracts' almost perfect random bits from a 'weak random source'-a distribution that contains some entropy but is far from being truly random. In this book we explicitly construct deterministic extractors and related objects for various types of sources. A basic theme in this book is a methodology of recycling randomness th...
This paper presents a novel approach to feature extraction for face recognition. This approach extends a previously developed method that incorporated the feature extraction techniques of GEFE ML (Genetic and Evolutionary Feature Extraction – Machine Learning) and Darwinian Feature Extraction). The feature extractors evolved by GEFE ML are superior to traditional feature extraction methods in t...
Efficient manufacturing of cathode active materials (CAMs) for Li-ion batteries is one key target on the roadmap towards cost reduction and improved sustainability. This work deals with a two-stage calcination process synthesis LiNiO 2 (LNO) consisting (partial) lithiation step at moderate temperatures short dwell times subsequent high temperature crystallization to decouple chemical reactions ...
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (CRYPTO ‘02 ), locally computable extractors directly yield secure private-key cryptosystems in Maurer’s bounded storage model (J. Cryptology, 1992). We suggest a general “sample-then-extract” approach to constructing loca...
Randomness extractors are an important building block for classical and quantum cryptography. However, for many applications it is crucial that the extractors are quantum-proof, i.e., that they work even in the presence of quantum adversaries. In general, quantum-proof extractors are poorly understood and we would like to argue that in the same way as Bell inequalities (multi prover games) and ...
We present a negative result of fuzzy extractors with computational security. Specifically, we show that, under a certain computational condition, the existence of a computational fuzzy extractor implies the existence of an information-theoretic fuzzy extractor with slightly weaker parameters. The condition is that the generation procedure of the fuzzy extractor is efficiently invertible by an ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید