نتایج جستجو برای: strong

تعداد نتایج: 372662  

Journal: :Revista Brasileira de Pesquisa em Turismo 2012

Journal: :journal of sciences, islamic republic of iran 2013
m. ajami v. fakoor s. jomhoori

in this paper, we prove the strong uniform consistency and asymptotic normality of the kernel density estimator proposed by jones [12] for length-biased data.the approach is based on the invariance principle for the empirical processes proved by horváth [10]. all simulations are drawn for different cases to demonstrate both, consistency and asymptotic normality and the method is illustrated by ...

Journal: :Revista Mexicana de Opinión Pública 2021

2002
Ludomir Newelski

We prove that a type-definable Lascar strong type has finite diameter. We answer also some other questions from [1] on Lascar strong types. We give some applications on subgroups of type-definable groups. In this paper T is a complete theory in language L and we work within a monster model C of T . For a0, a1 ∈ C let a0Θa1 iff 〈a0, a1〉 extends to an indiscernible sequence 〈an, n < ω〉. We define...

2012
David Pointcheval

Authenticated Key Exchange protocols enable several parties to establish a shared cryptographically strong key over an insecure network using various authentication means, such as strong cryptographic keys or short (i.e., low-entropy) common secrets. The latter example is definitely the most interesting in practice, since no additional device is required, but just a human-memorable password, fo...

2009
Anders Johansson Robert Johansson Klas Markström

5 We give an optimal degree condition for a tripartite graph to have 6 a spanning subgraph consisting of complete graphs of order 3. This 7 result is used to give an upper bound of 2∆ for the strong chromatic 8 number of n vertex graphs with ∆ ≥ n/6. 9

Journal: :Discrete Mathematics & Theoretical Computer Science 2004
Josef Pieprzyk Xian-Mo Zhang

The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all origin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید