نتایج جستجو برای: composite operations

تعداد نتایج: 256462  

2008
Edward A. Lee

This paper describes the usage patterns of the ThreadedComposite actor in Ptolemy II. This actor enables the execution of opaque actors (atomic actors or composite actors with directors) in a separate thread, thus providing multithreading for models of computation that are not already multthreaded. It can be used to execute an actor in the background, to execute multiple actors in parallel (e.g...

2014
José M. Reyes Álamo Benito Mendoza

Pervasive computing environments such as the smart home often rely on composite services to provide different functionalities. These services are often complex, handle sensitive data, and perform critical operations. This raises several concerns especially those related to the safety of interactions among different services. In this paper, we differentiate services based on their characteristic...

2008
IRWIN W. SANDBERG

Attention is focused on continuous-space shift-invariant systems with continuous system maps and inputs and outputs that are elements of L∞(IR ). It is shown that infinite superposition can fail in this important setting. It is also shown that continuous shift-invariant linear mappings need not commute with the operation of integration (even when the two composite operations are well defined). ...

2010
Frederic Montagut Refik Molva Silvan Tecumseh Golega

Web services composition has been gaining momentum over the last years as a means of leveraging the capabilities of simple operations to offer value-added services. Complex services such as airline booking systems can be designed as the aggregation of Web services offered by different organizations. As for all cross-organizational collaborative systems, the execution of composite services requi...

Journal: :IACR Cryptology ePrint Archive 2006
Augusto Jun Devegili Colm O'hEigeartaigh Michael Scott Ricardo Dahab

Pairing-friendly fields are finite fields that are suitable for the implementation of cryptographic bilinear pairings. In this paper we review multiplication and squaring methods for pairing-friendly fields Fpk with k ∈ {2, 3, 4, 6}. For composite k, we consider every possible towering construction. We compare the methods to determine which is most efficient based on the number of basic Fp oper...

1997
Guozhong Zhou James D. McCalley

| Based on a recently developed security assessment methodology using automatic training data generation software and neural networks, a composite security boundary visualization approach is proposed for power system operations. This approach can draw a single continuous boundary given multiple individual security problems. It can be conveniently accessed on-line and can be easily integrated in...

Journal: :IEEE Trans. Computers 2003
Arash Reyhani-Masoleh M. Anwar Hasan

In cryptographic applications, the use of normal bases to represent elements of the finite field GFð2Þ is quite advantageous, especially for hardware implementation. In this article, we consider an important field operation, namely, multiplication which is used in many cryptographic functions. We present a class of algorithms for normal basis multiplication in GFð2Þ. Our proposed multiplication...

2012
Mykola Nikitchenko Stepan S. Shkilniak

In the paper new logics oriented on hierarchical data are developed. Algebras of partial predicates over such data with special compositions as operations form a semantic base for constructed logics. Characteristic property of such logics is the usage of composite names in their languages. Semantic properties of these logics are studied; corresponding sequent calculi are defined, their soundnes...

2006
Mircea V. DIUDEA

New strange fulleroids are built up by using the three classical composite map operations: tripling (leapfrog Le), quadrupling (chamfering Q) and septupling (capra Ca) on the starting structure dodecahedron. These transforms belong to the icosahedral symmetry group and show interesting mathematical and (possible) physico-chemical properties. Topological symmetry data of the presented cages are ...

Journal: :CoRR 2008
Xinjia Chen

In this paper, we have established a general framework of multistage hypothesis tests which applies to arbitrarily many mutually exclusive and exhaustive composite hypotheses. Within the new framework, we have constructed specific multistage tests which rigorously control the risk of committing decision errors and are more efficient than previous tests in terms of average sample number and the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید