• No results found

extended version

An Extended Version of Hubble’s Law

An Extended Version of Hubble’s Law

... Friedmann-like cosmological equations were derived by us in a recent paper by using axioms proposed by us for the so called empty Space. By using one of our cosmological equations we have derived in this paper a relation ...

6

Automatic  Search  for  Differential  Trails  in  ARX  Ciphers (Extended  Version)

Automatic Search for Differential Trails in ARX Ciphers (Extended Version)

... XTEA is an extended version of TEA proposed in [30] by the same designers. It was designed in order to address two weaknesses of TEA pointed by Kelsey et al. [18]: (1) a related-key attack on the full TEA ...

32

An Extended Version of Four Square Cipher using 10 X 10 Matrixes

An Extended Version of Four Square Cipher using 10 X 10 Matrixes

... In the extended version of Four Square Cipher method we use 10 x 10 matrixes to generate cipher text. This algorithm can accept the Plaintext containing Alphabets (capital letters and small letters), ...

5

Guidelines for Psychologists working with Refugees and Asylum seekers in the UK: Extended version

Guidelines for Psychologists working with Refugees and Asylum seekers in the UK: Extended version

... Responding to refugees and asylum seekers in the UK Guidance for Psychologists Guidelines for Psychologists Working with Refugees and asylum seekers in the UK Extended Version 0 Table of Contents Fore[.] ...

86

ICORMAN: Extended Version of CORMAN using Efficient Channel Reuse Method

ICORMAN: Extended Version of CORMAN using Efficient Channel Reuse Method

... As routing protocol is the key for MANET communications and decides the performance of MANET, designing of efficient routing protocol is the challenging task. This paper addresses the problem of optimal channel ...

5

An  Improved  Differential  Attack  on  Full  GOST (extended  version)

An Improved Differential Attack on Full GOST (extended version)

... Early advanced differential attacks were based on a statistical distinguisher which exploited a number of differential propagations to distinguish up to 20 rounds of GOST from a random p[r] ...

54

Horizontal  Clustering  Side-Channel  Attacks  on  Embedded  ECC  Implementations (Extended  Version)

Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)

... The correlation analysis method [5] follows the same principle as correlation power analysis (CPA) applied to a set of traces arranged vertically. The differ- ence in the horizontal context is that a single trace is ...

23

Solving Transition-Independent Multi-agent MDPs with Sparse Interactions (Extended version)

Solving Transition-Independent Multi-agent MDPs with Sparse Interactions (Extended version)

... The reduction in search space follows from three key insights: 1 when interactions are sparse, the number of unique returns per agent is relatively small and can be stored efficiently, 2[r] ...

20

Privacy-Preserving  Multi-Party  Reconciliation  Secure  in  the  Malicious  Model (Extended  version)

Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)

... Test Environment. We chose a desktop-based test environment. The setup consists of 10 identical systems each with a 2.93 GHz i7 CPU 870 and 16 GB RAM running a 64-bit Linux with kernel version 3.2.0. All systems ...

22

Modelling catastrophe claims with left truncated severity distributions (extended version)

Modelling catastrophe claims with left truncated severity distributions (extended version)

... In examining the nature of the risk associated with a portfolio of business, it is often of interest to assess how the portfolio may be expected to perform over an extended period of time. One approach concerns ...

32

The  Energy  Budget  for  Wireless  Security:  Extended  Version

The Energy Budget for Wireless Security: Extended Version

... 5.1 Basic zero-knowledge device authentication protocol of Engbert et al. Protocol description Engberg, Harning and Jensen were one of the first to propose an RFID authentication protocol [11]. They presented a modular ...

22

OLS Estimator for a Mixed Regressive, Spatial Autoregressive Model: Extended Version

OLS Estimator for a Mixed Regressive, Spatial Autoregressive Model: Extended Version

... bias b=submatbias,0,1; @ extracting bias beta from bias theta @ mean b[j]=sumcbias b/numsim; @ mean of bias beta @ std b[j]=sqrtbias b-mean b[j]*onesnumsim,1’*bias b-mean b[j]*onesnumsim[r] ...

41

Privacy-Preserving  Content-Based  Image  Retrieval  in  the  Cloud (Extended  Version)

Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)

... The conventional approach to address privacy in this context is to encrypt sensitive data before outsourcing it and run all computations on the client side [11]. However, this imposes to[r] ...

21

Guidelines for Psychologists working with Refugees and Asylum seekers in the UK: Extended version

Guidelines for Psychologists working with Refugees and Asylum seekers in the UK: Extended version

... GUIDELINES FOR PSYCHOLOGISTS ON WORKING WITH REFUGEES AND ASYLUM SEEKERS SUMMARY VERSION (2018) A MORE COMPREHENSIVE VERSION CAN BE LOCATED AT www bps org uk/news and policy/guidelines psychologists w[.] ...

25

Scalable Planning and Learning for Multiagent POMDPs: Extended Version

Scalable Planning and Learning for Multiagent POMDPs: Extended Version

... Each experiment was run for a given number of simulations, the number of samples used at each step to choose an action, and averaged over a number of episodes. We report undiscounted return with the standard error. ...

18

Temporal Description Logic for Ontology-Based Data Access (Extended Version)

Temporal Description Logic for Ontology-Based Data Access (Extended Version)

... Our main result is that, given a TQL TBox T and a CQ q, one can construct a union q ′ of CQs such that the answers to q over T and any temporal ABox A can be computed by evaluating q ′ over A extended with the ...

20

Disinflation and the NAIRU in a New Keynesian New Growth Model (Extended Version)

Disinflation and the NAIRU in a New Keynesian New Growth Model (Extended Version)

... Unlike the textbook price setting function, this real wage growth rate is not constant but increases in employment: A higher steady state employment level implies a higher marginal produ[r] ...

57

Vintage Capital in the AK growth model: a Dynamic Programming approach  Extended version

Vintage Capital in the AK growth model: a Dynamic Programming approach Extended version

... In Section II.3 we come back to the original problem proving, as corollaries of the results of Section II.2, our results about the explicit form of the value function Subsection II.3.1, [r] ...

50

An extended version of Kumaraswamy inverse Weibull distribution and its properties

An extended version of Kumaraswamy inverse Weibull distribution and its properties

... an extended Kumaraswamy inverse Weibull distribution [EKIW D(α, β, ρ, σ, δ)] if its cdf is of the following form, for x ≥ 0, α > 0, β > 0, δ > 0, ρ ≥ 0 and σ ≥ 0 such that (ρ, σ) 6 = (0, ...

24

Bicliques  with  Minimal  Data   and  Time  Complexity  for  AES (Extended  Version)

Bicliques with Minimal Data and Time Complexity for AES (Extended Version)

... It is found that the fastest biclique key recoveries in the covered class with these restrictions have lower computational complexities (for AES-256) and lower data complexities (for AES[r] ...

28

Show all 10000 documents...

Related subjects