CSpace

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
Speeding Up the GVW Algorithm via a Substituting Method 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2019, 卷号: 32, 期号: 1, 页码: 205-233
作者:  Li Ting;  Sun Yao;  Huang Zhenyu;  Wang Dingkang;  Lin Dongdai
收藏  |  浏览/下载:199/0  |  提交时间:2019/04/02
Grobner basis  GVW  signature-based algorithm  time-memory tradeoff  
Supervised Polarimetric SAR Image Classification Using Tensor Local Discriminant Embedding 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 卷号: 27, 期号: 6, 页码: 2966-2979
作者:  Huang, Xiayuan;  Qiao, Hong;  Zhang, Bo;  Nie, Xiangli
收藏  |  浏览/下载:295/0  |  提交时间:2018/07/30
Land cover classification  dimensionality reduction  feature extraction  spatial information  polarimetric signature  tensor local discriminant embedding  PloSAR image  
An improvement over the GVW algorithm for inhomogeneous polynomial systems 期刊论文
FINITE FIELDS AND THEIR APPLICATIONS, 2016, 卷号: 41, 页码: 174-192
作者:  Sun, Yao;  Huang, Zhenyu;  Wang, Dingkang;  Lin, Dongdai
收藏  |  浏览/下载:140/0  |  提交时间:2018/07/30
Grobner basis  The GVW algorithm  Signature-based algorithm  Linear algebra  Boolean polynomial ring  
Continuous detection of the variations of the intersection curve of two moving quadrics in 3-dimensional projective space 期刊论文
JOURNAL OF SYMBOLIC COMPUTATION, 2016, 卷号: 73, 页码: 221-243
作者:  Jia, Xiaohong;  Wang, Wenping;  Choi, Yi-King;  Mourrain, Bernard;  Tu, Changhe
收藏  |  浏览/下载:153/0  |  提交时间:2018/07/30
Intersection curve  Moving quadrics  Signature sequence  Index sequence  Jordan form  
The signature of generalized flag manifolds and applications 期刊论文
ACTA MATHEMATICA SINICA-ENGLISH SERIES, 2010, 卷号: 26, 期号: 8, 页码: 1457-1462
作者:  Li, Ping;  Su, Yang
收藏  |  浏览/下载:90/0  |  提交时间:2018/07/30
Signature  flag manifold  prime manifold  
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme 期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 卷号: 25, 期号: 2, 页码: 619-631
作者:  Tan, Zuo-Wen;  Liu, Zhuo-Jun
收藏  |  浏览/下载:103/0  |  提交时间:2018/07/30
proxy signature  threshold signature  forgery attack  universally forgeable  random oracle model  DL assumption  
Security analysis of three cryptographic schemes from other cryptographic schemes 期刊论文
INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 卷号: 3822, 页码: 290-301
作者:  Chow, SSM;  Cao, ZJ;  Liu, JK
收藏  |  浏览/下载:103/0  |  提交时间:2018/07/30
group signature  signcryption  identity-based signature  proxy signature  secret sharing  bilinear pairings