找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Numerical Methods for Differential Equations, Optimization, and Technological Problems; Dedicated to Profess Sergey Repin,Timo Tiihonen,Ter

[复制链接]
楼主: 誓约
发表于 2025-3-28 16:44:05 | 显示全部楼层
发表于 2025-3-28 20:00:09 | 显示全部楼层
发表于 2025-3-29 02:28:46 | 显示全部楼层
Subgradient and Bundle Methods for Nonsmooth Optimization problems, e.g., convex and nonconvex problems, piecewise linear and quadratic problems, and problems with different sizes. Rather than foreground some method over the others, our aim is to get some insight on which method is suitable for certain types of problems.
发表于 2025-3-29 04:30:28 | 显示全部楼层
Book 2013 for Nonlinear Problems; Reliable Methods for Computer Simulation; Analysis of Noised and Uncertain Data; Optimization Methods; Mathematical Models Generated by Modern Technological Problems. The book also includes a short biography of Professor Neittaanmäki..
发表于 2025-3-29 07:20:10 | 显示全部楼层
Inversion of the Heat Equation by a Block Based Algorithm Using Spline Wavelet Packetsve the inversion problem separately in different frequency bands by methods similar to the Tikhonov regularization. This separation is achieved by using spline wavelet packets. The solutions are derived as linear combinations of those wavelet packets.
发表于 2025-3-29 14:02:25 | 显示全部楼层
. parties cannot distinguish their counterparties from a random noise generator, until the end of the protocol, when the output of the function is revealed, if favorable to all parties. Previous works on covert computation achieved super-constant round protocols for general functionalities [., .],
发表于 2025-3-29 17:21:42 | 显示全部楼层
cal. Searchable symmetric encryption (SSE) is a practical method of encrypting data so that natural operations such as searching can be performed on this data. It can be viewed as an efficient private-key alternative to powerful tools such as fully homomorphic encryption, oblivious RAM, or secure mu
发表于 2025-3-29 21:46:56 | 显示全部楼层
Ronald H. W. Hoppe,Christopher Linsenmann balances efficiency, privacy, and the set of admissible operations: Our scheme searches in time logarithmic in the size of the word dictionary (i.e., it is independent of the number of files), satisfies the strong security notion of search pattern privacy against adaptive attacks, supports complex
发表于 2025-3-30 01:05:20 | 显示全部楼层
Erkki Laitinen,Alexander Lapincal. Searchable symmetric encryption (SSE) is a practical method of encrypting data so that natural operations such as searching can be performed on this data. It can be viewed as an efficient private-key alternative to powerful tools such as fully homomorphic encryption, oblivious RAM, or secure mu
发表于 2025-3-30 06:19:28 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-7 16:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表