Showing 1 - 20 results of 3,351 for search '"composer"', query time: 0.05s Refine Results
  1. 1

    Research on Composing : points of departure /

    Published 1978
    View in OPAC
    Book
  2. 2

    Universal composable threshold signature by HONG Xuan1, CHEN Ke-fei2, LI Qiang2

    Published 2009-01-01
    “…Threshold signature allowed any subset of t parties generating a signature,but that disallowed the creation of a valid signature if fewer than t parties participate in the protocol.Since the security of threshold signature was only con-sidered in a single instance before,the universal composability framework was introduced.The framework with its secu-rity preserving composition property allowed for modular design and analysis of the threshold signature.The defined ideal functionality of threshold signature is proved equals to the standard security notion of threshold signature.Further-more,how to applying the ideal functionality is described.The proposed threshold signature protocol and proactive threshold signature protocol are not only provably secure,but also universally composable.…”
    Get full text
    Article
  3. 3
  4. 4

    Extensive composable entropy for the analysis of cosmological data by Constantino Tsallis, Henrik Jeldtoft Jensen

    Published 2025-02-01
    “…This functional is extensive (as required by thermodynamics) and composable, ∀(α,γ). Being extensive means that in the micro-canonical, or uniform, ensemble where all micro-state occur with the same probability, the entropy becomes proportional to N asymptotically: S(N)∝N for N→∞. …”
    Get full text
    Article
  5. 5

    ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES by A. Zaviyalov

    Published 2014-06-01
    “…To put it otherwise, the research aims to test the market efficiency hypothesis in the sector of ETF-composed portfolios. The research methodology centers on statistically testing the null hypothesis whether the average S&P500 return and each of the ETF-composed portfolio strategies average returns are equal to zero. …”
    Get full text
    Article
  6. 6

    Universally composable secure multiparty computation protocol with fairness by You-liang TIAN, Chang-gen PENG, Jian-feng MA, Hui LIN, Kai YANG

    Published 2014-02-01
    “…The fair problem of secure multiparty computation protocol was investigated in the universally composable framework. A fair secure multiparty computation model with ideal functionalities was firstly formulated such as a fair secure multiparty addition computation and a fair secure multiparty multiplicative computation. …”
    Get full text
    Article
  7. 7

    On Consensus of Star-Composed Networks with an Application of Laplacian Spectrum by Da Huang, Haijun Jiang, Zhiyong Yu, Qiongxiang Huang, Xing Chen

    Published 2017-01-01
    “…In particular, we introduce the notion of the corona of two graphs to construct star-composed networks and apply the Laplacian spectrum to discuss the convergence speed and robustness for the communication network. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Robust optimization of stabilizing piles for landslides composed of soil–rock mixtures by Yang Yu, Songlin Liu, Qing Lü

    Published 2025-03-01
    “…Colluvial landslides are mainly composed of soil–rock mixtures with complex composition and structure, resulting in large uncertainties in mechanical properties. …”
    Get full text
    Article
  16. 16

    Curing Kinetics of Hybrid Networks Composed of Benzoxazine and Multifunctional Novolac Epoxy by Wu Ke, Wang Rumin, Zeng Jinfang

    Published 2015-01-01
    “…A novel hybrid network composed of benzoxazines (BZ) and novolac epoxy resin (F-51) was prepared successfully. …”
    Get full text
    Article
  17. 17

    Self-adaptive encryption algorithm for image based on affine and composed chaos by Chang-ci WEN, Qin WANG, Fu-min HUANG, Zhi-shu YUAN, Chun-sheng TAO

    Published 2012-11-01
    “…On the basis of three-dimensional affine transformation in limited integer domain and composed chaos,a novel digital image encryption algorithm was proposed.Firstly,it scrambled pixels’ position and confused pixels’ value according to corresponding coordination.Secondly,it took a series of nonlinear diffusion,substitution and re-diffusion.In the process of substitution,it introduced pixels’ value to perturb multiple chaos systems that were coupled together for self-adaptive encryption.The algorithm proceeded the above two steps for 3 times to defend chosen plaintext attack,and had huge key space to defend violent attack.The scrambling function in it was compatible with images at any ratio of length to width without any preprocessing; the constructed whole chaos system which had a simple form was designed modularly,and could be realized parallel conveniently.…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20