We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Algebraic Graph Algorithms A Practical Guide Using Python

    This textbook discusses the design and implementation of basic algebraic graph algorithms, and algebraic graph algorithms for complex networks,...

    Textbook 2021
  2. Minimization of Empirical Risk as a Means of Choosing the Number of Hypotheses in Algebraic Machine Learning

    Abstract—

    The paper examines a new approach to assessing the number of required hypotheses about the causes of a target property. It follows the...

    Article 26 September 2023
  3. A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming

    Tolerant algebraic side-channel attack (TASCA) exploits side-channel information with an algebraic formulation of a cipher to exploit its weaknesses...

    Fanghui Liu, Waldemar Cruz, Laurent Michel in Journal of Cryptographic Engineering
    Article 19 January 2022
  4. A Modified Convergence DDPG Algorithm for Robotic Manipulation

    Today, robotic arms are widely used in industry. Reinforcement learning algorithms are used frequently for controlling robotic arms in complex...

    Seyed Reza Afzali, Maryam Shoaran, Ghader Karimian in Neural Processing Letters
    Article 29 August 2023
  5. Global optimization of optimal Delaunay triangulation with modified whale optimization algorithm

    In this paper, we introduce an innovative approach to generate a high-quality mesh with a density function in a given domain. Our method involves...

    Yongjia Weng, Juan Cao, Zhonggui Chen in Engineering with Computers
    Article 29 January 2024
  6. Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box

    Digital image is transmitted more and more frequently through the network. To protect the security of batch images in an open network, a...

    **aoqiang Zhang, **g**g Liao in Multimedia Tools and Applications
    Article 14 July 2023
  7. Quantum Annealing and Algebraic Attack on Speck Cipher

    Algebraic attacks using quantum annealing are a new idea of cryptanalysis. This paper shows how to obtain a QUBO problem equivalent to the algebraic...
    Elżbieta Burek, Michał Wroński in Computational Science – ICCS 2022
    Conference paper 2022
  8. Application of an extrapolation method in the Hessenberg algorithm for computing PageRank

    PageRank can be viewed as a hyperlink-based method for estimating the importance of nodes in a network, and has attracted a lot of attention from...

    Qian-Ying Hu, **an-Ming Gu, Chun Wen in The Journal of Supercomputing
    Article 01 July 2024
  9. Solving Constrained Horn Clauses over Algebraic Data Types

    Safety verification problems are often reduced to solving the satisfiability of Constrained Horn Clauses (CHCs), a set of constraints in first-order...
    Lucas Zavalía, Lidiia Chernigovskaia, Grigory Fedyukovich in Verification, Model Checking, and Abstract Interpretation
    Conference paper 2023
  10. An algebraic approach to symmetric linear layers in cryptographic primitives

    Subterranean 2.0 is a permutation-based cipher suite which works with a 257 bit-state. It is designed for lightweight cryptography, and it scores...

    Robert Christian Subroto in Cryptography and Communications
    Article Open access 14 February 2023
  11. Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP

    The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the...

    **a Liu, Huan Yang, Li Yang in Cybersecurity
    Article Open access 06 December 2023
  12. Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity

    Boolean functions satisfying good cryptographic criteria when restricted to the set of vectors with constant Hamming weight play an important role in...

    Sihem Mesnager, Sihong Su, ... Linya Zhu in Cryptography and Communications
    Article 02 August 2022
  13. NIWI and New Notions of Extraction for Algebraic Languages

    We give an efficient construction of a computational non-interactive witness indistinguishable (NIWI) proof in the plain model, and investigate...
    Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella in Security and Cryptography for Networks
    Conference paper 2022
  14. A One Pass Streaming Algorithm for Finding Euler Tours

    Given an undirected graph G on n nodes and m edges in the form of a data stream we study the problem of finding an Euler tour in G . Our main result...

    Christian Glazik, Jan Schiemann, Anand Srivastav in Theory of Computing Systems
    Article Open access 12 December 2022
  15. Using the Grasshopper Optimization Algorithm for Fuzzy Classifier Design

    Abstract

    The paper describes three stages in the construction of a fuzzy classifier. The first refers to the formation of fuzzy rules, the second...

    R. O. Ostapenko, I. A. Hodashinsky, Yu. A. Shurygin in Automatic Documentation and Mathematical Linguistics
    Article 01 December 2023
  16. Algebraic Program Analysis

    This paper is a tutorial on algebraic program analysis. It explains the foundations of algebraic program analysis, its strengths and limitations, and...
    Zachary Kincaid, Thomas Reps, John Cyphert in Computer Aided Verification
    Conference paper Open access 2021
  17. Coupling algebraic topology theory, formal methods and safety requirements toward a new coverage metric for artificial intelligence models

    Safety requirements are among the main barriers to the industrialization of machine learning based on deep learning architectures. In this work, a...

    Faouzi Adjed, Mallek Mziou-Sallami, ... Yesmina Jaafra in Neural Computing and Applications
    Article 30 May 2022
  18. New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems

    At CRYPTO 2017, Liu presented a general framework of iterative estimation of algebraic degree for NFSR-based cryptosystems, by exploiting a...
    Conference paper 2022
  19. The Backpropagation Algorithm

    This chapter will introduce the backpropagation algorithm, which is the key to learning in multilayer neural networks. In the early years, methods...
    Chapter 2023
  20. A proximal subgradient algorithm with extrapolation for structured nonconvex nonsmooth problems

    In this paper, we consider a class of structured nonconvex nonsmooth optimization problems, in which the objective function is formed by the sum of a...

    Tan Nhat Pham, Minh N. Dao, ... Syed Islam in Numerical Algorithms
    Article Open access 20 June 2023
Did you find what you were looking for? Share feedback.