Search results for "Termini"

showing 10 items of 365 documents

Security of public key cryptosystems based on Chebyshev Polynomials

2004

Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries …

FOS: Computer and information sciencesPlaintext-aware encryptionTheoretical computer scienceComputer Science - Cryptography and SecurityCramer–Shoup cryptosystemData_CODINGANDINFORMATIONTHEORYDeterministic encryptionHybrid cryptosystemCryptosystemElectrical and Electronic EngineeringSemantic securityThreshold cryptosystemCryptography and Security (cs.CR)Goldwasser–Micali cryptosystemMathematics
researchProduct

Superlinear advantage for exact quantum algorithms

2012

A quantum algorithm is exact if, on any input data, it outputs the correct answer with certainty (probability 1). A key question is: how big is the advantage of exact quantum algorithms over their classical counterparts: deterministic algorithms. For total Boolean functions in the query model, the biggest known gap was just a factor of 2: PARITY of N inputs bits requires $N$ queries classically but can be computed with N/2 queries by an exact quantum algorithm. We present the first example of a Boolean function f(x_1, ..., x_N) for which exact quantum algorithms have superlinear advantage over the deterministic algorithms. Any deterministic algorithm that computes our function must use N qu…

FOS: Computer and information sciencesQuantum sortGeneral Computer ScienceDeterministic algorithmGeneral MathematicsFOS: Physical sciences0102 computer and information sciencesQuantum capacityComputational Complexity (cs.CC)01 natural sciences010305 fluids & plasmasCombinatorics0103 physical sciencesQuantum phase estimation algorithmQuantum informationBoolean function010306 general physicsComputer Science::DatabasesQuantum computerMathematicsDiscrete mathematicsQuantum PhysicsFunction (mathematics)Computer Science - Computational Complexity010201 computation theory & mathematicsQuantum Fourier transformNo-teleportation theoremQuantum algorithmQuantum Physics (quant-ph)Proceedings of the forty-fifth annual ACM symposium on Theory of Computing
researchProduct

Exact affine counter automata

2017

We introduce an affine generalization of counter automata, and analyze their ability as well as affine finite automata. Our contributions are as follows. We show that there is a language that can be recognized by exact realtime affine counter automata but by neither 1-way deterministic pushdown automata nor realtime deterministic k-counter automata. We also show that a certain promise problem, which is conjectured not to be solved by two-way quantum finite automata in polynomial time, can be solved by Las Vegas affine finite automata. Lastly, we show that how a counter helps for affine finite automata by showing that the language MANYTWINS, which is conjectured not to be recognized by affin…

FOS: Computer and information sciencesTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESautomataFormal Languages and Automata Theory (cs.FL)GeneralizationComputer scienceFOS: Physical sciencesComputer Science - Formal Languages and Automata Theorycounter automataМатематика0102 computer and information sciences02 engineering and technologyComputational Complexity (cs.CC)01 natural sciencesquantum computinglcsh:QA75.5-76.95Deterministic pushdown automatonComputer Science (miscellaneous)0202 electrical engineering electronic engineering information engineeringQuantum finite automataPromise problemTime complexityDiscrete mathematicsQuantum Physicscomputational complexityFinite-state machinelcsh:MathematicsИнформатикаpushdown automatalcsh:QA1-939Nonlinear Sciences::Cellular Automata and Lattice GasesКибернетикаAutomatonComputer Science - Computational ComplexityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES010201 computation theory & mathematics020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceAffine transformationaffine computingQuantum Physics (quant-ph)Computer Science::Formal Languages and Automata Theory
researchProduct

Complexity of probabilistic versus deterministic automata

2005

Finite-state machineNested wordTheoretical computer scienceDFA minimizationDeterministic automatonComputer scienceDeterministic context-free grammarAutomata theoryQuantum finite automataProbabilistic analysis of algorithms
researchProduct

Ambiguity and complementation in recognizable two-dimensional languages

2008

The theory of one-dimensional (word) languages is well founded and investigated since fifties. From several years, the increasing interest for pattern recognition and image processing motivated the research on two-dimensional or picture languages, and nowadays this is a research field of great interest. A first attempt to formalize the concept of finite state recognizability for two-dimensional languages can be attributed to Blum and Hewitt ([7]) who started in 1967 the study of finite state devices that can define two-dimensional languages, with the aim to finding a counterpart of what regular languages are in one dimension. Since then, many approaches have been presented in the literature…

Finite-state machineTessellationCOMPLEXITYSettore INF/01 - Informaticamedia_common.quotation_subjectPicture LanguageAmbiguityPattern RecognitionPicture languageAlgebraRule-based machine translationRegular languageFormal LanguagePICTURE-LANGUAGES; NONDETERMINISM; COMPLEXITY; AUTOMATAFormal languageRegular expressionAUTOMATAArithmeticPICTURE-LANGUAGESmedia_commonMathematicsNONDETERMINISM
researchProduct

Over the Cuckoo’s Nest : Towards a Nordic Model of the Responsible University?

2019

AbstractThis concluding chapter takes stock of the major elements, both empirical and conceptual, that underpin the case chapters presented in the book. The chapter is organised in three distinct sections. First, addressing a largely scientific audience, the chapter attempts to make conceptual sense of the findings from an organisational theory perspective. Second, it shifts focus to the wider community of practitioners (policy makers, advisers, university managers and administrators, etc.) by shedding light on the practical implications of the volume’s core findings for both policy and practice. Third, the chapter once again addresses an academic audience by sketching out the road ahead re…

Future studiesbiologybusiness.industryStrategic ChoiceResponsibility accountability window-dressing resilience policyPublic relationsbiology.organism_classificationEnvironmental determinismVDP::Samfunnsvitenskap: 200SociologyNordic modelbusinessCuckooPractical implications
researchProduct

Distance-constrained data clustering by combined k-means algorithms and opinion dynamics filters

2014

Data clustering algorithms represent mechanisms for partitioning huge arrays of multidimensional data into groups with small in–group and large out–group distances. Most of the existing algorithms fail when a lower bound for the distance among cluster centroids is specified, while this type of constraint can be of help in obtaining a better clustering. Traditional approaches require that the desired number of clusters are specified a priori, which requires either a subjective decision or global meta–information knowledge that is not easily obtainable. In this paper, an extension of the standard data clustering problem is addressed, including additional constraints on the cluster centroid di…

Fuzzy clusteringCorrelation clusteringSingle-linkage clusteringConstrained clusteringcomputer.software_genreDetermining the number of clusters in a data setSettore ING-INF/04 - AutomaticaData clustering k–means Opinion dynamics Hegelsmann–Krause modelCURE data clustering algorithmData miningCluster analysisAlgorithmcomputerk-medians clusteringMathematics22nd Mediterranean Conference on Control and Automation
researchProduct

Comparison of Internal Clustering Validation Indices for Prototype-Based Clustering

2017

Clustering is an unsupervised machine learning and pattern recognition method. In general, in addition to revealing hidden groups of similar observations and clusters, their number needs to be determined. Internal clustering validation indices estimate this number without any external information. The purpose of this article is to evaluate, empirically, characteristics of a representative set of internal clustering validation indices with many datasets. The prototype-based clustering framework includes multiple, classical and robust, statistical estimates of cluster location so that the overall setting of the paper is novel. General observations on the quality of validation indices and on t…

Fuzzy clusteringlcsh:T55.4-60.8Computer scienceSingle-linkage clusteringCorrelation clustering02 engineering and technologycomputer.software_genrelcsh:QA75.5-76.95Theoretical Computer Scienceprototype-based clusteringCURE data clustering algorithm020204 information systemsprototype-based clustering; clustering validation index; robust statisticsConsensus clusteringalgoritmit0202 electrical engineering electronic engineering information engineeringlcsh:Industrial engineering. Management engineeringCluster analysisk-medians clusteringta113Numerical Analysisbusiness.industryPattern recognitionDetermining the number of clusters in a data setComputational MathematicsComputingMethodologies_PATTERNRECOGNITIONComputational Theory and Mathematicsrobust statistics020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligenceData miningtiedonlouhintabusinessclustering validation indexcomputerAlgorithms
researchProduct

RVVS 2013

2013

GFLVauthenticitécoordinationdéterminisme génétiquecouvre-solexsudatsespace sensorielsouches hypoagressivesco-suppressionvinsélectionrésistanceŒnotourismemodélisationterritoireImpact environnementalprémunition au vignoblechangement climatiquepratique culturale innovantecommunicationviticulture durablemaladies du boisnématicidebio-contrôlesauvegarde[SDV] Life Sciences [q-bio]variétésécotoxicitédiversité génétiquecourt-nouésols viticoles - fertilité des sols
researchProduct

On the divide between animate and inanimate

2015

Vitalism was abandoned already for a long time ago, yet the impression that animate beings differ in some fundamental way from inanimate objects continues to thrive. Here, we argue that scale free patterns, found throughout nature, present convincing evidence that this demarcation is only imaginary. Therefore, all systems ought to be regarded alike, i.e., all are consuming free energy in least time. This way evolutionary processes can be understood as a series of changes from one state to another, so that flows of energy themselves naturally select those ways and means, such as species and societies or gadgets and galaxies to consume free energy in the least time in quest of attaining therm…

General Chemical Engineeringmedia_common.quotation_subjectEnergy (esotericism)principle of least actionBiologyNon-determinismGeneral Biochemistry Genetics and Molecular BiologyThe principle of least actionLifeState (polity)Free energynon-determinismlaw of thermodynamicsThe Imaginarymedia_commonBalance (metaphysics)Scale (chemistry)Scale invariantGeneral Chemistryfree energyEpistemologyVitalismscale invariantThe second law of thermodynamicsCommentaryelämä
researchProduct