咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 14 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 9 篇 理学
    • 9 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 17 篇 f5 algorithm
  • 7 篇 p-adic precision
  • 7 篇 grobner bases
  • 5 篇 tropical geometr...
  • 4 篇 grobner basis
  • 4 篇 algorithms
  • 3 篇 image steganogra...
  • 3 篇 p-adic algorithm
  • 2 篇 quantization tab...
  • 2 篇 luminance
  • 2 篇 steganography
  • 2 篇 chrominance
  • 1 篇 buchberger's sty...
  • 1 篇 grobner basis.
  • 1 篇 buchberger's alg...
  • 1 篇 rsa algorithm
  • 1 篇 wet paper code
  • 1 篇 image genre
  • 1 篇 syzygy module
  • 1 篇 head term

机构

  • 3 篇 rikkyo univ dept...
  • 2 篇 univ limoges lim...
  • 2 篇 johannes kepler ...
  • 1 篇 clemson univ dep...
  • 1 篇 univ limoges xli...
  • 1 篇 inst technol & m...
  • 1 篇 univ rennes 1 re...
  • 1 篇 nerist ece dept ...
  • 1 篇 school of mathem...
  • 1 篇 cnrs xlim umr 72...
  • 1 篇 key laboratory o...
  • 1 篇 univ limoges cnr...
  • 1 篇 univ limoges cnr...
  • 1 篇 chinese acad sci...
  • 1 篇 harbin engn univ...
  • 1 篇 nit it dept durg...
  • 1 篇 yangzhou univ co...
  • 1 篇 computer science...
  • 1 篇 univ bordeaux cn...
  • 1 篇 department of ma...

作者

  • 7 篇 vaccon tristan
  • 3 篇 yokoyama kazuhir...
  • 3 篇 verron thibaut
  • 1 篇 zhao chunhui
  • 1 篇 volny frank
  • 1 篇 rajendra singh k...
  • 1 篇 amit kumar pande...
  • 1 篇 german o. n.
  • 1 篇 liu weijun
  • 1 篇 hu xiaoyan
  • 1 篇 gao shuhong
  • 1 篇 jaya andika cand...
  • 1 篇 zhang lejun
  • 1 篇 yazid setiadi
  • 1 篇 zheng licui
  • 1 篇 pooja rawat
  • 1 篇 yadav arun kumar
  • 1 篇 rawat pooja
  • 1 篇 huang tianwen
  • 1 篇 kushwah rajendra...

语言

  • 17 篇 英文
检索条件"主题词=F5 Algorithm"
17 条 记 录,以下是1-10 订阅
排序:
A Tropical f5 algorithm  17
A Tropical F5 Algorithm
收藏 引用
42nd ACM International Symposium on Symbolic and Algebraic Computation (ISSAC)
作者: Vaccon, Tristan Yokoyama, Kazuhiro Univ Limoges CNRS UMR 7252 XLIM F-87060 Limoges France Rikkyo Univ Dept Math Tokyo Japan
Let K be a field equipped with a valuation. Tropical varieties over K can be defined with a theory of Grobner bases taking into account the valuation of K. While generalizing the classical theory of Grobner bases, it ... 详细信息
来源: 评论
Enhancement in Time Efficiency and Expected Capacity of f5 algorithm  7
Enhancement in Time Efficiency and Expected Capacity of F5 A...
收藏 引用
7th International Conference on Computational Intelligence and Communication Networks (CICN)
作者: Rawat, Pooja Pandey, Amit Kumar Kushwah, Rajendra Singh Inst Technol & Management Comp Sci & Engn Gwalior India
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms f5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption an... 详细信息
来源: 评论
On affine tropical f5 algorithms
收藏 引用
JOURNAL Of SYMBOLIC COMPUTATION 2021年 102卷 132-152页
作者: Vaccon, Tristan Verron, Thibaut Yokoyama, Kazuhiro Univ Limoges XLIM Limoges France JKU Inst Algebra Linz Austria Rikkyo Univ Dept Math Tokyo Japan
Let K be a field equipped with a valuation. Tropical varieties over K can be defined with a theory of Grobner bases taking into account the valuation of K. Because of the use of the valuation, the theory of tropical G... 详细信息
来源: 评论
Enhancement in Time Efficiency and Expected Capacity of f5 algorithm
Enhancement in Time Efficiency and Expected Capacity of F5 A...
收藏 引用
International Conference on Computational Intelligence and Communication Networks
作者: Pooja Rawat Amit Kumar Pandey Rajendra Singh Kushwah Computer Science and Engineering Institute of Technology and Management
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms f5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption an... 详细信息
来源: 评论
Axioms for a theory of signature bases
收藏 引用
JOURNAL Of SYMBOLIC COMPUTATION 2024年 123卷
作者: Lairez, Pierre Univ Paris Saclay Inria F-91120 Palaiseau France
Twenty years after the discovery of the f5 algorithm, Grobner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can ... 详细信息
来源: 评论
Matrix-f5 algorithms and tropical Grobner bases computation
收藏 引用
JOURNAL Of SYMBOLIC COMPUTATION 2018年 第Nov./Dec.期89卷 227-254页
作者: Vaccon, Tristan Univ Limoges CNRS XLIM UMR 7252 F-87060 Limoges France
Let K be a field equipped with a valuation. Tropical varieties over K can be defined with a theory of GrObner bases taking into account the valuation of K. Because of the use of the valuation, this theory is promising... 详细信息
来源: 评论
On Affine Tropical f5 algorithms  18
On Affine Tropical F5 Algorithms
收藏 引用
43rd ACM International Symposium on Symbolic and Algebraic Computation (ISSAC)
作者: Vaccon, Tristan Verron, Thibaut Yokoyama, Kazuhiro Univ Limoges Limoges France CNRS XLIM Limoges France Johannes Kepler Univ Linz Inst Algebra Linz Austria Rikkyo Univ Dept Math Tokyo Japan
Let K be a field equipped with a valuation. Tropical varieties over K can be defined with a theory of Grobner bases taking into account the valuation of K. Because of the use of the valuation, the theory of tropical G... 详细信息
来源: 评论
Signature-based algorithms for Grobner Bases over Tate Algebras  20
Signature-based Algorithms for Grobner Bases over Tate Algeb...
收藏 引用
45th International Symposium on Symbolic and Algebraic Computation
作者: Caruso, Xavier Vaccon, Tristan Verron, Thibaut Univ Bordeaux CNRS INRIA Bordeaux France Univ Limoges Limoges France CNRS XLIM UMR 7252 Limoges France Johannes Kepler Univ Linz Inst Algebra Linz Austria
Introduced by Tate in [Ta71], Tate algebras play a major role in the context of analytic geometry over the p-adics, where they act as a counterpart to the use of polynomial algebras in classical algebraic geometry. In... 详细信息
来源: 评论
An Enhanced Steganographic Code and Its Application in Voice-Over-IP Steganography
收藏 引用
IEEE ACCESS 2019年 7卷 97187-97195页
作者: Zhang, Lejun Hu, Xiaoyan Rasheed, Waqas Huang, Tianwen Zhao, Chunhui Yangzhou Univ Coll Informat Engn Yangzhou 225127 Jiangsu Peoples R China Harbin Engn Univ Coll Informat & Commun Engn Harbin 150001 Heilongjiang Peoples R China
Voice-over IP (VoIP) technology is a kind of digital transmission technology based on IP network. It is one of the important methods to use voice service in VoIP as steganographic carrier to ensure secure transmission... 详细信息
来源: 评论
Matrix-f5 algorithms over finite-precision complete discrete valuation fields
收藏 引用
JOURNAL Of SYMBOLIC COMPUTATION 2017年 第Part2期80卷 329-350页
作者: Vaccon, Tristan Univ Rennes 1 F-35014 Rennes France JSPS Rikkyo Univ Tokyo Japan
Let (f(1,) . . . ,f(s)) is an element of Q(p) [X-1,X- . . . ,X-n](s) be a sequence of homogeneous polynomials with p-adic coefficients. Such system may happen, for example, in arithmetic geometry. Yet, since Q(p) is n... 详细信息
来源: 评论