咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 14 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 9 篇 理学
    • 9 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 17 篇 f5 algorithm
  • 7 篇 p-adic precision
  • 7 篇 grobner bases
  • 5 篇 tropical geometr...
  • 4 篇 grobner basis
  • 4 篇 algorithms
  • 3 篇 image steganogra...
  • 3 篇 p-adic algorithm
  • 2 篇 quantization tab...
  • 2 篇 luminance
  • 2 篇 steganography
  • 2 篇 chrominance
  • 1 篇 buchberger's sty...
  • 1 篇 grobner basis.
  • 1 篇 buchberger's alg...
  • 1 篇 rsa algorithm
  • 1 篇 wet paper code
  • 1 篇 image genre
  • 1 篇 syzygy module
  • 1 篇 head term

机构

  • 3 篇 rikkyo univ dept...
  • 2 篇 univ limoges lim...
  • 2 篇 johannes kepler ...
  • 1 篇 clemson univ dep...
  • 1 篇 univ limoges xli...
  • 1 篇 inst technol & m...
  • 1 篇 univ rennes 1 re...
  • 1 篇 nerist ece dept ...
  • 1 篇 school of mathem...
  • 1 篇 cnrs xlim umr 72...
  • 1 篇 key laboratory o...
  • 1 篇 univ limoges cnr...
  • 1 篇 univ limoges cnr...
  • 1 篇 chinese acad sci...
  • 1 篇 harbin engn univ...
  • 1 篇 nit it dept durg...
  • 1 篇 yangzhou univ co...
  • 1 篇 computer science...
  • 1 篇 univ bordeaux cn...
  • 1 篇 department of ma...

作者

  • 7 篇 vaccon tristan
  • 3 篇 yokoyama kazuhir...
  • 3 篇 verron thibaut
  • 1 篇 zhao chunhui
  • 1 篇 volny frank
  • 1 篇 rajendra singh k...
  • 1 篇 amit kumar pande...
  • 1 篇 german o. n.
  • 1 篇 liu weijun
  • 1 篇 hu xiaoyan
  • 1 篇 gao shuhong
  • 1 篇 jaya andika cand...
  • 1 篇 zhang lejun
  • 1 篇 yazid setiadi
  • 1 篇 zheng licui
  • 1 篇 pooja rawat
  • 1 篇 yadav arun kumar
  • 1 篇 rawat pooja
  • 1 篇 huang tianwen
  • 1 篇 kushwah rajendra...

语言

  • 17 篇 英文
检索条件"主题词=F5 algorithm"
17 条 记 录,以下是11-20 订阅
排序:
Image Preparation for Steganography Capacity Estimation for Specific Image Genre
Image Preparation for Steganography Capacity Estimation for ...
收藏 引用
International Workshop on Big Data and Information Security (IWBIS)
作者: Jaya, Andika Candra Yazid, Setiadi Univ Indonesia Fac Comp Sci Depok Indonesia
One of the important steps in steganography is to figure out how to embed a certain amount of message into cover medium (usually image). Different images may have different capacity and on top of that compression must... 详细信息
来源: 评论
THE f5 algorithm IN BUCHBERGER'S STYLE
收藏 引用
Journal of Systems Science & Complexity 2011年 第6期24卷 1218-1231页
作者: Yao SUN Dingkang WANG Key Laboratory of Mathematics Mechanization Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100190 China
The famous f5 algorithm for computing Grobner basis was presented by faugere in 2002. The original version of f5 is given in programming codes, so it is a bit difficult to understand. In this paper, the f5 algorithm i... 详细信息
来源: 评论
Matrix-f5 algorithms and Tropical Grobner Bases Computation  15
Matrix-F5 Algorithms and Tropical Grobner Bases Computation
收藏 引用
ACM International Symposium on Symbolic and Algebraic Computation (ISSAC)
作者: Vaccon, Tristan Univ Rennes 1 Rennes France
Let K be a field equipped with a valuation. Tropical varieties over K can be defined with a theory of Grobner bases taking into account the valuation of K. Because of the use of the valuation, this theory is promising... 详细信息
来源: 评论
A NEW fRAMEWORK fOR COMPUTING GROBNER BASES
收藏 引用
MATHEMATICS Of COMPUTATION 2015年 第297期85卷 449-465页
作者: Gao, Shuhong Volny, frank Wang, Mingsheng Clemson Univ Dept Math Sci Clemson SC 29634 USA Chinese Acad Sci Inst Informat Engn Informat Secur Lab Beijing 100190 Peoples R China
This paper presents a new framework for computing Grobner bases for ideals and syzygy modules. It is proposed to work in a module that accommodates any given ideal and the corresponding syzygy module (for the given ge... 详细信息
来源: 评论
Proof of the faugSre criterion for the f5 algorithm
收藏 引用
MATHEMATICAL NOTES 2010年 第3-4期88卷 479-486页
作者: German, O. N. Moscow MV Lomonosov State Univ Moscow Russia
The validity of the faugSre criterion for the f5 algorithm is established.
来源: 评论
Secret Communication using Public key Steganography
Secret Communication using Public key Steganography
收藏 引用
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)
作者: Mishra, Madhusudhan Tiwari, Gangadhar Yadav, Arun Kumar NERIST ECE Dept Itanagar AP India NIT IT Dept Durgapur W Bengal India MGIMT CSE Dept Lucknow Uttar Pradesh India
This paper introduces a new steganographic technique for secret data communication based on Public Key Digital Image steganography by combining public key cryptography with Digital Image Steganography. The proposed sc... 详细信息
来源: 评论
GVW algorithm OVER PRINCIPAL IDEAL DOMAINS
收藏 引用
Journal of Systems Science & Complexity 2013年 第4期26卷 619-633页
作者: LI Dongmei LIU Jinwang LIU Weijun ZHENG Licui Department of Mathematics and Computing Sciences Hunan University of Science and Technology Xiangtan 411201 China Department of Mathematical and Statistical Central South University Changsha 410083 China. Department of Mathematics and Computing Sciences Hunan University of Science and Technology Xiangtan 411201 China. School of Mathematical and Statistical Central South University Changsha 410083 China.
GVW algorithm was given by Gao, Wang, and Volny in computing a Grobuer bases for ideal in a polynomial ring, which is much faster and more simple than f5. In this paper, the authors generalize GVW algorithm and presen... 详细信息
来源: 评论