UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
MAGNETISM AND NEUTRON SCATTERING STUDIES OF RARE-EARTH CHROMATE SINGLE CRYSTALS Thesis
University of Macau: University of Macau, 2022
Authors:  Yinghao Zhu;  Li HF(李海峰)
Adobe PDF | Favorite |  | Submit date:2022/08/15
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:10 TC[Scopus]:11 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
On robust and adaptive finite volume methods for steady euler equations Conference paper
Springer Proceedings in Mathematics and Statistics, Aachen, Germany, 8 1, 2016 - 8 5, 2016
Authors:  Hu, Guanghui;  Meng, Xucheng;  Tang, Tao
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/11/06
A Third Order Adaptive ADER Scheme for One Dimensional Conservation Laws Journal article
COMMUNICATIONS IN COMPUTATIONAL PHYSICS, 2017,Volume: 22,Issue: 3,Page: 829-851
Authors:  Gu, Yaguang;  Hu, Guanghui
Favorite |  | TC[WOS]:3 TC[Scopus]:2 | Submit date:2018/10/30
Ader Scheme  Adaptivemeshmethod  Finite Volumemethod  Weno Reconstruction  Hyperbolic Equations  
Embedding cryptographic features in compressive sensing Journal article
Neurocomputing, 2016,Volume: 205,Page: 472
Authors:  Yushu Zhang;  Jiantao Zhou;  Fei Chen;  Leo Yu Zhang;  Kwok-Wo Wong;  Xing He;  Di Xiao
Adobe PDF | Favorite |  | TC[WOS]:77 TC[Scopus]:92 | Submit date:2018/10/30
Parallel Compressive Sensing  Random Permutation  Secure Compressive Sensing  Symmetric-key Cipher  
Fast Numerical Contour Integral Method for Fractional Diffusion Equations Journal article
Journal of Scientific Computing, 2016,Volume: 66,Issue: 1,Page: 41-66
Authors:  Pang,Hong Kui;  Sun,Hai Wei
Favorite |  | TC[WOS]:26 TC[Scopus]:26 | Submit date:2019/05/27
Fractional Diffusion Equation  Hyperbolic Contour  Laplace Transform  Numerical Contour Integral  Toeplitz Matrix  
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article
Security and Communication Networks, 2015,Volume: 9,Issue: 1,Page: 43-53
Authors:  Yushu Zhang;  Di Xiao;  Kwok-Wo Wong;  Jiantao Zhou;  Sen Bai;  Moting Su
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/12/22
Arithmetic Coding  Chaotic Map  Joint Compression And Encryption  Perturbation  
Domain decomposition preconditioners for secondorder hyperbolic equations on L-shaped regions Journal article
Numerical Mathematics, a Journal of Chinese Uniersities, 1995,Issue: 1,Page: 8
Authors:  Jin Xiao-Qing;  Wang Chiu-kwong
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/07/23
Domain Decomposition  Hyperbolic Equation  Capacitance Matrix  Condition Number  Preconditioned Conjugate Gradient Method  
A note on circulant preconditioners for hyperbolic and parabolic equations Journal article
Chinese Journal of Mathematics, 1993,Volume: 21,Issue: 2,Page: 129-142
Authors:  XIAO-QING JIN
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/07/23
Hyperbolic Equation  Parabolic Equation  Circulant Matrix  Condition Number  Preconditioned Conjugate Gradient Method