期刊文献+

关于矩阵张量积计算的研究 被引量:2

The Research on Calculation of Matrices Tensor Production
在线阅读 下载PDF
导出
摘要 利用矩阵张量积有关理论,讨论了矩阵张量积的计算问题,分析了算法的复杂性,并研究了并行算法及计算复杂性问题。 Using the associative theories of matrix tensor production,this paper discusses the calculation problems of matrix tensor production,analyzes the complexity of the algorithm,and studies the parallel algorithm and its computa-tional complexity.
作者 谭国律
出处 《计算机工程与应用》 CSCD 北大核心 2004年第8期77-78,167,共3页 Computer Engineering and Applications
基金 上饶师范学院科研基金资助课题
关键词 矩阵 张量积 并行算法 计算复杂性 Matrices,Tensor Production,Parallel algorithms ,Computational complexity
  • 相关文献

参考文献7

二级参考文献18

  • 1郑雪雪.数据安全与软件加密技术[M].人民邮电出版社,1995..
  • 2沈嗣昌.计算机辅助逻辑综合[M].北京:高等教育出版社,1983..
  • 3(美)Hwang K 王鼎兴(译).高等计算机系统结构——并行性、可扩展性、可编程性[M].北京,广西:清华大学出版社,广西科学技术出版社,1995.48-56,523-525.
  • 4[1]Gropp W, Lusk E, Sk jellum A. Using MPI:Portable Parallel Program ming with the Message Passing Interface(2nd Edition).MIT Press,Cambridge, MA, 1999
  • 5[2]Braimerd W S, Golberg C H, Adams J C. Programmer's Guide to Fortran 90.McGraw-hill, New York, 1990
  • 6[3]Bomans L, Roose D, Hempel R.The Argonne/GMD Macros in Fortran for Portable Parallel Programming and Their Implementation on the Intel iPSC/2. Parallel Computing, 1999,15:119-132
  • 7[4]Boyle J,Butler R,Disz T,et al. Portable Programs of Parallel Processors.Holt, Rinehart, and Winston, 1987
  • 8[6]Dong Shao jing ,Wang Wenyi, A Parallelization Test on SPP 1200 of a Large Scalar Matrix Computation. Proceeding of Convex User Group Worldwide Conference, Convex Technology Center,Dallas,Texas,1996:438-454
  • 9刘明业.计算机辅助逻辑设计理论[M].北京:科学出版社,1996.3-7.
  • 10Meyer C H, Matyas S M. Cryptograhy: A New Dimension in Computer Data Security-A Guide for the design and Implementa tion of Secure Systems. John Wiley & Sons, Inc, 1982

共引文献21

同被引文献30

  • 1马雪英,章华,金勤.一个数据传输加密方案的设计与实现[J].计算机应用研究,2005,22(5):173-175. 被引量:13
  • 2Habutsu Toshiki,Nishio Yoshifumi,Sasase Iwao et al.A secret key cryptosystem using a chaotic map[J].The Transactions of the IEICE,1990;E73(7)
  • 3Koblitz N.The state of elliptic curve cryptography[J].Designs,Codes and Cryptography,2000; (19)
  • 4Yu Yue,Han Yong-fei.The security of bluetooth technology[J].Telecommunication Technology,2001; (9)
  • 5Deutsch D.Quantum theory,the Church-Turing principle and the universal quantum computer[J].Proc Royal Soc London,1985,400(1818):97-117.
  • 6Deutsch D.Quantum computational networks[J].Proc Royal Soc London,1989,425(1868):73-90.
  • 7Barenco Adriano,Deutsch David,Ekert Artur.Conditional quantum dynamics and logic gates[J].Physical Review Letters,1995,74(20):4083-4086.
  • 8Shor P W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM J Computing,1997,26(5):1484-1509.
  • 9Grover L K.Quantum mechanics helps in searching for a needle in a haystack[J].Phys Rev Lett,1997,79(2):325-328.
  • 10Lloyd S.Universal quantum simulators[J].Science,1996,273(5278):1073-1078.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部