期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis of fair quantum blind signatures 被引量:1
1
作者 何立宝 黄刘生 +1 位作者 杨威 许瑞 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第3期63-66,共4页
We investigate the fair quantum blind signature scheme proposed by Wang and Wen [Wang T Y and Wen Q Y 2010 Chin. Phys. B 19 060307], which uses the fundamental properties of quantum mechanics and the availability of a... We investigate the fair quantum blind signature scheme proposed by Wang and Wen [Wang T Y and Wen Q Y 2010 Chin. Phys. B 19 060307], which uses the fundamental properties of quantum mechanics and the availability of a trusted arbitrator. However, in this paper, we find that the protocol cannot satisfy the property of non-forgeability even under the condition that the trusted arbitrator is totally credible. Moreover, a simple feasible suggestion for improving the protocol is proposed. 展开更多
关键词 fair blind signature single photons hash function
原文传递
A dynamic grid service discovery model: TDMSD
2
作者 李庆华 张薇 《Journal of Shanghai University(English Edition)》 CAS 2007年第2期167-173,共7页
Frequent joining and withdrawal of resources and services in a grid make dynamic discovery of grid resource and service quite difficult. In this paper, a two-dimensional model of service discovery (TDMSD) is present... Frequent joining and withdrawal of resources and services in a grid make dynamic discovery of grid resource and service quite difficult. In this paper, a two-dimensional model of service discovery (TDMSD) is presented for use of dynamic service discovery. Description and proof of the model and the route algorithm of service discovery are proposed. The complexity analysis and simulation results show that the TDMSD model works well. 展开更多
关键词 GRID dynamic service discovery MODEL route algorithm
在线阅读 下载PDF
A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements
3
作者 SHI Run-Hua HUANG Liu-Sheng +1 位作者 YANG Wei ZHONG Hong 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第5期22-25,共4页
We present a novel quantum secret sharing scheme of secure direct communication and analyze its security.This scheme takes Einstein-Podolsky-Rosen(EPR)pairs in Bell states as quantum resources.In order to obtain thedi... We present a novel quantum secret sharing scheme of secure direct communication and analyze its security.This scheme takes Einstein-Podolsky-Rosen(EPR)pairs in Bell states as quantum resources.In order to obtain thedirect communication message,all agents only need to perform Bell measurements,not to perform any local unitary operation.The total efficiency in this scheme approaches 100%as the classical information exchanged is unnecessary except for the eavesdropping checks. 展开更多
关键词 SCHEME QUANTUM UNITARY
原文传递
Building Real-Time Network Intrusion Detection System Based on Parallel Time-Series Mining Techniques
4
作者 赵峰 李庆华 《Journal of Southwest Jiaotong University(English Edition)》 2005年第1期11-17,共7页
A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to descr... A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to describe network events, and sliding window updating algorithm is used to maintain network stream. Moreover, parallel frequent patterns and frequent episodes mining algorithms are applied to implement parallel time-series mining engineer which can intelligently generate rules to distinguish intrusions from normal activities. Analysis and study on the basis of DAWNING 3000 indicate that this parallel time-series mining-based model provides a more accurate and efficient way to building real-time NIDS. 展开更多
关键词 Intrusion detection Time-series mining Sliding window Parallel algorithm
在线阅读 下载PDF
Approximation Algorithms for Steiner Connected Dominating Set
5
作者 Ya-Feng Wu Yin-Long Xu Guo-Liang Chen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期713-716,共4页
Steiner connected dominating set(SCDS)is a generalization of the famous connected dominating set problem,where only a specified set of required vertices has to be dominated by a connected dominating set,and known to b... Steiner connected dominating set(SCDS)is a generalization of the famous connected dominating set problem,where only a specified set of required vertices has to be dominated by a connected dominating set,and known to be NP-hard.This paper firstly modifies the SCDS algorithm of Guha and Khuller and achieves a worst case approximation ratio of(2+1/(m-1))H(min(△,k))+O(1),which outperforms the previous best result(c+1)H(min(△,k))+O(1)in the case of m≥1+1/(c-1),where c is the best approximation ratio for Steiner tree,A is the maximum degree of the graph,k is the cardinality of the set of required vertices,m is an optional integer satisfying 0≤m≤min(△,k)and H is the harmonic function.This paper also proposes another approximation algorithm which is based on a greedy approach.The second algorithm can establish a worst case approximation ratio of 2 ln(min(△,k))+O(1),which can also be improved to 2 lnk if the optimal solution is greater than c·e^2c+1/2(c+1). 展开更多
关键词 approximation algorithm Steiner connected dominated set graph algorithm NP-hard
原文传递
Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements 被引量:18
6
作者 SHI RunHua HUANG LiuSheng +1 位作者 YANG Wei ZHONG Hong 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2010年第12期2238-2244,共7页
We present a quantum secret sharing scheme between multiparty (m members in Group 1) and multiparty (n members in Group 2), and analyze its security. This scheme takes EPR pairs in Bell states as quantum resources. In... We present a quantum secret sharing scheme between multiparty (m members in Group 1) and multiparty (n members in Group 2), and analyze its security. This scheme takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all members only need to perform Bell measurements, rather than perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks. 展开更多
关键词 quantum information quantum cryptography quantum secret sharing
原文传递
基因表达式数据的异类分析
7
作者 Chao Yan Guo-Liang Chen Yi-Fei Shen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期7-7,共1页
近年来,生物技术的迅速发展导致了大量转录级别上的基因表达式数据的出现。一般而言,这类数据可以排列成二维实数矩阵形式,因此非常适合于数据挖掘的应用。异类分析是数据挖掘中一个重要的研究领域,目前已经有了许多成熟的算法,如基于... 近年来,生物技术的迅速发展导致了大量转录级别上的基因表达式数据的出现。一般而言,这类数据可以排列成二维实数矩阵形式,因此非常适合于数据挖掘的应用。异类分析是数据挖掘中一个重要的研究领域,目前已经有了许多成熟的算法,如基于距离、密度、分布等算法。但生物技术的不停进步使得抽取的序列越来越长,上面包含的基因越来越多,从而使得每个待分析的数据都具有很高的维数,而传统的分析方法面对高维性时,往往因为空间中数据分布的稀疏性和指数级增长的运算量而失效。 展开更多
关键词 数据挖掘 数据分布 算法 高维 运算量 抽取 矩阵 类数 维数 实数
原文传递
节点有容量的平面无向网络中的最大流问题是属于NC的
8
作者 Xian-Chao Zhang Ying-Yu Wan Guo-Liang Chen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期38-38,共1页
最大流问题是在一个节点和边都有容量限制的网络中寻找两个指定节点间的具有最大值的流。它是个经典的组合优化问题,在工程和科学的许多领域有广泛的应用。在最大流问题的研究中,通常假定仅网络的边有容量的限制。这是因为在一般网络中... 最大流问题是在一个节点和边都有容量限制的网络中寻找两个指定节点间的具有最大值的流。它是个经典的组合优化问题,在工程和科学的许多领域有广泛的应用。在最大流问题的研究中,通常假定仅网络的边有容量的限制。这是因为在一般网络中,节点和边都有容量的问题可以通过简单地把一个节点分裂成两个节点并加入一条边的方法转化为仅边有容量的问题。 展开更多
关键词 最大流问题 容量限制 NC 无向网络 节点 组合优化问题 寻找 最大值 平面 分裂
原文传递
求解组合优化问题的一种新的宏启发式算法:IBS
9
作者 Peng Zou Zhi Zhou +2 位作者 Ying-Yu Wan Guo-Liang Chen Jun Gu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期33-33,共1页
随着科学研究和工程技术的发展,许多科学研究领域和工程应用问题都涉及到了一些组合优化问题,而这些问题中存在着大量的NP难解(NP—hard)问题,所以NP难解问题的研究具有十分重要的理论意义和广泛的应用背景,而其研究成果对科学研究的发... 随着科学研究和工程技术的发展,许多科学研究领域和工程应用问题都涉及到了一些组合优化问题,而这些问题中存在着大量的NP难解(NP—hard)问题,所以NP难解问题的研究具有十分重要的理论意义和广泛的应用背景,而其研究成果对科学研究的发展以及国民经济的建设都起着极大的推动作用。 展开更多
关键词 组合优化问题 求解 应用背景 启发式算法 NP 领域 研究成果 IBS 科学研究 发展
原文传递
Minimizing ADMs on WDM Directed Fiber Trees
10
作者 周丰丰 陈国良 +1 位作者 许胤龙 顾钧 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第6期725-731,共7页
This paper proposes a polynomial-time algorithm for Minimum WDM/SONET Add/Drop Multiplexer Problem (MADM) on WDM directed fiber trees whether or not wavelength converters are used. It runs in time O(m2n), where n and ... This paper proposes a polynomial-time algorithm for Minimum WDM/SONET Add/Drop Multiplexer Problem (MADM) on WDM directed fiber trees whether or not wavelength converters are used. It runs in time O(m2n), where n and m are the number of nodes of the tree and the number of the requests respectively. Incorporating T. Erlebach et al.'s work into the proposed algorithm, it also reaches the lower bound of the required wavelengths with greedy algorithms for the case without wavelength converters. Combined with some previous work, the algorithm reduces the number of required wavelengths greatly while using minimal number of ADMs for the case with limited wavelength converters. The experimental results show the minimal number of required ADMs on WDM directed fiber trees. 展开更多
关键词 WDM 全光网络 波长测量 路由测量 有向光纤树 多路复用器
原文传递
Controlled quantum perfect teleportation of multiple arbitrary multi-qubit states
11
作者 SHI RunHua HUANG LiuSheng +1 位作者 YANG Wei ZHONG Hong 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第12期2208-2216,共9页
We present an efficient controlled quantum perfect teleportation scheme. In our scheme, multiple senders can teleport multiple arbitrary unknown multi-qubit states to a single receiver via a previously shared entangle... We present an efficient controlled quantum perfect teleportation scheme. In our scheme, multiple senders can teleport multiple arbitrary unknown multi-qubit states to a single receiver via a previously shared entanglement state with the help of one or more controllers. Furthermore, our scheme has a very good performance in the measurement and operation complexity, since it only needs to perform Bell state and single-particle measurements and to apply Controlled-Not gate and other single-particle unitary operations. In addition, compared with traditional schemes, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher communication efficiency. 展开更多
关键词 perfect quantum teleportation controlled quantum teleportation quantum state sharing
原文传递
Optimal Bandwidth Utilization of All—Optical Ring with a Converter of Degree 4
12
作者 许胤龙 陈国良 +1 位作者 黄刘生 万颖瑜 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第4期411-419,共9页
In many models of all-optical routing, a set of communication paths in a network is given, and a wavelength is to be assigned to each path so that paths sharing an edge receive different wavelengths. The goal is to as... In many models of all-optical routing, a set of communication paths in a network is given, and a wavelength is to be assigned to each path so that paths sharing an edge receive different wavelengths. The goal is to assign as few wavelengths as possible, in order to use the optical bandwidth efficiently. If a node of a network contains a wavelength converter,any path that passes through this node may change its wavelength. Having converters at some of the nodes can reduce the number of wavelengths required for routing. This paper presents a wavelength converter with degree 4 and gives a routing algorithm which shows that any routing with load L can be realized with L wavelengths when a node of an all-optical ring hosts such a wavelength converter. It is also proved that 4 is the minimum degree of the converter to reach the full utilization of the available wavelengths if only one node of an all-optical ring hosts a converter. 展开更多
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部