期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于双数据处理的双路冒泡排序策略
1
作者 曹娟娟 《信息与电脑(理论版)》 2011年第3期94-94,96,共2页
冒泡排序算法是一种易实现且稳定的计算机排序算法,但是由于该算法的时间复杂度较高,因此,冒泡排序不适用于大规模数据集。在本文中,我们提出了一种针对经典冒泡排序算法的改进方法-基于双数据处理的双路冒泡排序算法,该方法在每趟排序... 冒泡排序算法是一种易实现且稳定的计算机排序算法,但是由于该算法的时间复杂度较高,因此,冒泡排序不适用于大规模数据集。在本文中,我们提出了一种针对经典冒泡排序算法的改进方法-基于双数据处理的双路冒泡排序算法,该方法在每趟排序的过程中可以同时确定两个数据的位置,从而减少排序过程中所需的循环次数,以达到降低了算法的时间复杂度的目的。最终的仿真实验结果表明,双路冒泡排序算法是可行有效的,它显著地降低了冒泡排序过程中所需的数据比较次数和移动次数。 展开更多
关键词 冒泡排序 时间复杂度 大规模数据集 双数据处理
原文传递
A new improved ID-based proxy ring signature scheme from bilinear pairings 被引量:2
2
作者 郎为民 杨宗凯 +1 位作者 程文青 谭运猛 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期688-691,共4页
Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an i... Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability. 展开更多
关键词 digital signature proxy signature ring signature identity-based cryptography bilinear pairings
下载PDF
The Design and Construction of Jiangxi Red Tourism Resource E-C/C-E Bilingual Parallel Corpus
3
作者 Zhijuan Zhu Liyong Zhu 《International Journal of Technology Management》 2015年第12期63-66,共4页
On the basis of description of the necessity in construction of the Jiangxi red tourism resource E-C/C-E bilingual parallel corpus, this paper discusses the design and construction of the corpus. In its design, it des... On the basis of description of the necessity in construction of the Jiangxi red tourism resource E-C/C-E bilingual parallel corpus, this paper discusses the design and construction of the corpus. In its design, it describes the general design and the framework of the corpus, then it describes its construction including data collection, the standard for the sorted data, data selection, data digitalization, data tagging and data aligning. With the construction, it will not only realize purposes and functions of the corpus, but also provide others with ways or means to use the corpus and to establish such kind of corpus. 展开更多
关键词 CORPUS CONSTRUCTION Jiangxi red tourism resource bilingual parallel corpus
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部