How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ...How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.展开更多
In 1329-1334, George the Brilliant took advantage of the situation created in the llkhanate, eliminated his political opponents and restored the territorial integrity of Georgia. He created a solid legal basis for the...In 1329-1334, George the Brilliant took advantage of the situation created in the llkhanate, eliminated his political opponents and restored the territorial integrity of Georgia. He created a solid legal basis for the country and regulated the ecclesiastic area. He was in West Georgia in 1329-1332/1333. The llkhanid coin was not minted in Georgia during that period; yet, soon the king of Georgia, which had already been united by that time, restored relations with llkhanids and returned to Tbilisi, which implied making the already united Georgia subject to Mongols. Ilkhanid coins and later, coins of Chobanids, the Golden Horde and Jalayirids circulated during the reign of George the Brdhant. In 1338-1339 George the Brilliant conquered Ossetia and Ilkhanid coins were disseminated on the territory of the Golden Horde after that. Formally, Georgia remained under the control of Ilkhanids, which was replaced by Chobanids in 1338 and the governors of the Golden Horde in 757/1356; and in parallel and afterwards by Jalayirids, which is evidenced by written sources as well as numismatic data; Despite formal dependence on the foreign power, which is evidenced by the deployment of 10,000 troops at the border of Georgia as well, the country enjoyed a rather wide internal autonomy. Participation of George the Brilliant in sending envoys for the purpose of the redemption of the Jvari (Cross) Monastery in Palestine in 1316/7, 1320 cannot be assumed. It seems that in those years envoys were sent by Constantine, the king of West Georgia. All the above do not diminish the merits of George V to the Georgian nation and his historic role in terms of the political unification of the country, the creation of a legal basis for it and the regulation of ecclesiastic affairs--the accomplishments of the king, who deservedly bears the name "the Brilliant".展开更多
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch...Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.展开更多
The cultural and geomorphological heritages in Playas as a key address to find out past fluctuations called geotop. Iran is strategically located on an important trade route (Silk Road) between four cradles of civil...The cultural and geomorphological heritages in Playas as a key address to find out past fluctuations called geotop. Iran is strategically located on an important trade route (Silk Road) between four cradles of civilization namely, Babylon, Mesopotamia, Indus and Yangtze (Chinese). Iran is grafting point of four human civilizations which creates Persian civilization about 4,000 years ago. The Lut Desert and Dasht-e Kavir located the central and eastern Iran have been focal points for human settlements since 7,000 years ago. The geoarcheological findings on the Siyalk hills of Kashan located in the Dasht-e Kavir and Jiroft region located in the Lut desert are confirmations for human settlement since more than 7,000 years ago. Shorehzar that is a Persian equivalent word for Arabic word of Sabkha is considered as a Playa geomorphic type which involves precious evidences of quaternary fluctuations. In this article, geomorphological and paleoenvironmental investigations are integrated to provide a framework of environmental change for the late Pleistocene and early-mid Holocene periods in the main deserts of Iran, Lut. In this article based on main geotops of Lut, the quaternary evolutions have been discussed. The investigations are showing that Playas were bed of civilization in Iran Deserts.展开更多
The authors consider relational databases organized over an ordered domain with some additional relations - a typical example is the ordered domain of rational numbers together with the operation of addition. In the f...The authors consider relational databases organized over an ordered domain with some additional relations - a typical example is the ordered domain of rational numbers together with the operation of addition. In the focus of our study are the FO (first-order) queries that are invariant under order-preserving permutations-such queries are called order-generic. It was discovered that for some domains order-generic FO queries fail to express more than pure order queries. The collapse result theorem was proved for locally genetic queries over a linearly ordered domain with the Pseudo finite Homogeneity Property (or / and the Isolation Property) by Belegradek et al.. Here the authors consider a circularly ordered domain and prove the collapse result theorem over a quasi circularly minimal domain.展开更多
This paper proves the error reduction property (saturation property), convergence and optimality of an adaptive mixed finite element method (AMFEM) for the Poisson equation. In each step of AMFEM, the local refine...This paper proves the error reduction property (saturation property), convergence and optimality of an adaptive mixed finite element method (AMFEM) for the Poisson equation. In each step of AMFEM, the local refinement is performed basing on simple either edge-oriented residuals or edge-oriented data oscillations, depending only on the marking strategy, under some restriction of refinement. The main tools used here are the strict discrete local efficiency property given by Carstensen and Hoppe (2006) and the quasi-orthogonality estimate proved by Chen, Holst, and Xu (2009). Numerical experiments fully confirm the theoretical analysis.展开更多
基金partially supported by the Fundamental Research Funds for the Central Universities of China under Grant No.2015JBM034the China Scholarship Council Funds under File No.201407095023
文摘How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.
文摘In 1329-1334, George the Brilliant took advantage of the situation created in the llkhanate, eliminated his political opponents and restored the territorial integrity of Georgia. He created a solid legal basis for the country and regulated the ecclesiastic area. He was in West Georgia in 1329-1332/1333. The llkhanid coin was not minted in Georgia during that period; yet, soon the king of Georgia, which had already been united by that time, restored relations with llkhanids and returned to Tbilisi, which implied making the already united Georgia subject to Mongols. Ilkhanid coins and later, coins of Chobanids, the Golden Horde and Jalayirids circulated during the reign of George the Brdhant. In 1338-1339 George the Brilliant conquered Ossetia and Ilkhanid coins were disseminated on the territory of the Golden Horde after that. Formally, Georgia remained under the control of Ilkhanids, which was replaced by Chobanids in 1338 and the governors of the Golden Horde in 757/1356; and in parallel and afterwards by Jalayirids, which is evidenced by written sources as well as numismatic data; Despite formal dependence on the foreign power, which is evidenced by the deployment of 10,000 troops at the border of Georgia as well, the country enjoyed a rather wide internal autonomy. Participation of George the Brilliant in sending envoys for the purpose of the redemption of the Jvari (Cross) Monastery in Palestine in 1316/7, 1320 cannot be assumed. It seems that in those years envoys were sent by Constantine, the king of West Georgia. All the above do not diminish the merits of George V to the Georgian nation and his historic role in terms of the political unification of the country, the creation of a legal basis for it and the regulation of ecclesiastic affairs--the accomplishments of the king, who deservedly bears the name "the Brilliant".
基金the National Natural Science Foundation of China,the National Basic Research Program of China ("973" Program) the National High Technology Research and Development Program of China ("863" Program)
文摘Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.
文摘The cultural and geomorphological heritages in Playas as a key address to find out past fluctuations called geotop. Iran is strategically located on an important trade route (Silk Road) between four cradles of civilization namely, Babylon, Mesopotamia, Indus and Yangtze (Chinese). Iran is grafting point of four human civilizations which creates Persian civilization about 4,000 years ago. The Lut Desert and Dasht-e Kavir located the central and eastern Iran have been focal points for human settlements since 7,000 years ago. The geoarcheological findings on the Siyalk hills of Kashan located in the Dasht-e Kavir and Jiroft region located in the Lut desert are confirmations for human settlement since more than 7,000 years ago. Shorehzar that is a Persian equivalent word for Arabic word of Sabkha is considered as a Playa geomorphic type which involves precious evidences of quaternary fluctuations. In this article, geomorphological and paleoenvironmental investigations are integrated to provide a framework of environmental change for the late Pleistocene and early-mid Holocene periods in the main deserts of Iran, Lut. In this article based on main geotops of Lut, the quaternary evolutions have been discussed. The investigations are showing that Playas were bed of civilization in Iran Deserts.
文摘The authors consider relational databases organized over an ordered domain with some additional relations - a typical example is the ordered domain of rational numbers together with the operation of addition. In the focus of our study are the FO (first-order) queries that are invariant under order-preserving permutations-such queries are called order-generic. It was discovered that for some domains order-generic FO queries fail to express more than pure order queries. The collapse result theorem was proved for locally genetic queries over a linearly ordered domain with the Pseudo finite Homogeneity Property (or / and the Isolation Property) by Belegradek et al.. Here the authors consider a circularly ordered domain and prove the collapse result theorem over a quasi circularly minimal domain.
基金supported in part by the Natural Science Foundation of China under Grant No.10771150the National Basic Research Program of China under Grant No.2005CB321701the Natural Science Foundation of Chongqing City under Grant No.CSTC,2010BB8270
文摘This paper proves the error reduction property (saturation property), convergence and optimality of an adaptive mixed finite element method (AMFEM) for the Poisson equation. In each step of AMFEM, the local refinement is performed basing on simple either edge-oriented residuals or edge-oriented data oscillations, depending only on the marking strategy, under some restriction of refinement. The main tools used here are the strict discrete local efficiency property given by Carstensen and Hoppe (2006) and the quasi-orthogonality estimate proved by Chen, Holst, and Xu (2009). Numerical experiments fully confirm the theoretical analysis.