期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于操作数序的基态修正时空数据模型 被引量:1
1
作者 王永会 孙焕良 朱云龙 《计算机研究与发展》 EI CSCD 北大核心 2011年第S3期147-154,共8页
传统的基态修正模型多以时序的方式选择基态进行操作,并且对时间段检索的处理也都是采用对时间点检索的简单扩展,忽视时间段内时刻连续相邻的特性.引入操作基态和操作数的概念,提出一种动态选择基态的基态修正时空数据模型,即检索时刻... 传统的基态修正模型多以时序的方式选择基态进行操作,并且对时间段检索的处理也都是采用对时间点检索的简单扩展,忽视时间段内时刻连续相邻的特性.引入操作基态和操作数的概念,提出一种动态选择基态的基态修正时空数据模型,即检索时刻在相邻基态中选择操作数较小的基态作为操作基态,解决了时序检索方式选择操作基态时舍近求远而造成大量多余操作的问题,在时间段检索时提出了临时基态的概念,将当前检索时刻设定为临时基态,下一时刻在临时基态与固定基态中选择操作数较少的作为操作基态,大大减少重复操作,提高检索效率. 展开更多
关键词 时空数据模型 基态修正 操作基态 临时基态
下载PDF
Status-Aware Resource Adaptation in Information-Centric and Software-Defined Network 被引量:1
2
作者 嘉濡 陈哲 +1 位作者 罗洪斌 张宏科 《China Communications》 SCIE CSCD 2013年第12期66-76,共11页
In recent years, realising a "clean- state" design for the future Internet has become an important research focus. An architecture com- bining an Information-Centric Network (ICN) and Sottware-Defmed Network (SDN... In recent years, realising a "clean- state" design for the future Internet has become an important research focus. An architecture com- bining an Information-Centric Network (ICN) and Sottware-Defmed Network (SDN) (IC-SDN) has gradually attracted more attention. How- ever, the existing studies regarding IC-SDN still lack support in terms of the "network status awareness" function, resulting in unreasonable resource allocation. In this paper, we propose a new status-aware resource adaptation sche- me, i.e. a status-aware module is embedded into basic elements (Forwarding Node (FN) and Resource adaption Manager (RM)). The FNs collect the network status dynamically for the controller to reallocate network resources accor- ding to the fluctuations in environmental con- ditions. Simulation results show that, compared with the existing IC-SDN mechanism, the pro- posed scheme reduced the link bandwidth var- iance by 56% and the content delivery latency by 40%. The proof-of-concept implementation demonstrates the feasibility of our proposed sc- heme for small-scale deployment. 展开更多
关键词 ICN SDN status awareness re-source adaptation load balance LATENCY
下载PDF
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation 被引量:13
3
作者 LI Jian JIN HaiFei JING Bo 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1612-1618,共7页
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two. 展开更多
关键词 "Ping-pong" protocol XOR operation GHZ state eavesdropping detection protocol security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部