According to the characteristics of ecosystem and concept of the ecosystem in mining area, the index system of the ecosystem health in mining area was set up, and the evaluation standard was established. Aiming at the...According to the characteristics of ecosystem and concept of the ecosystem in mining area, the index system of the ecosystem health in mining area was set up, and the evaluation standard was established. Aiming at the complexion in which the information lost in index ration, the matter element method was put forward to evaluate the ecosystem health in mining area. Making use of the model set up, the weight was built up by the method of index number heavy, the matter element, clas- sical field, and limit field were set up. The rating hierarchy was calculated by relating function. As a case study in the mining area of Pingyangsi Town, the results show that the ecosystem is good and sustainable from 2003 to 2006, but the healthy degree is not high, and some indexes have depravation.展开更多
Design pattern enables software architecture generality and reusability, but which depresses the high performance. The pattern specialization was built on partial evaluation technology to reduce the overheads of desig...Design pattern enables software architecture generality and reusability, but which depresses the high performance. The pattern specialization was built on partial evaluation technology to reduce the overheads of design pattern. The design patterns were classified to extract the common features, and the corresponding pattern specializations were constructed. In the pattern specialization, the optimization opportunities were identified, and the specialization methods and conditions were described. The syntax of binding time analysis was defined, and the semantic depicted the invariant of usage context. The virtual invocation and dispatch were eliminated, which enhances the running efficiency. This pattern specialization is a high-level specialization for improving the performance of software aimed at design level that is orthogonal with the low-level code optimization.展开更多
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been pr...Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.展开更多
文摘According to the characteristics of ecosystem and concept of the ecosystem in mining area, the index system of the ecosystem health in mining area was set up, and the evaluation standard was established. Aiming at the complexion in which the information lost in index ration, the matter element method was put forward to evaluate the ecosystem health in mining area. Making use of the model set up, the weight was built up by the method of index number heavy, the matter element, clas- sical field, and limit field were set up. The rating hierarchy was calculated by relating function. As a case study in the mining area of Pingyangsi Town, the results show that the ecosystem is good and sustainable from 2003 to 2006, but the healthy degree is not high, and some indexes have depravation.
基金The National Hi-Tech Research and Development Program ( 863 )of China ( No2004AA104280)The Shanghai Grand Project of Science and Technology Commissionof Shanghai Municipality (No05DZ15005)
文摘Design pattern enables software architecture generality and reusability, but which depresses the high performance. The pattern specialization was built on partial evaluation technology to reduce the overheads of design pattern. The design patterns were classified to extract the common features, and the corresponding pattern specializations were constructed. In the pattern specialization, the optimization opportunities were identified, and the specialization methods and conditions were described. The syntax of binding time analysis was defined, and the semantic depicted the invariant of usage context. The virtual invocation and dispatch were eliminated, which enhances the running efficiency. This pattern specialization is a high-level specialization for improving the performance of software aimed at design level that is orthogonal with the low-level code optimization.
基金The research is supported by the National Natural Science Foundation of China under Grant No. 90304012 and No. 10331030.
文摘Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.