期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
EFFICIENT SIXTH ORDER P-STABLE METHODS WITH MINIMAL LOCAL TRUNCATION ERROR FOR y"=f(x,y)
1
作者 Kai-li Xiang R.M.Thomas 《Journal of Computational Mathematics》 SCIE CSCD 2002年第2期175-184,共10页
A family of symmetric (hybrid) two step sixth P-stable methods for the accurate numerical integration of second order periodic initial value problems have been considered in this paper. These methods, which require on... A family of symmetric (hybrid) two step sixth P-stable methods for the accurate numerical integration of second order periodic initial value problems have been considered in this paper. These methods, which require only three (new) function evaluation per iteration and per step integration. These methods have minimal local truncation error (LTE) and smaller phase-lag of sixth order than some sixth orders P-stable methods in [1-3,10-11]. The theoretical and numerical results show that these methods in this paper are more accurate and efficient than some methods proposed in [1-3,10]. 展开更多
关键词 second order periodic initial value problems p-stable PHASE-LAG local truncation error
全文增补中
TH指数为α的LND p- Stable过程的 Salem集(英文)
2
作者 钟玉泉 胡迪鹤 《数学杂志》 CSCD 北大核心 2001年第2期121-126,共6页
在本文中 ,我们讨论了指数为 α的 LNDp - Stable过程的象集 ,获得了 Salem集 .也就是说 ,对任意的紧集 E R ,如果 dim E <α ,那么 X(E) a.s.是一个维数为 1 /αdim E的 Salem集 .
关键词 Mβ集 Fourier维数 Salem集 FOURIER变换 LND p-stable过程
下载PDF
Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage
3
作者 XIANG Guangli LIN Xiang +1 位作者 WANG Hao LI Beilei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期163-170,共8页
Cloud storage is widely used in massive data outsourcing, but how to efficiently query encrypted multidimensional data stored in an untrusted cloud environment remains a research challenge. We propose a high performan... Cloud storage is widely used in massive data outsourcing, but how to efficiently query encrypted multidimensional data stored in an untrusted cloud environment remains a research challenge. We propose a high performance and privacy-preserving query(p LSH-PPQ) scheme over encrypted multidimensional data to address this challenge. In our scheme, for a given query, the proxy server will return K top similar data object identifiers. An enhanced Ciphertext-Policy Attribute-Based Encryption(CP-ABE)policy is used to control access to the search results. Therefore, only the requester with the permission attribute can obtain correct secret keys to decrypt the data. Security analysis proves that the p LSH-PPQ scheme achieves data confidentiality and reserves the data owner's privacy in a semi-trusted cloud. In addition, evaluations demonstrate that the p LSH-PPQ scheme can significantly reduce response time and provide high search efficiency without compromising on search quality. 展开更多
关键词 cloud storage privacy preservation Locality Sensi-tive Hashing Scheme based on p-stable distributions (p-LSH) permission attribute
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部