期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Partial or Truncated Sharing Values of Meromorphic Functions with Their Shifts
1
作者 lian gui chen jun-fan +1 位作者 cai xiao-hua ji you-qing 《Communications in Mathematical Research》 CSCD 2018年第4期343-350,共8页
We mainly study the periodicity theorems of meromorphic functions having truncated or partial sharing values with their shifts, where meromorphic functions are of hyper order less than 1 and N(r, f) aT(r; f) for s... We mainly study the periodicity theorems of meromorphic functions having truncated or partial sharing values with their shifts, where meromorphic functions are of hyper order less than 1 and N(r, f) aT(r; f) for some positive number a. 展开更多
关键词 meromorphic function PERIODICITY truncated sharing value partial sharing value
下载PDF
Performance Analysis of Wavelength Division Multiplexing Asynchronous Internet Router Employing Space Priority Mechanism under Self-Similar Traffic Input—Multi-Server Queueing System with Markovian Input and Erlang-k Services
2
作者 Ravi Kumar Gudimalla Malla Reddy Perati 《Applied Mathematics》 2016年第15期1707-1725,共19页
In this paper, we analyze the queueing behaviour of wavelength division multiplexing (WDM) Internet router employing partial buffer sharing (PBS) mechanism with self-similar traffic input. In view of WDM technology in... In this paper, we analyze the queueing behaviour of wavelength division multiplexing (WDM) Internet router employing partial buffer sharing (PBS) mechanism with self-similar traffic input. In view of WDM technology in networking, each output port of the router is modelled as multi-server queueing system. To guarantee the quality of service (QoS) in Broadband integrated services digital network (B-ISDN), PBS mechanism is a promising one. As Markov modulated Poisson process (MMPP) emulates self-similar Internet traffic, we can use MMPP as input process of queueing system to investigate queueing behaviour of the router. In general, as network traffic is asynchronous (unslotted) and of variable packet lengths, service times (packet lengths) are assumed to follow Erlang-k distribution. Since, the said distribution is relatively general compared to deterministic and exponential. Hence, specific output port of the router is modelled as MMPP/Ek/s/C queueing system. The long-term performance measures namely high priority and low priority packet loss probabilities and the short-term performance measures namely mean lengths of critical and non-critical periods against the system parameters and traffic parameters are computed by means of matrix-geometric methods and approximate Markovian model. This kind of analysis is useful in dimensioning the router under self-similar traffic input employing PBS mechanism to provide differentiated services (DiffServ) and QoS guarantee. 展开更多
关键词 WDM Internet Router SELF-SIMILARITY partial Buffer sharing Erlang-k Service Packet Loss Probability
下载PDF
Secure personal data sharing in cloud computing using attribute-based broadcast encryption 被引量:1
3
作者 FU Jing-yi HUANG Qin-long +1 位作者 MA Zhao-feng YANG Yi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第6期45-51,77,共8页
The ciphertext-policy(CP) attribute-based encryption(ABE)(CP-ABE) emergings as a promising technology for allowing users to conveniently access data in cloud computing. Unfortunately, it suffers from several dra... The ciphertext-policy(CP) attribute-based encryption(ABE)(CP-ABE) emergings as a promising technology for allowing users to conveniently access data in cloud computing. Unfortunately, it suffers from several drawbacks such as decryption overhead, user revocation and privacy preserving. The authors proposed a new efficient and privacy-preserving attribute-based broadcast encryption(BE)(ABBE) named EP-ABBE, that can reduce the decryption computation overhead by partial decryption, and protect user privacy by obfuscating access policy of ciphertext and user's attributes. Based on EP-ABBE, a secure and flexible personal data sharing scheme in cloud computing was presented, in which the data owner can enjoy the flexibly of encrypting personal data using a specified access policy together with an implicit user index set. With the proposed scheme, efficient user revocation is achieved by dropping revoked user's index from the user index set, which is with very low computation cost. Moreover, the privacy of user can well be protected in the scheme. The security and performance analysis show that the scheme is secure, efficient and privacy-preserving. 展开更多
关键词 data sharing ABBE ABE user revocation partial decryption privacy preserving
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部