CSpace

Browse/Search Results:  1-10 of 82 Help

Selected(0)Clear Items/Page:    Sort:
Complete permutation polynomials with the form (x(pm)- x plus delta)(s) + ax(pm) + bx over F-pn 期刊论文
FINITE FIELDS AND THEIR APPLICATIONS, 2019, 卷号: 57, 页码: 309-343
Authors:  Xu, Xiaofang;  Feng, Xiutao;  Zeng, Xiangyong
Favorite  |  View/Download:11/0  |  Submit date:2020/01/10
Complete permutation polynomial  Permutation polynomial  AGW criterion  Finite field  
Joint Switch Upgrade and Controller Deployment in Hybrid Software-Defined Networks 期刊论文
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 卷号: 37, 期号: 5, 页码: 1012-1028
Authors:  Guo, Zehua;  Chen, Weikun;  Liu, Ya-Feng;  Xu, Yang;  Zhang, Zhi-Li
Favorite  |  View/Download:11/0  |  Submit date:2020/01/10
Complexity analysis  controller deployment  heuristic algorithm  hybrid software-defined networking (SDN)  switch upgrade  upgrade budget  
The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers 期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 卷号: 65, 期号: 5, 页码: 2723-2735
Authors:  Zhang, Zhifang;  Xu, Jingke
Favorite  |  View/Download:13/0  |  Submit date:2020/01/10
Private information retrieval  capacity  sub-packetization  
科学精神的传承挑战与对策 期刊论文
科技导报北京, 2019, 卷号: 37, 期号: 22, 页码: 143-148
Authors:  李晓轩;  徐伟宣;  刘则渊;  李伦;  姜雪峰;  徐翔;  陈悦;  周涛;  徐芳;  刘文斌;  郑毅;  马士聪;  刘驰;  王贤文;  陈玥如
Favorite  |  View/Download:8/0  |  Submit date:2020/05/24
On sub-packetization and access number of capacity-achieving PIR schemes for MDS coded non-colluding servers 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 10, 页码: 16
Authors:  Xu, Jingke;  Zhang, Zhifang
Favorite  |  View/Download:18/0  |  Submit date:2018/11/16
private information retrieval  sub-packetization  access number  distributed storage  MDS code  
Information Security Protocol Based System Identification with Binary-Valued Observations 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
Authors:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
Favorite  |  View/Download:14/0  |  Submit date:2018/07/30
Cryptography  identification algorithm  information security  passive attacks  security protocol  time complexity  
SENSITIVITY ANALYSIS USING PERMUTATIONS 期刊论文
STATISTICA SINICA, 2018, 卷号: 28, 期号: 2, 页码: 817-837
Authors:  Xiong, Shifeng;  He, Xu;  He, Yuanzhen;  Mu, Weiyan
Favorite  |  View/Download:17/0  |  Submit date:2019/01/11
Kriging  permutation test  significance  Sobol' index  uncertainty quantification  
求解零空闲置换流水车间调度问题的离散烟花算法 期刊论文
系统工程理论与实践, 2018, 卷号: 38, 期号: 11, 页码: 2874
Authors:  刘翱;  冯骁毅;  邓旭东;  任亮;  刘波
Favorite  |  View/Download:11/0  |  Submit date:2020/01/10
稀疏线性规划研究 期刊论文
计算数学, 2018, 卷号: 040, 期号: 004, 页码: 339
Authors:  陈圣杰;  戴或虹;  徐凤敏
Favorite  |  View/Download:10/0  |  Submit date:2020/01/10
onsubpacketizationandaccessnumberofcapacityachievingpirschemesformdscodednoncolludingservers 期刊论文
sciencechinainformationscience, 2018, 卷号: 061, 期号: 010, 页码: 100306
Authors:  Xu Jingke;  Zhang Zhifang
Favorite  |  View/Download:10/0  |  Submit date:2020/01/10