نتایج جستجو برای: threshold access structures

تعداد نتایج: 880041  

A. Kaveh, S. M. Hosseini,

Design optimization of structures with discrete and continuous search spaces is a complex optimization problem with lots of local optima. Metaheuristic optimization algorithms, due to not requiring gradient information of the objective function, are efficient tools for solving these problems at a reasonable computational time. In this paper, the Doppler Effect-Mean Euclidian Distance Threshold ...

Journal: :Sci. Ann. Cuza Univ. 2006
Sorin Iftene

Preface A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups which belong to the access structure. Secret sharing schemes have been independently introduced by Blakley [12] and Shamir [134] as a solution for safeguarding cryptographic keys. Secret sharing...

Journal: :Discrete Math., Alg. and Appl. 2014
Irene Marquez Corbella Edgar Martínez-Moro Emilio Suárez-Canedo

In this paper we construct a subclass of the composite access structure introduced in [9] based on schemes realizing the structure given by the set of codewords of minimal support of linear codes. This class enlarges the iterated threshold class studied in the same paper. Furthermore all the schemes on this paper are ideal (in fact they allow a vector space construction) and we arrived to give ...

Journal: :Theor. Comput. Sci. 2000
Eric Bach Marcos A. Kiwi

Data structures for combinatorial objects are traditionally designed to handle objects up to a certain size. We introduce the idea of threshold data structures: representations that allow a richer collection of operations on small objects than large ones. As illustrations of the general concept we discuss threshold data structures for sets and multisets, and show how the former can be applied t...

2014
Lindsey Kuper Ryan R. Newton

Convergent replicated data types, or CvRDTs, are latticebased data structures for enforcing the eventual consistency of replicated objects in a distributed system. Although CvRDTs are provably eventually consistent, queries of CvRDTs nevertheless allow inconsistent intermediate states of replicas to be observed; and although in practice, many systems allow a mix of eventually consistent and str...

2016
Xingbing Fu Fagen Li Shengke Zeng

In this work, an oblivious transfer with complex access control scheme that is constructed based on ciphertext policy attribute based encryption (CP-ABE) scheme is proposed. In this scheme, the database server can enforce fine grained access control for each record where the authorized user is allowed to access, but the unauthorized user cannot, whereas it learns neither which record a user acc...

ژورنال: علوم آب و خاک 2014
جوکار, لادن, زارع, مریم, صوفی, مجید, نجابت, مسعود,

Gully erosion and sedimentation have high priority in Fars Province due to the losses from destruction of lands, roads and civil structures. In the present study, in order to evaluate the threshold for the development and initiation of gully topography in Fars province, two regions were selected including Allamarvdasht, Lamerd and Fedagh, Larestan. 30 gullies were selected in each mentioned are...

1993
Bruno Becker Stephan Gschwind Thomas Ohler Bernhard Seeger Peter Widmayer

We propose an asymptotically optimal multiversion B-tree. In our setting, insertions and deletions of data items are allowed only for the present version, whereas range queries and exact match queries are allowed for any version, present or past. The technique we present for transforming a (usual single version) B-tree into a multiversion B-tree is more general: it applies to a number of spatia...

1998
Mario A. Nascimento Jefferson R. O. Silva Yannis Theodoridis Michael H. Böhlen Renato Busatto Curtis E. Dyreson Heidi Gregersen Dieter Pfoser Simonas Šaltenis Janne Skyt Giedrius Slivinskas Kristian Torp Kwang W. Nam Keun H. Ryu

Several applications require management of data which is spatially dynamic, e.g., tracking of battle ships or moving cells in a blood sample. The capability of handling the temporal aspect, i.e., the history of such type of data, is also important. This paper presents and evaluates three temporal extensions of the R-tree, the 3D R-tree, the 2+3 R-tree and the HR-tree, which are capable of index...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید