Zobrazeno 1 - 10
of 226
pro vyhledávání: '"OBDD"'
Publikováno v:
IEEE Access, Vol 10, Pp 114393-114401 (2022)
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud. Most existing attribute-based blind signature schemes have complex bilinear pairin
Externí odkaz:
https://doaj.org/article/ee0727f8af1d491d9571d5770866235d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 8, Pp 18546-18557 (2020)
With the advancement of information and communication technology (ICT), the medical sector is undergoing a massive transformation. Health records are being digitized, stored remotely in the cloud and shared with different stakeholders. However, the u
Externí odkaz:
https://doaj.org/article/5cfa040c50c146529c9973d789ac4d1f
Controlled Islanding for a Hybrid AC/DC Grid With VSC-HVDC Using Semi-Supervised Spectral Clustering
Autor:
Yang Li, Shangsong Wu
Publikováno v:
IEEE Access, Vol 7, Pp 10478-10490 (2019)
As the last resort of emergency control, controlled islanding is an effective means of preventing fault propagation and a system-wide blackout. However, conventional ac transmission lines are unavailable to be employed for power exchange between thes
Externí odkaz:
https://doaj.org/article/f1808c282ba14aa5b39990e3e144be89
Publikováno v:
Symmetry, Vol 12, Iss 1, p 166 (2020)
In line with the proposed 5th Generation network, content centric network/named data networking (CCN/NDN) has been offered as one of the promising paradigms to cope with the communication needs of future realistic network communications. CCN/NDN allo
Externí odkaz:
https://doaj.org/article/302eb40d750f46f5b436e0c629a9823c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
He, Leifeng, Liu, Guanjun
Publikováno v:
COMPUTING AND INFORMATICS; Vol. 40 No. 5 (2021): Computing and Informatics; 1174–1196
Computation Tree Logic of Knowledge (CTLK) can specify many requirements of privacy and security of multi-agent systems (MAS). In our previous papers, we defined Knowledge-oriented Petri Net (KPN) to model MAS, proposed similar reachability graph to
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 8, Pp 18546-18557 (2020)
With the advancement of information and communication technology (ICT), the medical sector is undergoing a massive transformation. Health records are being digitized, stored remotely in the cloud and shared with different stakeholders. However, the u
We show that for any connected graph G the size of any regular resolution or OBDD(∧, reordering) refutation of a Tseitin formula based on G is at least 2^Ω(tw(G)), where tw(G) is the treewidth of G. These lower bounds improve upon the previously k
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20ca5939234b7e5614edee1c7c7fa06a