Inspired by the process of human memory and interaction, this paper provides a discovery model of user demands. We can get the keywords network and episodic network by capture and analysis the user's behavior in t...
详细信息
The fundamental challenge confronting micro-blog short texts is to represent, compute and mine their semantics since they are colloquial language and restricted within 140 words. This paper presents an approach to rep...
详细信息
At present, the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms recognition. There is no mature theory or tools for the entire process analysis of encr...
详细信息
Entanglement, one of the central mysteries of quantum mechanics, plays an essential role in numerous tasks of quantum information science. A natural question of both theoretical and experimental importance is whether ...
详细信息
Entanglement, one of the central mysteries of quantum mechanics, plays an essential role in numerous tasks of quantum information science. A natural question of both theoretical and experimental importance is whether universal entanglement detection can be accomplished without full state tomography. In this Letter, we prove a no-go theorem that rules out this possibility for nonadaptive schemes that employ single-copy measurements only. We also examine a previously implemented experiment [H. Park et al., Phys. Rev. Lett. 105, 230404 (2010)], which claimed to detect entanglement of two-qubit states via adaptive single-copy measurements without full state tomography. In contrast, our simulation and experiment both support the opposite conclusion that the protocol, indeed, leads to full state tomography, which supplements our no-go theorem. These results reveal a fundamental limit of single-copy measurements in entanglement detection and provide a general framework of the detection of other interesting properties of quantum states, such as the positivity of partial transpose and the k-symmetric extendibility.
Feature selection is an important means to solve the problem of dimension reduction in anomaly network traffic detection. Focusing on the problem of traditional feature selection algorithm based on information gain ne...
详细信息
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy...
详细信息
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is *** our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret *** guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data *** confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent *** analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI sce...
详细信息
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI scenario. By adding the reasonable assumption, our protocol offers higher min-entropy and, thus, can be used to certify more randomness than the standard SDI protocol of H.-W. Li et al. [Phys. Rev. A 84, 034301 (2011)]. Moreover, randomness expansion can be realized with a lower detection efficiency (about 85.4%) in the trusted source case than the standard one (about 93.4%). Meanwhile, this advantage is robust against parameter deviations of the source. But on the other hand, the sharp measurement cannot improve the performance much in this case. So, there is no need to characterize the measurement accurately. Furthermore, an analytical formula describing the relationship between the dimension witness value and the min-entropy of the output string is derived directly.
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation ...
详细信息
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation overhead and translated code of low *** this work,we take advantage of host registers,using register mapping strategy to promote the performance of *** mapping registers from guest Instruction-Set Architectures(ISA) to host machines,it could off-load the overhead caused by load and store operations of *** simplifying the rules of the intermediate code generated,it could lower the number of intermediate code and improve the quality of translated *** X86 to ALPHA on SPEC 2006,the code expansion reduces 32.86%and the performance of the optimized translator is improved by 7.55%.
暂无评论