Baidu
map
筛选条件 共查询到79条结果
排序方式
An Exchanged 3-Ary n-Cube Interconnection Network for Parallel Computation

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (03)

The interconnetion network plays an important role in a parallel system. To avoid the edge number of the interconnect network scaling rapidly with the......

(n-2)-Fault-Tolerant Edge-Pancyclicity of Crossed Cubes CQ(n)

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (03)

As one of the most fundamental networks for parallel and distributed computation, cycle is suitable for developing simple algorithms with low communic......

Subgraph-based Strong Menger Connectivity of Hypercube and Exchanged Hypercube

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (03)

Large scale multiprocessor systems or multicomputer systems, taking interconnection networks as underlying topologies, have been widely used in the bi......

The r-Extra Diagnosability of Hyper Petersen Graphs

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (04)

The diagnosability of a multiprocessor system or an interconnection network plays an important role in measuring the fault tolerance of the network. I......

Infinite Families of 2-Designs from a Class of Linear Codes Related to Dembowski-Ostrom Functions

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (03)

Due to their important applications to coding theory, cryptography, communications and statistics, combinatorial t-designs have attracted lots of rese......

Graph Orientation with Edge Modifications

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (2)

The goal of an outdegree-constrained edge-modification problem is to find a spanning subgraph or supergraph H of an input undirected graph G such that......

Super C-k and Sub-C-k Connectivity of k-Ary n-Cube Networks

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (2)

Let G be an undirected graph. An H-structure-cut (resp. H-substructure-cut) of G is a set of subgraphs of G, if any, whose deletion disconnects G, whe......

Relation of Extra Edge Connectivity and Component Edge Connectivity for Regular Networks

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (2)

Reliability of interconnection networks is important to design multiprocessor systems. The extra edge connectivity and component edge connectivity are......

Triple Cyclic Codes Over Fq plus uFq

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (2)

Let R = F-q + uF(q), where q is a power of a prime number p and u(2) = 0. A triple cyclic code of length (r; s; t) over R is a set that can be partiti......

Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (01)

The Cramer-Shoup (CS) like cryptosystem based on index exchangeable family (IEF) construction is a novel scheme introduced in Asiaccs 2016 by Li et al......

Hamiltonian Cycle Embeddings in Faulty Hypercubes Under the Forbidden Faulty Set Model

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (01)

In this paper, we study the fault-tolerant capability of hypercubes with respect to the hamiltonian property based on the concept of forbidden faulty ......

Strict Linearizability and Abstract Atomicity

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021; 32 (01)

Linearizability is a commonly accepted consistency condition for concurrent objects. Filipovic et al. show that linearizability is equivalent to obser......

Communication Performance Evaluation of the Locally Twisted Cube

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020; 31 (2)

The topology properties of multi-processors interconnection networks are important to the performance of high performance computers. The hypercube net......

Security of Auditing Protocols Against Subversion Attacks

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020; 31 (2)

In 2013, the revelation of Edward Snowden rekindled cryptographic researchers' interest in subversion attacks. Since then, many works have been carrie......

CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution

期刊: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020; 31 (2)

Certificateless cryptosystems have attracted great interests in cryptographic research since its invention. Because compared with traditional public k......

共79条页码: 1/6页15条/页
Baidu
map
Baidu
map
Baidu
map