Access structures determined by uniform polymatroids
In this article, all multipartite access structures obtained from uniform integer polymatroids were investigated using the method developed by Farràs, Martí-Farré, and Padró. They are matroid ports, i.e., they satisfy the necessary condition to be ideal.
Kawa Renata, Kula Mieczysław
doaj +3 more sources
Structure identification and state initialization of spin networks with limited access
For reliable and consistent quantum information processing carried out on a quantum network, the network structure must be fully known and a desired initial state must be accurately prepared on it.
Yuzuru Kato, Naoki Yamamoto
doaj +2 more sources
Structure–efficiency relationship of access group antibiotics via SK chromatic descriptors [PDF]
In graph theory, topological indices play a significant role as numerical descriptors of a graph, helping to summarize the physicochemical properties of a molecular graph.
R. Rajambigai +2 more
doaj +2 more sources
Design of Memory Access Structure for Coarse-Grained Reconfigurable Array with Decoupled Access Execute [PDF]
Coarse-Grained Reconfigurable Array(CGRA) architecture has both flexibility and efficiency,but its characteristics of high computing throughput also brings pressure to memory.In the case of the relative fixed bandwidth of off-chip Dynamic Random Access ...
HONG Tu, JING Naifeng
doaj +1 more source
The accessibility of an access structure [PDF]
Summary: In secret sharing, different access structures have different difficulty degrees for acceding to the secret. We give a numerical measure of how easy or how difficult is to recover the secret, depending only on the structure itself and not on the particular scheme used for realizing it. We derive some consequences.
Carreras, Francesc +2 more
openaire +1 more source
Attribute-based encryption schema with group signatures
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users.
ZHANG Xinglan, CUI Yao
doaj +3 more sources
CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj +1 more source
Azimuthal Asymmetries: Access to Novel Structure Functions [PDF]
One of the most interesting consequence of non-zero intrinsic transverse momentum of partons in the nucleon is the nontrivial azimuthal dependence of the cross section of hard scattering processes.
Asilyan, L. S. +3 more
core +2 more sources
Distributed Structure: Joint Expurgation for the Multiple-Access Channel [PDF]
In this work we show how an improved lower bound to the error exponent of the memoryless multiple-access (MAC) channel is attained via the use of linear codes, thus demonstrating that structure can be beneficial even in cases where there is no capacity ...
Erez, Uri, Haim, Eli, Kochman, Yuval
core +1 more source
A General Lexicographic Model for a Typological Variety of Dictionaries in African Languages
So far, there have been few descriptions on creating structures capable of storing lexi-cographic data, ISO 24613:2008 being one of the latest. Another one is by Spohr (2012), who designs a multifunctional lexical resource which is able to store data of ...
Gertrud Faaß +2 more
doaj +1 more source

