Results 1 to 10 of about 6,357 (206)

Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing [PDF]

open access: yesEntropy
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification.
Mengdi Zhao, Huiyan Chen
doaj   +2 more sources

Towards quantum advantage via topological data analysis [PDF]

open access: yesQuantum, 2022
Even after decades of quantum computing development, examples of generally useful quantum algorithms with exponential speedups over classical counterparts are scarce.
Casper Gyurik, Chris Cade, Vedran Dunjko
doaj   +1 more source

Quantum query complexity of symmetric oracle problems [PDF]

open access: yesQuantum, 2021
We study the query complexity of quantum learning problems in which the oracles form a group $G$ of unitary matrices. In the simplest case, one wishes to identify the oracle, and we find a description of the optimal success probability of a $t$-query ...
Daniel Copeland, Jamie Pommersheim
doaj   +1 more source

Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes

open access: yesСистеми обробки інформації, 2022
The development of information technologies in cyberspace is associated with the development of security services in the components of security: cybersecurity, information security and information security.
Р.В. Корольов   +4 more
doaj   +1 more source

Low-Resolution Precoding for Multi-Antenna Downlink Channels and OFDM

open access: yesEntropy, 2022
Downlink precoding is considered for multi-path multi-input single-output channels where the base station uses orthogonal frequency-division multiplexing and low-resolution signaling.
Andrei Stefan Nedelcu   +2 more
doaj   +1 more source

Tight bound for estimating expectation values from a system of linear equations 

open access: yesPhysical Review Research, 2022
The system of linear equations problem (SLEP) is specified by a complex invertible matrix A, the condition number κ of A, a vector b, a Hermitian matrix M, and an accuracy ε, and the task is to estimate x^{†}Mx, where x is the solution vector to the ...
Abhijeet Alase   +4 more
doaj   +1 more source

Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations

open access: yesIEEE Access, 2023
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE).
Ardianto Satriawan   +5 more
doaj   +1 more source

Multi-user multi-objective computation offloading for medical image diagnosis [PDF]

open access: yesPeerJ Computer Science, 2023
Computation offloading has effectively solved the problem of terminal devices computing resources limitation in hospitals by shifting the medical image diagnosis task to the edge servers for execution.
Qi Liu   +4 more
doaj   +2 more sources

Accelerated non-negative tensor completion via integer programming

open access: yesFrontiers in Applied Mathematics and Statistics, 2023
The problem of tensor completion has applications in healthcare, computer vision, and other domains. However, past approaches to tensor completion have faced a tension in that they either have polynomial-time computation but require exponentially more ...
Wenhao Pan   +3 more
doaj   +1 more source

Detecting overlapping communities in complex networks using non-cooperative games

open access: yesScientific Reports, 2022
Detecting communities in complex networks is of paramount importance, and its wide range of real-life applications in various areas has caused a lot of attention to be paid to it, and many efforts have been made to have efficient and accurate algorithms ...
Farhad Ferdowsi   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy