-
1
Relation Between Quantum Advantage in Supervised Learning and Quantum Computational Advantage
Published 2024-01-01“…The widespread use of machine learning has raised the question of quantum supremacy for supervised learning as compared to quantum computational advantage. In fact, a recent work shows that computational and learning advantages are, in general, not equivalent, i.e., the additional information provided by a training set can reduce the hardness of some problems. …”
Get full text
Article -
2
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01“… Computationally complex tasks, or "hard problems" for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. …”
Get full text
Article -
3
Parallelizing Quantum Simulation With Decision Diagrams
Published 2024-01-01“…Since people became aware of the power of quantum phenomena in the domain of traditional computation, a great number of complex problems that were once considered intractable in the classical world have been tackled. …”
Get full text
Article -
4
Triple receiver public key encryption cryptosystem
Published 2020-12-01“…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
Get full text
Article -
5
An Efficient Two-Objective Hybrid Local Search Algorithm for Solving the Fuel Consumption Vehicle Routing Problem
Published 2016-01-01“…To tackle the FCVRP’s computational intractability, we propose an efficient two-objective hybrid local search algorithm (TOHLS). …”
Get full text
Article -
6
An Efficient Algorithm to Find Broadcast Schedule in Ad Hoc TDMA Networks
Published 2008-01-01Get full text
Article -
7
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01“…In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient.…”
Get full text
Article -
8
Track-to-Track Association Based on Structural Similarity in the Presence of Sensor Biases
Published 2014-01-01“…In some challenging scenarios, it may be infeasible to implement bias estimation and compensation in time due to the computational intractability or weak observability about sensor biases. …”
Get full text
Article -
9
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01“…,the key was used for data confidentiality and/or integrity).There has been much interest in password-authenticated key exchange protocol which remains secure even when users choose passwords from a small space of possible passwords,such as a dictionary of English words.A password-based authenticated key exchange scheme was proposed.The analysis shows that the scheme is secure against dictionary attack under the computational Diffie-Hellman intractability assumption,and preserves user privacy and achieves unlinkability.Furthermore,since denial-of-service(DoS) attacks have become a common threat,DoS-resistantance is a design consid-eration and the scheme is proved to be secure against denial-of-service attacks.…”
Get full text
Article -
10
-
11
Deep Q-Networks for Minimizing Total Tardiness on a Single Machine
Published 2024-12-01“…This paper considers the single-machine scheduling problem of total tardiness minimization. Due to its computational intractability, exact approaches such as dynamic programming algorithms and branch-and-bound algorithms struggle to produce optimal solutions for large-scale instances in a reasonable time. …”
Get full text
Article -
12
Geographical Peer Matching for P2P Energy Sharing
Published 2025-01-01“…We define and analyze in this work a precise mathematical modeling of the geographical peer matching problem, and demonstrate the inherent intractability of the problem, highlighting its high computational cost and underscoring the critical need for scalable approaches that effectively balance performance trade-offs as system size grows. …”
Get full text
Article -
13
Verifiable measurement-based quantum random sampling with trapped ions
Published 2025-01-01“…One way to demonstrate the advantage of quantum computation is through quantum random sampling performed on quantum computing devices. …”
Get full text
Article -
14
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01“…We formally analyzed the security of our protocol and results showed that the protocol is secure if the Computational Diffie-Hellman (CDH) problem is intractable. …”
Get full text
Article -
15
Implementation of Membrane Algorithms on GPU
Published 2014-01-01“…Membrane algorithms are a new class of parallel algorithms, which attempt to incorporate some components of membrane computing models for designing efficient optimization algorithms, such as the structure of the models and the way of communication between cells. …”
Get full text
Article -
16
Modelling and Metaheuristic for Gantry Crane Scheduling and Storage Space Allocation Problem in Railway Container Terminals
Published 2017-01-01“…A metaheuristic named backtracking search algorithm (BSA) is then improved to solve this intractable problem. A series of computational experiments are carried out to evaluate the performance of the proposed algorithm under some randomly generated cases based on the practical operation conditions. …”
Get full text
Article -
17
ID-based signature without trusted PKG
Published 2008-01-01“…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
Get full text
Article -
18
Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
Published 2018-01-01“…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
Get full text
Article -
19
PARALLEL ALGORITHMS OF RANDOM FORESTS FOR CLASSIFYING VERY LARGE DATASETS
Published 2013-06-01“…The learning and classification tasks of a set of decision trees take a lot of time, make it intractable when dealing with very large datasets. There is a need to scale up the random forests algorithm to handle massive datasets. …”
Get full text
Article -
20
Protect or prevent? A practicable framework for the dilemmas of COVID-19 vaccine prioritization.
Published 2025-01-01“…Answering such questions often becomes computationally intractable given that network size can exceed millions. …”
Get full text
Article