Secure Signature Protocol (Report)
Intelligent Information Management 2009, Dec, 1, 3
-
- 5٫99 US$
-
- 5٫99 US$
وصف الناشر
1. Introduction Feigenbaum proposes the following problem [1]: Alice has a function f() and a its instance x. She needs to compute f(x), but does not have the corresponding computing resources, or because she is too lazy to do the computing. The sources here are in general sense which includes the computing time, algorithmic knowledge or corresponding hardware. If Bob has the corresponding resources, can she take advantage of Bob's resources without trust him? That is, can she use Bob's resources to compute f(x) without letting Bob know x and f(x)?
Design and Comparison of Simulated Annealing Algorithm and GRASP to Minimize Makespan in Single Machine Scheduling with Unrelated Parallel Machines.
٢٠١٠
Policy Research in a Complex Context (Report)
٢٠١٠
Literature Review of Single Machine Scheduling Problem with Uniform Parallel Machines (Report)
٢٠١٠
How to Make Highly Rational Use of Modern Educational Technologies (Report)
٢٠١٠
Simulated Annealing Algorithm to Minimize Makespan in Single Machine Scheduling Problem with Uniform Parallel Machines (Report)
٢٠١١
Data Mining Technology Across Academic Disciplines (Report)
٢٠١١