共查询到20条相似文献,搜索用时 0 毫秒
1.
Beimel A. Livne N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2626-2643
Secret-sharing schemes are a tool used in many cryptographic protocols. In these schemes, a dealer holding a secret string distributes shares to the parties such that only authorized subsets of participants can reconstruct the secret from their shares. The collection of authorized sets is called an access structure. An access structure is ideal if there is a secret-sharing scheme realizing it such that the shares are taken from the same domain as the secrets. Brickell and Davenport (Journal of Cryptology, 1991) have shown that ideal access structures are closely related to matroids. They give a necessary condition for an access structure to be ideal-the access structure must be induced by a matroid. Seymour (Journal of Combinatorial Theory B, 1992) has proved that the necessary condition is not sufficient: There exists an access structure induced by a matroid that does not have an ideal scheme. The research on access structures induced by matroids is continued in this work. The main result in this paper is strengthening the result of Seymour. It is shown that in any secret-sharing scheme realizing the access structure induced by the Vamos matroid with domain of the secrets of size k, the size of the domain of the shares is at least k + Omega(radic(k)). The second result considers nonideal secret-sharing schemes realizing access structures induced by matroids. It is proved that the fact that an access structure is induced by a matroid implies lower and upper bounds on the size of the domain of shares of subsets of participants even in nonideal schemes (as long as the shares are still relatively short). This generalized results of Brickell and Davenport for ideal schemes. Finally, an example of a nonideal access structure that is nearly ideal is presented. 相似文献
2.
《Signal Processing, IEEE Transactions on》2009,57(3):977-992
3.
Certain Doppler blood flow measurements are well done by extracting the greatest momentarily present frequency; an alternative method involving counting of minima is presented, along with a circuit type that directly produces a volume-indicating integral. 相似文献
4.
5.
One modulation method called the frequency counting modulator (FCM), which can produce various constant envelope signals, is proposed. The FCM is materialized by only digital circuits and, therefore, is easily implemented in a large scale integrated circuit (LSI). From analytical study of the FCM, design formulas are derived for MSK-type modulation, and modulated signal performance features are clarified in terms of minimum signal distance, the effect of a Gaussian receiving filter, and spectral power concentration. 相似文献
6.
《Electromagnetic Compatibility, IEEE Transactions on》1986,28(2):105-107
The Federal Communications Commission (FCC) requires that all computing devices meet radiated electromagnetic (EM) emission limits before they are marketed in the United States. EM emission measurements must be made in an environment where the results can be correlated with the results of tests made in an open field. Although the FCC does not specify a method of correlation, it is not uncommon to add or subtract correction factors to the measured results. These correction factors are usually arrived at by comparing data taken in the nonideal environment with theoretical or open-field data. However, when correction factors are applied without regard to the characteristics of the EM source, the corrected value may be more in error than the uncorrected value. 相似文献
7.
The phase shifts of 3×3 singlemode couplers deviate from 120° because of losses and asymmetries. The dependence of the phase shifts on the input states of polarisation is shown. Furthermore, the phase shift deviations due to power splitting asymmetries can be predicted numerically to some extent without phase sensitive measurements 相似文献
8.
Digital analysis and processing of signals inherently relies on the existence of methods for reconstructing a continuous-time signal from a sequence of corrupted discrete-time samples. In this paper, a general formulation of this problem is developed that treats the interpolation problem from ideal, noisy samples, and the deconvolution problem in which the signal is filtered prior to sampling, in a unified way. The signal reconstruction is performed in a shift-invariant subspace spanned by the integer shifts of a generating function, where the expansion coefficients are obtained by processing the noisy samples with a digital correction filter. Several alternative approaches to designing the correction filter are suggested, which differ in their assumptions on the signal and noise. The classical deconvolution solutions (least-squares, Tikhonov, and Wiener) are adapted to our particular situation, and new methods that are optimal in a minimax sense are also proposed. The solutions often have a similar structure and can be computed simply and efficiently by digital filtering. Some concrete examples of reconstruction filters are presented, as well as simple guidelines for selecting the free parameters (e.g., regularization) of the various algorithms. 相似文献
9.
Many software reliability time-domain bug-counting models are, as fault counters, special cases of the stochastic process known as the death process. Generalization to a nonhomogeneous birth-death process achieves three ends: stochastic fault introduction, the synthesis of a time-dependent failure rate with imperfect debugging and fault introduction, and the mathematical unification of much bug-counting theory. Often, the price for generalization is mathematical intractability. Yet useful and tractable reliability measures with strong intuitive appeal are derived. The paper opens with a brief general discussion of software reliability and a selective review of some bug-counting models. Thereafter, the fundamental concepts and equations of a birth-death process are presented and applied to software reliability modeling. Assumptions for this application are then dealt with at some length. Reliability measures-initial, present, and future - are developed. Finally. the practical application of the model in the reliability assessment of a software package is discussed. 相似文献
10.
11.
12.
Lin Zhu Guozhong Wang Li Xia Shizhong Xie 《Journal of Infrared, Millimeter and Terahertz Waves》2002,23(3):465-473
Chirped fiber Bragg grating (CBG) has been used to compensate the dispersion in the optical fiber communication system. We substitute dispersion compensation fiber (DCF) with CBG in the 10Gbit/s disperion-managed system over 1100km. In order to get system performance in the nonideal situation, the parameters of CBG are varied from the designed optimum in some extent. Post-, pre- and dual-compensation methods are compared. 相似文献
13.
《Microwave Theory and Techniques》1985,33(12):1367-1374
The theoretical efficiency for frequency triplers multiplying from 300 to 900 GHz has been calculated for nonideal GaAs Schottky diodes operating in the varistor mode. The maximum efficiency is determined to be about 7 percent, only slightly smaller than that for ideal varistors. Guidelines for optimum bias conditions and embedding network impedances have been determined using the large-signal analysis computer program of Siegel and Kerr. 相似文献
14.
《Microwave Theory and Techniques》1959,7(2):288-293
Negative conductance amplifiers are usually operated with a circulator in order to achieve greater gain-bandwidth products and stable operation. Typical circulators differ from ideal circulators in that the forward loss between ports is not zero, and the reverse isolation between ports is not intinite. The main effects of nonintinite isolation are shown to be a modified gain-bandwidth product and a assumed to exist between ports 3 and 2. No other dechange in output admittance of the circulator output port. These effects result principally from the finite isolation between the output and amplifier ports. The main effect of incidental dissipation has previously been shown to be an increase in system noise figure. This paper considers only the effects caused by noninfinite isolation. A model of a lossless three-port circulator with noninfinite isolation is set up, and a negative conductance amplifier is considered to be limited to ensure a positive output conductance at the output port of the circulator (that is, the combination of negative conductance amplifier and nonideal circulator is assumed to be open-circuit stable). Subject to this assumption, the combination of negative conductance amplifier and nonideal circulator is then analyzed for its output admittance, available power gain, and effective input noise temperature. 相似文献
15.
针对晶体中光电子涨落的特点,分析了光吸收激发和热激发中影响光电子产生的因素.在光电子的衰减阶段,不同的电子陷阱所起的作用不同,浅电子陷阱由于延长了光电子在导带的弛豫时间,使光电子的衰减变缓;而深电子陷阱由于对光电子形成强束缚或作为复合中心加速了光电子的衰减. 相似文献
16.
17.
Martin T.L. Siewiorek D.P. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2001,9(1):29-34
This paper explores the system-level power-performance tradeoffs of dynamically varying CPU speed. Previous work in CPU speed-setting considered only the power of the CPU and only CPUs that vary supply voltage with frequency. This work takes a broader approach, considering total system power, battery capacity, and main memory bandwidth. The results, which are up to a factor of four less than ideal, show that all three must be considered when setting the CPU speed 相似文献
18.
19.
在高频的微波光子学研究的领域中,光载无线(RoF)技术已经成为下一代宽带无线通信技术的发展热点。近年来,支撑RoF技术的新型光电子器件的关键技术有毫米波副载波光学产生技术和接收技术,其中包括外调制器方法、射频上转换法、光学外差法、毫米波调制光脉冲发生器等等。这些技术的突破将促进RoF技术市场化的步伐。 相似文献