Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Proposal of an experimentally accessible measure of many-fermion entanglement  [PDF]
M. Kindermann
Physics , 2005, DOI: 10.1103/PhysRevLett.96.240403
Abstract: We propose a measure of interaction-induced ground state entanglement in many-fermion systems that is experimentally accessible. It is formulated in terms of cross-correlations of currents through resonant fermion levels weakly coupled to the probed system. The proposed entanglement measure vanishes in the absence of many-body interactions and it is related to measures of occupation number entanglement. We evaluate it for two examples of interacting electronic nanostructures.
Emerging Cloud Computing Paradigm
Abu Sarwar Zamani,Md Mobin Akhtar,Sultan Ahmad
International Journal of Computer Science Issues , 2011,
Abstract: andamp;quot;Cloudandamp;quot; computing - a relatively recent term, defines the paths ahead in computer science world. Being built on decades of research it utilizes all recent achievements in virtualization, distributed computing, utility computing, and networking. It implies a service oriented architecture through offering software and platforms as services, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on demand services and many other things. This paper is a brief survey based on readings of "cloud" computing and it tries to address related research topics, challenges ahead and possible applications.
Iterative procedure for computing accessible information in quantum communication  [PDF]
Jaroslav ?ehá?ek,Berthold-Georg Englert,Dagomir Kaszlikowski
Physics , 2004, DOI: 10.1103/PhysRevA.71.054303
Abstract: We present an iterative algorithm that finds the optimal measurement for extracting the accessible information in any quantum communication scenario. The maximization is achieved by a steepest-ascent approach toward the extremal point, following the gradient uphill in sufficiently small steps. We apply it to a simple ad-hoc example, as well as to a problem with a bearing on the security of a tomographic protocol for quantum key distribution.
Reconfigurable computing - a new paradigm
Erica Mang,Ioan Mang,Popescu-Rotoiu Constantin
Journal of Computer Science and Control Systems , 2009,
Abstract: Computational science applications and advanced scientific computing have made tremendous gains in the past decade. Researchers are regularly employing the power of large computing systems and parallel processing to tackle larger and more complex problems in all of the physical sciences. For the past decade or so, most of this growth in computing power has been “free” with increased efficiency more-or-less governed by Moore’s Law. However, increases in performance are becoming harder to achieve due to the complexity of the parallel computing platforms and the software required for these systems. Reconfigurable computing, or heterogeneous computing, is offering some hope to the scientific computing community as a means to continued growth in computing capability.
Computing discrete logarithm by interval-valued paradigm  [PDF]
Benedek Nagy,Sándor Vályi
Computer Science , 2014, DOI: 10.4204/EPTCS.143.7
Abstract: Interval-valued computing is a relatively new computing paradigm. It uses finitely many interval segments over the unit interval in a computation as data structure. The satisfiability of Quantified Boolean formulae and other hard problems, like integer factorization, can be solved in an effective way by its massive parallelism. The discrete logarithm problem plays an important role in practice, there are cryptographical methods based on its computational hardness. In this paper we show that the discrete logarithm problem is computable by an interval-valued computing in a polynomial number of steps (within this paradigm).
Distributed Computing: An Emerging Paradigm for New Technologies  [PDF]
Swati Gupta,Kuntal Saroha,Samiksha Mehta
International Journal of Computer Science and Management Studies , 2011,
Abstract: Terms such as ‘Distributed Computing’ have gained a lot of ttention, as they are used to describe emerging paradigms for the management of information and computing resources. Distributed computing is that type of computing that uses geographically and administrativelydisparate resources. In distributed computing, individual users can access computers and data transparently, without having to consider location, operating system, account administration, and other details. In distributed computing, the details are abstracted, and the resources are virtualized. In this paper , we presented this technology , its characteristics and also its architecture.
A New Analytical Method for Computing Solvent Accessible Surface Area and its Gradients for Macromolecules  [PDF]
Shura Hayryan,Chin-Kun Hu,Jaroslav Sk?ivánek,Edik Hayryan,Imrich Pokorny
Physics , 2003,
Abstract: In the calculation of thermodynamic properties and three dimensional structures of macromolecules, such as proteins, it is important to have a good algorithm for computing solvent accessible surface area of macromolecules. Here we propose a new analytical method for this purpose. In the proposed algorithm, we consider the transformation which maps the spherical circles of intersection of atomic surfaces in three-dimensional space onto the circles on a two-dimensional plane and the problem of computing solvent accessible surface area is transformed into the problem of computing corresponding curve integrals on the plane. This allows to consider only integrals over the circular trajectories on the plane. The algorithm is suitable for parallelization. Testings on several small proteins have shown a high accuracy of the algorithm and a good performance.
Instant Computing - A New Computation Paradigm  [PDF]
Hans-Rudolf Thomann
Computer Science , 2006,
Abstract: Voltage peaks on a conventional computer's power lines allow for the well-known dangerous DPA attacks. We show that measurement of a quantum computer's transient state during a computational step reveals information about a complete computation of arbitrary length, which can be extracted by repeated probing, if the computer is suitably programmed. Instant computing, as we name this mode of operation, recognizes for any total or partial recursive function arguments lying in the domain of definition and yields their function value with arbitrary small error probability in probabilistic linear time. This implies recognition of (not necessarily recursively enumerable) complements of recursively enumerable sets and the solution of the halting problem. Future quantum computers are shown to be likely to allow for instant computing, and some consequences are pointed out.
A User Identity Management Protocol for Cloud Computing Paradigm  [PDF]
Safiriyu Eludiora, Olatunde Abiona, Ayodeji Oluwatope, Adeniran Oluwaranti, Clement Onime, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.43019
Abstract: Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.
Survey of Task Computing Paradigm in Ubiquitous Environment

JIANG Fa-qun,LI Jin-tao,ZHU Zhen-min,LUO Hai-yong,

计算机科学 , 2009,
Abstract: To minimize distractions on a user's attention and realize the user centric ubiquitous computing, task computing paradigm has gained increasing acceptance and been regarded as a promising way for ubictuitous environment. The existing related researches on task computing paradigm were analyzed and compared, and the summary of the future trend of the development of task computing paradigm was proposed.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.