ID |
原文 |
译文 |
19595 |
在网络原型拓扑的支撑下构建Delaunary三角剖分,规划出节点进行本地化调度的局部工作子集。 |
The Delaunary triangulation is constructed based on the network prototypetopology to work out a local subset of nodes for localization scheduling. |
19596 |
通过折中与邻近节点的空外接圆半径,完成对感知半径的独立配置; |
Independent configuration of the perceived radius is achieved by discounting the radius of the circumcircle with the adjacent node. |
19597 |
引入几何线、面概念,利用重叠面积和有效约束圆弧完成对灰、黑色节点的分类识别,使得节点仅依赖本地及邻居信息进行半径调整和冗余休眠。 |
The concept of geometric line and plane is introduced, and the overlapping area and the effective constrained arcs are used to classify and identify the grey and black nodes. So the node only relies on local and neighbor information for radius adjustment and redundant node sleep. |
19598 |
仿真结果表明,NSSH能以低复杂度的代价,近似追平贪婪算法的去冗余性能,并表现出了对网络规模、异构跨度和参数配置的低敏感性。 |
The simulation results show that NSSH can approximately matchthe dropping redundancy of greedy algorithm at the cost of low complexity, and exhibit low sensitivity tonetwork size, heterogeneous span and parameter configuration. |
19599 |
由于命名数据网络(NDN)具有网内缓存特点,任意用户可直接从中间路由节点获取数据,同时,内容提供商也无法得知用户的访问信息。 |
Due to the feature of in-network caching in Named Data Networking (NDN), any consumer mightfetch the cached contents from NDN routers, but the content producers have no idea about details of certaincontents being accessed. |
19600 |
针对这些问题,该文结合基于身份的组合公钥和Schnorr签名方法,提出了“三次握手”匿名安全认证协议,同时,采用改进的秘密共享方法来高效分发内容密钥,实现了一种可追溯且轻量级的细粒度访问控制机制(TLAC),最后,通过实验验证了TLAC机制的高效性。 |
Considering these problems, a fine-grained Traceable and Lightweight Access Control(TLAC) scheme is presented. In the TLAC scheme, an anonymous and secure “three-way handshake”authentication protocol is presented by collaboratively leveraging the combined public key and the Schnorr signature, and an improved secret sharing method is used to distribute the key efficiently. Finally, the experimental results prove the efficiency of TLAC scheme. |
19601 |
为了克服云存储不可信及云存储中密文检索效率低的问题,该文提出区块链上基于B+树的密文排序可搜索加密方案。 |
In order to overcome the problem that cloud storage is not trusted and the low efficiency ofciphertext retrieval in cloud storage, a searchable ciphertext sorting encryption scheme based on B+ tree on theblock chain is proposed. |
19602 |
该方案结合区块链技术解决了在互不了解的多方建立可靠信任的问题; |
Combined with the blockchain technology, the problem of establishing reliable trust inmultiple parties that do not understand each other is solved. |
19603 |
使用向量空间模型降低了文本的复杂性实现了高效的文本检索系统; |
A vector space model is used to reduce thecomplexity of the text and an efficient text retrieval system is implemented. |
19604 |
采用B+树的索引结构提高了区块链上密文交易的检索速度; |
The index structure of the B+ treeis used to improve the retrieval of ciphertext transactions on the blockchain. |