Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








42,174 Hits in 6.9 sec

Graph Decompositions and Secret Sharing Schemes [chapter]

C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro
1993 Lecture Notes in Computer Science  
A b s t r a c t In this paper, we continue a study of secret sliaring schemes for access structures based on graphs.  ...  Also, we study the 30 (connected) graphs on a t most five vertices, obtaining exact values for the optimal information rate in 26 of the 30 cases, and for the optinid average information rate in 28 of  ...  Wen-ai Jackson pointed out the minimal decomposition lI2 of graph G11 i:i Appendix A .  ... 
doi:10.1007/3-540-47555-9_1 fatcat:o7zhou2v75fqzi774py2mwzdsy

Graph decompositions and secret sharing schemes

C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro
1995 Journal of Cryptology  
A b s t r a c t In this paper, we continue a study of secret sliaring schemes for access structures based on graphs.  ...  Also, we study the 30 (connected) graphs on a t most five vertices, obtaining exact values for the optimal information rate in 26 of the 30 cases, and for the optinid average information rate in 28 of  ...  Wen-ai Jackson pointed out the minimal decomposition lI2 of graph G11 i:i Appendix A .  ... 
doi:10.1007/bf00204801 fatcat:jisyrn2nmzhvxkrhbsfrmkqemu

Secret Sharing Schemes on Sparse Homogeneous Access Structures with Rank Three

Jaume Martí-Farré, Carles Padró
2004 Electronic Journal of Combinatorics  
Namely, in all these families, the ideal access structures coincide with the vector space ones and, besides, the optimal information rate of a non-ideal access structure is at most $2/3$.  ...  One of the main open problems in secret sharing is the characterization of the ideal access structures. This problem has been studied for several families of access structures with similar results.  ...  Of course, the optimal information rate of an ideal access structure is equal to one.  ... 
doi:10.37236/1825 fatcat:zatmgqvthbcoddxs3bkt43iaoq

Ideal secret sharing schemes on graph-based $3$-homogeneous access structures

Shahrooz Janbaz, Bagher Bagherpour, Ali Zaghian
2021 Transactions on Combinatorics  
We prove that for every non-ideal graph-based $3$-homogeneous access structure over the graph $G$ with the maximum degree $d$ there exists a secret sharing scheme with an information rate $\frac{1}{d+1  ...  A graph-based $3-$homogeneous access structure is an access structure in which the participants are the vertices of a connected graph and every subset of the vertices is a minimal qualified subset if it  ...  In Figure 2 , we state the optimal information rate of the GB-3h access structures on the non-complete multipartite graphs with five vertices.  ... 
doi:10.22108/toc.2021.123661.1739 doaj:3d0d0b1c9770463e9ed508c1b1af60e6 fatcat:7yb45upc2zcvbglk6vwqsbv4bi

On secret sharing schemes, matroids and polymatroids

Jaume Martí-Farré, Carles Padró
2010 Journal of Mathematical Cryptology  
In addition, we study the use of polymatroids for obtaining upper bounds on the optimal information rate of access structures.  ...  Finally, we present lower bounds on the optimal information rate of the access structures that are related to two matroids that are not secret sharing representable: the Vamos matroid and the non-Desargues  ...  Acknowledgments The second author thanks Ronald Cramer, Bert Gerards, Robbert de Haan and Lex Schrijver for useful discussions, comments, and suggestions. Thanks to Lex Schrijver who pointed out  ... 
doi:10.1515/jmc.2010.004 fatcat:vh72wvzkmndt5c5bj3kxigjbcu

Data Transmission Reliability Analysis of Wireless Sensor Networks for Social Network Optimization

Xia Xu, Jin Tang, Hua Xiang, Gengxin Sun
2022 Journal of Sensors  
People publish and obtain information through various channels on the Internet, and online social networks have become one of the most important channels.  ...  reliability assessment methods in industrial application environments, the impact of mobile path optimization of mobile wireless sensor networks on data collection efficiency and network reliability,  ...  To speed up the filtering of geolocation information and text information, spatial text indexes need to be created for participants in social networks.  ... 
doi:10.1155/2022/3842722 fatcat:mey2mcqawjfgfhwthsfkafxxjy

An Empirical Study on Core Data Asset Identification in Data Governance

Yunpeng Chen, Ying Zhao, Wenxuan Xie, Yanbo Zhai, Xin Zhao, Jiang Zhang, Jiang Long, Fangfang Zhou
2023 Big Data and Cognitive Computing  
Then, we explored the structural features of core data assets on data lineage graphs from an abstraction perspective.  ...  Data governance aims to optimize the value derived from data assets and effectively mitigate data-related risks. The rapid growth of data assets increases the risk of data breaches.  ...  The nodes highlighted in red are the nodes that the participants had selected. Table 1 . 1 Basic information of the 10 data lineage graphs.  ... 
doi:10.3390/bdcc7040161 fatcat:qe6gpk2ojjcgbc5oeyq3r7pjhu

Prioritizing Built Environmental Factors to Tackle Chronic and Infectious Diseases in Remote Northern Territory (NT) Communities of Australia: A Concept Mapping Study

Amal Chakraborty, Natasha J. Howard, Mark Daniel, Alwin Chong, Nicola Slavin, Alex Brown, Margaret Cargo
2021 International Journal of Environmental Research and Public Health  
Sorting of the indicators resulted in a concept map with nine built environmental domains.  ...  Essential services and Facilities for health/safety were the highest ranked domains for both chronic and infectious diseases.  ...  Sorting Based on stakeholder participant inputs, a nine-cluster concept map with a stress value of 0.313 was deemed the optimal solution in terms of sorting data and point distances between the 84 indicator  ... 
doi:10.3390/ijerph18105178 pmid:34068201 pmcid:PMC8152969 fatcat:i5i7cmvi2jhk7o2rz4c3q5jyum

Optimal complexity of secret sharing schemes with four minimal qualified subsets

Jaume Martí-Farré, Carles Padró, Leonor Vázquez
2010 Designs, Codes and Cryptography  
This paper deals with the open problem of optimizing this parameter for secret sharing schemes with general access structures.  ...  In this way, the exact value of the optimal complexity is determined for several access structures in that family. For the other ones, we present the best known lower and upper bounds.  ...  Acknowlegments We are deeply grateful to one of the anonymous referees who thoroughly and carefully revised our paper, finding even a mistake in our tables, and helped in great measure to improve the presentation  ... 
doi:10.1007/s10623-010-9446-0 fatcat:hoqbhtepp5ah5olqtprvqilmyi

Management Of Delphi Study Regarding The Development Of Ongoing Behavioral Risk Factor Surveillance System In The Republic Of Moldova

Elena Raevschi, Ion Ababii, Eleonora Vataman
2017 Zenodo  
Results: The research found that Delphi panelists similarly trained and competent in the area of knowledge related to the target issue contributed toachievement of the consensus agreement for all items  ...  National Strategy on Noncommunicable DiseasesPrevention and Control for the period 2012-2020.  ...  Acknowledgments The authors are very grateful for the participation and contribution in Delphi survey, regarding the Development of ongoing behavioral risk factor surveillance in the Repub-  ... 
doi:10.5281/zenodo.1051164 fatcat:hazjv3cxnbhkpjrnytfd4gsdz4

Classification of Library Resources by Subject on the Library Website: Is There an Optimal Number of Subject Labels?

Mathew J. Miles, Scott J. Bergstrom
2009 Information Technology and Libraries  
We conducted a study with 120 students and staff to try to answer the following question: What is the effect of the number of labels in a list on response time to research questions?  ...  What we found is that response time increases gradually as the number of the items in the list grow until the list size reaches approximately fifty items.  ...  depth and breadth of the tree structure was true for the Web.  ... 
doi:10.6017/ital.v28i1.3167 fatcat:2immcxmdabbbxmotogrbfcacd4

VoxLens: Making Online Data Visualizations Accessible with an Interactive JavaScript Plug-In

Ather Sharif, Olivia H. Wang, Alida T. Muongchan, Katharina Reinecke, Jacob O. Wobbrock
2022 CHI Conference on Human Factors in Computing Systems  
ACKNOWLEDGMENTS This work was supported in part by the Mani Charitable Foundation, the University of Washington Center for an Informed Public, and the University of Washington Center for Research and Education  ...  We extend our gratitude to the AccessComputing staf for their support and assistance in recruiting participants.  ...  In the ffth stage, each participant was given a total of nine tasks.  ... 
doi:10.1145/3491102.3517431 fatcat:cp2ycuizdjfbbgnnwpkc5d6yji

Development decision centers — a strategy to improve development decision-making [chapter]

D. Splettstoesser
1996 Information Systems and Technology in the International Office of the Future  
DDC may become a core facility within community information centers, providing an 'electronic meeting room' with notebook computers for each participant, a workstation for the meeting facilitator/chauffeur  ...  They can be integrated into community information centers which are recognized as a 'multisectoral concept' for improving development.  ...  The distribution graph shows a separate small graph for each item evaluated. The Y-axis represents the total number of participants who assigned the same value for an item.  ... 
doi:10.1007/978-0-387-35085-1_21 fatcat:wwgy4byxmzajtoyza3nakfk4au

Edge Compression Techniques for Visualization of Dense Directed Graphs

Tim Dwyer, Nathalie Henry Riche, Kim Marriott, Christopher Mears
2013 IEEE Transactions on Visualization and Computer Graphics  
For Power Graph Analysis we propose a novel optimal technique based on constraint programming.  ...  (c) A Modular Decomposition allows internal structure within modules and nesting. Nine edges remain.  ...  (c) A full modular decomposition of the same graph leaves only six aggregate links without any loss of connectivity information for an 85% compression rate.  ... 
doi:10.1109/tvcg.2013.151 pmid:24051826 fatcat:bjmkimbll5cjzmd7wfsaf2qtbm

A Novel Classification Framework Using the Graph Representations of Electroencephalogram for Motor Imagery based Brain-Computer Interface

Jing Jin, Hao Sun, Ian Daly, Shurui Li, Chang Liu, Xingyu Wang, Andrzej Cichocki
2021 IEEE transactions on neural systems and rehabilitation engineering  
Our proposed method achieves a mean Kappa value of 0.88 across nine participants, which is superior to other methods we compared it to.  ...  A graph embedding model called Ego-CNNs is then used to build a classifier, which can convert the graph from a structural representation to a fixed-dimensional vector for detecting critical structure in  ...  For one participant, every 𝐴 describes the graph during different tasks, and has the same location but different structure.  ... 
doi:10.1109/tnsre.2021.3139095 pmid:34962871 fatcat:7acp2xvsnzfphnsbr3i3r5vmou
« Previous Showing results 1 — 15 out of 42,174 results