본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

23

Web of lossy adapters for interface interoperability: An algorithm and NP-completeness of minimization

Yoo Chung; Dongman Lee | IEEE International Conference on Software Engineering and Service Sciences (2010)

By using different interface adapters for different methods, it is possible to construct a maximally covering web of interface adapters which incurs minimum loss during interface adaptation. We introduce a polynomial-time algorithm that can achieve this. However, we also show that minimizing the number of adapters included in a maximally covering web of interface adapters is an NP-complete problem.

자세히보기

21

Weak and strong convergence theorems of a mann-type iterative algorithm for k-strict pseudo-contractions

Yeol Je Cho, Xiaolong Qin, Jung Im Kang, and Meijuan Shang | Taiwanese J. Math. 14 (2010)

In this paper, we consider a Mann-type iterative algorithm for nonself strict pseudo-contractions. Weak and strong convergence theorems are established in the framework of Hilbert spaces. The results presented in this paper improve and extend the results announced by many others.

자세히보기

20

On iterations methods for zeros of accretive operators in Banach spaces

Yisheng Song; Jung Im Kang; Yeol Je Cho | Applied Mathematics and Computation 216 (2010)

In this paper, three iterations are designed to approach zeros of set-valued accretive operators in Banach spaces. The first one is the continuous Picard type iteration involving the resolvent, the second one is the approximate Picard type iteration involving the resolvent and the third one is the Halpern type iteration involving the resolvent. Some strong convergence theorems for three iterations are proved.

자세히보기

19

New KKM type theorems in G-convex spaces with applications

Weiping Guo; Jung Im Kang; Yeol Je Cho | Journal of Computational Analysis & Applications 12 (2010)

The purpose of this paper is to establish some new KKM type theorems in G-convex spaces and, as applications, to obtain some new matching theorems, fixed point theorems, section theorems and minimax theorems in G-convex spaces. The results presented in this paper improve and generalize the corresponding results in [1-6, 16, 20, 23].

자세히보기

18

On q-Euler Numbers Related to the Modified -Bernstein Polynomials

Min-Soo Kim; Daeyeoul Kim; Taekyun Kim | Abstract and Applied Analysis 2010 (2010)

We consider q-Euler numbers, polynomials, and q-Stirling numbers of first and second kinds. Finally, we investigate some interesting properties of the modified q-Bernstein polynomials related to q-Euler numbers and q-Stirling numbers by using fermionic p-adic integrals on undefinedundefined.

자세히보기

17

Divisor functions arising from q-series

Cho, Bumkyu; Kim, Daeyeoul; Koo, JaKyung | PUBLICATIONES MATHEMATICAE-DEBRECEN 76 (2010)

We consider some of the properties of divisor functions arising from q-series and theta functions. Using these we obtain several new identities involving divisor functions. On the other hand we prove a conjecture of Z. H. Sun concerning representations by the ternary quadratic form x(2) + y(2) + 3z(2), and also get an analogous result for x(2) + y(2) + 2z(2).

자세히보기

16

An ID-based aggregate signature scheme with constant pairing computations

Kyung-Ah Shim | Journal of Systems and Software 83 (2010)

An aggregate signature scheme allows n signatures on n distinct messages from n distinct users to aggregate a single signature. The main benefit of such schemes is that they allow bandwidth and computational savings. Since Boneh et al.’s aggregate signature scheme from pairings, there exist several trials for constructing ID-based aggregate signature schemes. However, their computational complexity for pairing computations grows linearly with the number of signers. In this paper, we propose an efficient ID-based aggregate signature scheme with constant pairing computations. We also give its security proof in the random oracle model under the Computational Diffie–Hellman assumption.

자세히보기

15

On the Existence of Short Certificateless Signatures

K-A Shim, Y-R Lee | Journal of Internet Technology 11 (2010)

Certificateless cryptography eliminates the need of certificates in public key cryptosystems and solves the inherent key escrow problem in identity-based cryptosystems. In this paper we discuss the existence of short certificateless signature schemes provably secure in formal security models recently established, whose resulting signature consists of a single element of the underlying group by demonstrating key replacement attacks on Du-Wen's and Tso et al.'s short certificateless signature schemes.

자세히보기

이 페이지에서 제공하는 정보에 대해 만족하십니까?

컨텐츠담당자     성과평가팀: 배자호   042- 717- 5762