期刊: COMPUTER JOURNAL, 2021; 64 (3)
This paper studies the couplet generation model which automatically generates the second line of a couplet by giving the first line. Unlike other sequ......
期刊: COMPUTER JOURNAL, 2021; 64 (3)
In order to comprehensively evaluate the achievements of the 'Belt and Road' in integrated transportation, researchers need to optimize the method of ......
期刊: COMPUTER JOURNAL, 2021; 64 (1)
A graph G = (V, E) is two-disjoint-cycle-cover [r(1), r(2)]-pancyclic if for any integer 1 satisfying r(1) <= 1 <= r(2), there exist two vertex-......
期刊: COMPUTER JOURNAL, 2021; 64 (4)
Recently, Yang et al. proposed the first certificateless proxy signature scheme against malicious-but-passive key generation center (MKGC) attacks. Th......
期刊: COMPUTER JOURNAL, 2021; 64 (6)
Virtual network embedding (VNE) algorithms dominate the effectiveness of resource sharing in network virtualization. Heuristic embedding algorithms ge......
期刊: COMPUTER JOURNAL, 2021; 64 (5)
As a two-dimensional formal method, graph grammar is widely used in defining various visual programming languages. This paper presents a new graph gra......
期刊: COMPUTER JOURNAL, 2021; 64 (6)
There is rich knowledge in expert systems that can be used to solve practical problems, but its promotion and application must rely on information fac......
期刊: COMPUTER JOURNAL, 2021; 64 (3)
The personal thermal sensation model is used as the main component for personalized conditioning system, which is an effective method to fulfill therm......
期刊: COMPUTER JOURNAL, 2021; 64 (4)
Round complexity is one of the fundamental problems in zero-knowledge (ZK) proof systems. Non-malleable zero-knowledge (NMZK) protocols are ZK protoco......
期刊: COMPUTER JOURNAL, 2021; 64 (4)
We introduce an interpolation attack using the Moebius Transform. This can reduce the time complexity to get a linear system of equations for specifie......
期刊: COMPUTER JOURNAL, 2021; 64 (6)
Motivated by g-extra connectivity, the g-extra diagnosability is proposed as a better and more realistic measurement for fault diagnosis of interconne......
期刊: COMPUTER JOURNAL, 2021; 64 (4)
Automatic search methods have been widely used for cryptanalysis of block ciphers, especially for the most classic cryptanalysis methods-differential ......
期刊: COMPUTER JOURNAL, 2021; 64 (1)
The generalized k-connectivity of a graph G is a parameter that can measure the reliability of a network G to connect any k vertices in G, which is a ......
期刊: COMPUTER JOURNAL, 2021; 64 (1)
Motivated by effects caused by structure link faults in networks, we study the following graph theoretical problem. Let T be a connected subgraph of a......
期刊: COMPUTER JOURNAL, 2021; 64 (4)
Attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message ......