Transformation devices: Event carpets in space and space-time
نویسندگان
چکیده
منابع مشابه
Time/Space Aware Event Correlation
We envision event correlation in a publish/subscribe system becoming important. A publish/subscribe system may offer content-based filtering, which allows subscribers to declare their interests in the attribute values of events using a flexible subscription language, while event correlation addresses the relationships among event instances of different event types. Especially with a dramatic in...
متن کاملHomeomorphism Groups of Sierpiński Carpets and Erdős Space
Erdős space E is the ‘rational’ Hilbert space, that is the set of vectors in ` the coordinates of which are all rational. Erdős proved that E is one-dimensional and homeomorphic to its own square E × E, which makes it an important example in dimension theory. Dijkstra and van Mill found topological characterizations of E. Let M n , n ∈ N, be the n-dimensional Menger continuum in R, also known a...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملTime-Dependent Real-Space Renormalization Group Method
In this paper, using the tight-binding model, we extend the real-space renormalization group method to time-dependent Hamiltonians. We drive the time-dependent recursion relations for the renormalized tight-binding Hamiltonian by decimating selective sites of lattice iteratively. The formalism is then used for the calculation of the local density of electronic states for a one dimensional quant...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2014
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.89.063818