نتایج جستجو برای: ping pong model

تعداد نتایج: 2106751  

Journal: :Quantum Information Processing 2013
Piotr Zawadzki Zbigniew Puchala Jaroslaw Adam Miszczak

In this paper we propose an extended version of the ping–pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. We show that, by increasing the number of bases, it is possible to improve the security of this protocol. We also provide the upper bounds on eavesdropping average non-detection probability and propose a contr...

Journal: :Computer Standards & Interfaces 2003
Cheng-Yuan Ku Lain-Chyr Hwang Hsin-Tzung Wu

In this paper, we propose an improved technique for congestion control, named as ping-pong flow control (PPFC), for asynchronous transfer mode (ATM) available bit rate (ABR) traffic. This is a rate-based flow control scheme, in which the rate regulation is achieved by directly adjusting the transmission rate in the source end station. The proposed algorithm uses a bipolar feedback strategy, whi...

Journal: :General physiology and biophysics 2000
R Baran Z Sulová E Stratilová V Farkas

Plant xyloglucan endotransglycosylase (XET, EC 2.4.1.207) degrades its substrate by a transglycosylation mechanism while endo-cleaving xyloglucan (XG) molecules at their beta-1,4-linked polyglucosyl main chain and transferring the newly generated reducing chain ends to hydroxyls at C-4 of non-reducing glucosyl ends of the main chains of other XG molecules or of low-Mr XG-fragments (OS). Kinetic...

2013
Mohamed Riduan Abid Saad Biaz

Airtime is set as the default routing metric for the ongoing IEEE 802.11s wireless mesh networking standard. The metric is designed to minimize channel resource consumption by accounting for loss rate, bandwidth, and channel characteristics. However, the metric exhibits a noticeable ping-pong effect whose nature is still vague, and the very few references to this in the literature condemn it fo...

Journal: :REC: interventional cardiology (English Edition) 2021

2003
Qing-yu Cai

We show an improved ping − pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communication using a mixed state. This protocol can be carried out with great efficiency and speed with today’s technology, e.g. single photon source and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید