최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기The journal of the institute of internet, broadcasting and communication : JIIBC, v.22 no.2, 2022년, pp.9 - 14
This paper presents a subset sum problem (SSP) algorithm which takes the time complexity of O(nlogn). The SSP can be classified into either super-increasing sequence or random sequence depending on the element of Set S. Additive algorithm that runs in O(nlogn) has already been proposed to and utiliz...
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms," McGrew-Hill Book Company, 2005.
Wikipedia, "List of Knapsack Problems," http://en.wikipedia.org/wiki/List_of_knapsack_problems, Wikimedia Foundation Inc., 2012.
B. Ho, "Further Exploration in Public Key Encryption," The MIT Undergraduate Journal of Mathematics, 2000.
K. Scott, "CS 413, Computer and Data Security: The Knapsack Problem and Merkle Hellman Encryption,", 2007.
J. C. Gao and E. R. Zhou, "Introduction to Knapsack Cipher," http://zhouer.org/courses/2003-IIS/slide.pdf, 2003.
A. Yasinsac, "Cryptography: Public Key Algorithm Cryptography based on the Knapsack Problem," University of South Alabama, 2008.
R. C. Merkel and M. E. Hellman, "Hiding Information and Signatures in Trapdoor Knapsacks," IEEE Trans. on Information Theory, Vol. 24, No. 5, pp. 523-530, Sep. 1978, https://doi.org/10.1109/TIT.1978.1055927
G. J. Woeginger, "CO2a: Combinatorial Optimization - Open Problems Around Exact Algorithms," Department of Mathematics and Computer Science, TU Eindhoven, 2008.
C. Christensen, "Cryptology: The Knapsack Problem," Department of Mathematics Northern Kentucky University, 2005.
Wikipedia, "NP-Complete," http://en.wikipedia.org/wiki/NP-Complete, Wikimedia Foundation Inc., Retrieved Jan. 2022.
D. Nacin, "The Subset-Sum Problem," Department of Mathematics, William Paterson University, 2008.
S. K. Chong, G. Farr, L. Frost, and S. Hawley, "On Pedagogically Sound Examples in Public-key Cryptography," Conferences in Research and Practice in Information Technology, Vol. 48, No. 1, pp. 63-68, Australian Computer Society Inc., Jan. 2006.
C. Blair, "Notes on Cryptography," Business Administration Dept., University of Illinois, 1994.
B. Pope. "Cryptography Again: Algorithmic Problem Solving," CSSE, The University of Melbourne, 2008.
G. Fee, "Math 342: Elementary Number Theory," Department of Mathematics and Statistics, SFU, 2000.
F. R. Dogar, L. Aslam, Z. A. Uzmi, S. Abbasi, and Y. C. Kim, "Connection Preemption in Multi-Class Networks," IEEE Globecom, 2006.
C. Umans, "CS21: Decidability and Tractability," Computer Science, California Institute of Technology, 2008.
J. Bakker, "The Knapsack Problem and The LLL Algorithm," http://www.math.ucsd.edu/~crypto/Projects/JenniferBakker/Math187/index.html, 2004.
R. J. W. James and R. H. Storer, "Techniques for Solving Subset Sum Problems within a Given Tolerance," International Trans. in Operational Research, Vol. 12, No. 4, pp. 437-453, Jul. 2005, https://doi.org/10.1111/j.1475-3995.2005.00517.x
A. Moffat, "Example for the book "Programming, Problem Solving, and Abstraction with C," Pearson Sprint Print, Sydney, Australia, 2003.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.