The Quantum Internet最新文献

筛选
英文 中文
Geostrategic Quantum Politics 地缘战略量子政治
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.064
{"title":"Geostrategic Quantum Politics","authors":"","doi":"10.1017/9781108868815.064","DOIUrl":"https://doi.org/10.1017/9781108868815.064","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116811879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arbitrage-Free Time-Sharing Model 无套利分时模型
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.050
{"title":"Arbitrage-Free Time-Sharing Model","authors":"","doi":"10.1017/9781108868815.050","DOIUrl":"https://doi.org/10.1017/9781108868815.050","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economics and Politics 经济与政治
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.040
{"title":"Economics and Politics","authors":"","doi":"10.1017/9781108868815.040","DOIUrl":"https://doi.org/10.1017/9781108868815.040","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Network Algorithms 网络算法
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.007
C. Scheideler
{"title":"Network Algorithms","authors":"C. Scheideler","doi":"10.1017/9781108868815.007","DOIUrl":"https://doi.org/10.1017/9781108868815.007","url":null,"abstract":"The goal of this course is to give an introduction to the state of the art in the theory of network algorithms. By ”network algorithms” we mean algorithms for the design and management of logical networks (and their applications) as opposed to applications for physical networks like the Internet, though most of the applications we give in this course are actually for the Internet. Why are algorithms for the design and maintenance of logical networks (which we will also call over ay networks ) important? Certainly, every distributed system must be based on some kind of logical interconnection structure allowing its sites to exchange information. Thus, in order to design efficient and scalable distributed systems, we first have to understand how to design efficient and scalable logical interconnection networks. Once a distributed system exceeds a certain size, one has to take into account that sites continuously enter and leave the system. This is because, for example, new sites may have to be added to maintain a certain service level or old sites may fail. Also, once a distributed system becomes very large, attacks on it by insiders and outsiders become more and more likely. Thus, besides addressing the problem of how to maintain an overlay network under a changing set of sites, one also has to address the problem of how to protect an overlay network against adversarial sites. We will investigate these issues in this course and present solutions that are based on state-of-the-art knowledge in this area. The first half of the course will focus on fundamental results in the area of networking, scheduling and data management, and the second half of the course will use these results to design efficient, scalable and robust overlay networks for particular applications including a shared file system and systems for anycasting, multicasting, and searching and sorting. Before we start talking about algorithms and networks, we need a proper computational model, very much like mathematics needs axioms. It is a widely accepted fact that algorithmic advances in the area of computer science are only useful to society if they are based on models that truthfully reflect the restrictions and requirements of the corresponding applications. But what is a useful model for network algorithms, or distributed algorithms in general? We will start in this section with the discussion of properties such a paradigm should have, which is followed by the specification of a paradigm that we will use throughout the course. To understand the effects of this paradigm, a simulation environment will be provided so that algorithms can be implemented and tested within that paradigm. The only prerequisite to run this simulation environment is a PC that can compile C++ programs. For an introduction to C++ and C++ compilers see the web page of the course. For the rest of this section, we first give some motivation and background information for the paradigm used in this course (Sections","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127795871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Models for Quantum Computation 量子计算模型
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.035
{"title":"Models for Quantum Computation","authors":"","doi":"10.1017/9781108868815.035","DOIUrl":"https://doi.org/10.1017/9781108868815.035","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Classical Cryptography 对经典密码术的攻击
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.030
{"title":"Attacks on Classical Cryptography","authors":"","doi":"10.1017/9781108868815.030","DOIUrl":"https://doi.org/10.1017/9781108868815.030","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State Preparation 国家准备
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.018
{"title":"State Preparation","authors":"","doi":"10.1017/9781108868815.018","DOIUrl":"https://doi.org/10.1017/9781108868815.018","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Protocols for the Quantum Internet 量子互联网协议
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1017/9781108868815.015
{"title":"Protocols for the Quantum Internet","authors":"","doi":"10.1017/9781108868815.015","DOIUrl":"https://doi.org/10.1017/9781108868815.015","url":null,"abstract":"","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What is Security? 什么是安全?
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1002/9781119104728.ch01
M. Kharrazi
{"title":"What is Security?","authors":"M. Kharrazi","doi":"10.1002/9781119104728.ch01","DOIUrl":"https://doi.org/10.1002/9781119104728.ch01","url":null,"abstract":"Security is a very broad property, but generally the goal of computer security is to ensure that a particular computer system is behaves correctly even in the face of an adversary (or attacker) whose goal is to foil the system. We will use the terms “adversary” and “attacker” interchangeably throughout this course. To achieve this goal, we will need some kind of systematic plan. That is, we will have to carefully define what it means for our system to behave correctly and we will have to specify the class of adversaries against which we want to defend. For the purposes of this course, we will typically structure our plan in terms of three components: a model of the system and the adversary, a security goal, an implementation.","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Time Sharing 分时
The Quantum Internet Pub Date : 2021-09-30 DOI: 10.1002/0471743984.vse7068
F. J. Corbató
{"title":"Time Sharing","authors":"F. J. Corbató","doi":"10.1002/0471743984.vse7068","DOIUrl":"https://doi.org/10.1002/0471743984.vse7068","url":null,"abstract":"Time sharing is a technique of organizing a computer so that several users can interact with it simultaneously. The term also refers to multi-user systems in which arbitrary general-purpose computation is performed and users operate independently of one another, often at locations remote from the computer itself. Although time sharing was initially perceived by many as a programming convenience for debugging (q.v.), the perception was soon extended to include the provision of a wide variety of online services and the availability of a large central memory shared among the user community.","PeriodicalId":364408,"journal":{"name":"The Quantum Internet","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129638926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信