A Period-Finding Method for Shor's Algorithm
暂无分享,去创建一个
[1] Dong Seong Kim,et al. Toward Lightweight Detection and Visualization for Denial of Service Attacks , 2006, MICAI.
[2] Ma Zhi,et al. Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes , 2006 .
[3] Xuelong Li,et al. Supervised Tensor Learning , 2005, ICDM.
[4] Huang Jian. Quantum Computing and Its Applications in Signal and Information Processing , 2003 .
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] Qiang Yang,et al. Objective-oriented utility-based association mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[7] Dong Seong Kim,et al. Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection , 2005, CISC.
[8] Dong Seong Kim,et al. Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System , 2005, ISNN.
[9] David G. Stork,et al. Pattern Classification , 1973 .
[10] Y. Manin,et al. Introduction to Modern Number Theory , 2008 .
[11] Christophe Rigotti,et al. A condensed representation to find frequent patterns , 2001, PODS '01.
[12] Lai-Wan Chan,et al. The Minimum Error Minimax Probability Machine , 2004, J. Mach. Learn. Res..
[13] Qiang Yang,et al. Mining high utility itemsets , 2003, Third IEEE International Conference on Data Mining.
[14] Christopher Krügel,et al. Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.