摘要:
A method for validating outsourced processing of a priority queue includes configuring a verifier for independent, single-pass processing of priority queue operations that include insertion operations and extraction operations and priorities associated with each operation. The verifier may be configured to validate N operations using a memory space having a size that is proportional to the square root of N using an algorithm to buffer the operations as a series of R epochs. Extractions associated with each individual epoch may be monitored using arrays Y and Z. Insertions for the epoch k may monitored using arrays X and Z. The processing of the priority queue operations may be verified based on the equality or inequality of the arrays X, Y, and Z. Hashed values for the arrays may be used to test their equality to conserve storage requirements.
摘要:
A method for validating outsourced processing of a priority queue includes configuring a verifier for independent, single-pass processing of priority queue operations that include insertion operations and extraction operations and priorities associated with each operation. The verifier may be configured to validate N operations using a memory space having a size that is proportional to the square root of N using an algorithm to buffer the operations as a series of R epochs. Extractions associated with each individual epoch may be monitored using arrays Y and Z. Insertions for the epoch k may monitored using arrays X and Z. The processing of the priority queue operations may be verified based on the equality or inequality of the arrays X, Y, and Z. Hashed values for the arrays may be used to test their equality to conserve storage requirements.
摘要:
A third party that performs data stream computation is requested to return not only the solution to the computation, but also “annotations” to the original data stream. The annotations are then used by the data owner (in actuality, a “verifier” associated with the data owner) to check the results of the third party's computations. As implemented, the verifier combines the annotations with the original data, performs some computations, and is then assured of the correctness of the provided solution. The cost of verification is significantly lower to the data owner than the cost of fully processing the data “in house”.
摘要:
Briefly, in accordance with one embodiment of the present invention, a process for making a magnetic composite which comprises providing a polymeric resin and a magnetic powder, the magnetic powder having a mean particle size with a value for standard deviation that is less than the value for the mean particle size of the said magnetic powder, the said magnetic composite being made by mixing said magnetic powder with said polymeric resin and molding the said mixture into a desired shape and a size and said magnetic composite having a magnetic permeability between 30 and 50. In another embodiment the present invention is a composition for a magnetic composite comprising a polymeric resin and a magnetic powder, the said powder having a mean particle size with a value of standard deviation that is less than the value of the mean particle size of the magnetic powder, wherein said magnetic composite has a magnetic permeability between about 30 and about 50.
摘要:
Disclosed herein a covered conductor comprising a conductor and a covering, wherein the covering is disposed over the conductor, wherein the conductor comprises aluminum or an alloy comprising aluminum, wherein the covering comprises a poly(arylene ether) composition, wherein optionally, the covering comprises a poly(arylene ether) composition selected from the group consisting of Noryl resins from SABIC Innovative Plastics, Xyron resins from Asahi Kasei Chemicals Corporation, Iupiace resins from Mitsubishi, Lemalloy resins from Mitsubishi, Polyphenyl Ether resins from Bluestar, Acnor resins from Aquafil Technopolymers, Ashlene resins from Ashley Polymers, Vestoran resins from Evonik Degussa. Further disclosed herein is a wire harness assembly comprising the covered conductor, and an end use equipment comprising the wire harness assembly.
摘要:
A third party that performs data stream computation is requested to return not only the solution to the computation, but also “annotations” to the original data stream. The annotations are then used by the data owner (in actuality, a “verifier” associated with the data owner) to check the results of the third party's computations. As implemented, the verifier combines the annotations with the original data, performs some computations, and is then assured of the correctness of the provided solution. The cost of verification is significantly lower to the data owner than the cost of fully processing the data “in house”.