News

Recently, Professor Zong Chuanming from the Center for Applied Mathematics at Tianjin University published a paper titled ...
QKD uses photons — the smallest units of light — to securely transmit encryption keys. Any attempt to intercept them disturbs ...
Abstract: This article solves the convergence problem in the Parallel BK algorithm for large-scale flow networks. We introduce a merging method and a pseudo-Boolean representation-based invariance ...
A prominent US senator has called on the Federal Trade Commission to investigate Microsoft for “gross cybersecurity negligence,” citing the company’s continued use of an obsolete and vulnerable form ...
Abstract: Identifying positive influence dominating set (PIDS) with the smallest cardinality can produce positive effect with the minimal cost on a social network. The purpose of this article is to ...
Nevada is still trying to recover from a massive cyber attack that took down the state government's computer systems two days ago. The cyber attack, which is being described as a "network security ...