[1] |
郁德强,王燕妮,李华.一种基于云计算的服务外包模式:云外包[J].情报理论与实践,2012,35(8):97-100.
|
[2] |
刘镪,唐春明,胡杏,等.多租赁用户模型下有效安全外包计算[J].信息网络安全,2013(9):17-21.
|
[3] |
DHAR S.From Outsourcing to Cloud Computing: Evolution of IT Services[J]. Management Research Review, 2011,35(8):664-675.
|
[4] |
陈莉,林柏钢.基于分布式线性方程组求解的安全多方计算协议[J].信息网络安全,2013(9):2-5.
|
[5] |
ATALLAH M J, PANTAZOPOULOS K N, RICE J R.Secure Outsourcing of Scientific Computation[J]. Advances in Computers, 2002(54):215-272.
|
[6] |
BENJAMIN D, ATALLAH M J.Private and Cheating-free Outsourcing of Algebraic Computation[C]//IEEE.Sixth Annual Conference on Privacy, Security and Trust, October 1-3,2008, Fredericton, NB, Canada.NJ:IEEE, 2008:240-245.
|
[7] |
GENTRY C.Fully Homomorphic Encryption Using Ideal Lattices[J]. Acm Symposium on Theory of Computing, 2009,9(4):169-178.
|
[8] |
WANG Cong, REN Kui, WANG Jia, et al.Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations[J].IEEE Transactions on Parallel and Distributed Systems, 2013,24(6):1172-1181.
|
[9] |
周立峰. 云计算中大规模矩阵分解的计算[D]. 杭州:浙江大学,2016.
|
[10] |
李仁仓. QR分解与非线性特征值问题[J]. 计算数学,1989,11(4):374-385.
|
[11] |
吕纯濂. 用QR分解拟合回归方程参数估计和剩余的迭代加细[J]. 大气科学学报, 1998,21(4):624-628.
|
[12] |
郭永发. 线性回归模型的QR参数设计[J]. 数学的时间与认识, 2002(32):173-174.
|
[13] |
李大明. 数值线性代数[M]. 北京:清华大学出版社,2010.
|
[14] |
BRØNLUND O E, JOHNSEN Th.Lunde. QR-factorization of Partitioned Matrices: Solution of Large Systems of Linear Equations with Non-definite Coefficient Matrices[J]. Computer Methods in Applied Mechanics and Engineering, 1974,3(2):153-172.
|
[15] |
申秋. CoMP中矩阵并行算法研究[D].成都:电子科技大学,2013.
|
[16] |
张凯院,许仲,陆全. 数值分析教程[M].西安:西北工业大学出版社,2002.
|
[17] |
陈跃华,杨东升,穆彪.信息安全服务外包管理思考[J].信息网络安全,2012(12):86-87.
|
[18] |
胡杏,裴定一, 唐春明,等. 可验证安全外包矩阵计算及其应用[J]. 中国科学:信息科学,2013,43(7):842-852.
|
[19] |
杨波,武朵朵,来齐齐. 矩阵乘积的高效可验证安全外包计算[J]. 密码学报,2017,4(4):322-332.
|