The multi-application smart card has a crucial problem that how to keep the management safety of some applications in the multi-application card,preventing one of application illegal visit to the other *** connection ...
详细信息
The multi-application smart card has a crucial problem that how to keep the management safety of some applications in the multi-application card,preventing one of application illegal visit to the other *** connection with this problem,the articles analyze the shortcomings of the partition *** combined the segment table of application and registry table,it bring forth a multi-application smart card segment memory management security model and systematically analyze the model structure in security aspect.
Business Process Reengineering,BPR is that radical rethinking and redesign on business process and BPR give firm a new idea for management and dealing in its business also,it is important role for IT to act on Busines...
详细信息
Business Process Reengineering,BPR is that radical rethinking and redesign on business process and BPR give firm a new idea for management and dealing in its business also,it is important role for IT to act on Business Process Reengineering,Base on BPR,thesis analysis the IT impact on BPR of firm executing process,forth more to discuss relevant application about it,so that put up some theory for IT to apply BPR to firms.
software errors significantly impact software quality,and improvement of fault localization can reduce the expense of *** is promising approach and have received a lot of attention due to its simplicity and ***,there ...
详细信息
software errors significantly impact software quality,and improvement of fault localization can reduce the expense of *** is promising approach and have received a lot of attention due to its simplicity and ***,there are still some limits in this *** this paper we address these limits and present a technique to build a novel behavioral model,and propose a corresponding fault localization ***,we performed a study to empirically validate the effectiveness of our *** experimental results indicated that our method outperformed other representative SBFL techniques in locating faults in the *** show that the effectiveness of the technique comes from the guidance of hierarchical behavioral model.
In this paper,the dual rate 1G/10G-EPON system is presented and some key technical problem such as light wave-length allocation,FEC technology and dual rate receiver are described and analyzed in *** the end,1G-EPON s...
详细信息
In this paper,the dual rate 1G/10G-EPON system is presented and some key technical problem such as light wave-length allocation,FEC technology and dual rate receiver are described and analyzed in *** the end,1G-EPON system will achieve smooth evolution to 10G-EPON system.
the paper makes an analysis for the requirement of the multimedia technology in today39;s information environment.A common process for systematic framework,general organization and the mining process for the multi-m...
详细信息
the paper makes an analysis for the requirement of the multimedia technology in today's information environment.A common process for systematic framework,general organization and the mining process for the multi-media database are ***,a description of the traits for the different kinds of the media that can be mined is made and a basic method of the multi-media data mining is provided.A discussion has been made on the future challenges of the multi-media data-mining technology.
Evaluation of campus network security is a complicated systematic *** paper analyzes the reasons of the questions,obtains the solving method,and at last builds the M(1,2,3) model without the interference of redundant ...
详细信息
Evaluation of campus network security is a complicated systematic *** paper analyzes the reasons of the questions,obtains the solving method,and at last builds the M(1,2,3) model without the interference of redundant data,which is different from )M(g+) and is a nonlinear *** paper will apply the new algorithm in the fuzzy evaluation on campus network security.
In this paper we have presented a Public Key Infrastructure for wireless sensor *** scheme tries to solve the problem of security in WSN by the use of public key cryptography as a tool for ensuring the authenticity of...
详细信息
In this paper we have presented a Public Key Infrastructure for wireless sensor *** scheme tries to solve the problem of security in WSN by the use of public key cryptography as a tool for ensuring the authenticity of the base *** is composed of two phases,the first is the sensor to base station handshake in which the base station and a given sensor node setup a session key to secure end to end link between them,this handshake is protected and authenticated using the public key of the base *** second phase is the use of this session key for data encryption to ensure confidentiality and ensuring the integrity of the exchanged data using the MAC joined to each packet.
A two-level inventory control and delivery system is established to describe the equipment supply chain,which is composed of multi-region warehouse and a headquarters *** the minimum charge of the system as constrain,...
详细信息
A two-level inventory control and delivery system is established to describe the equipment supply chain,which is composed of multi-region warehouse and a headquarters *** the minimum charge of the system as constrain,a Union Economic Order Quantity (UEOQ) model is designed to solve system's order quality and order *** common order strategies are validated by UEOQ,which shows the model's veracity.
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud scheduling system, the main purpose of which is to execute jobs optimally, i...
详细信息
Machine39;s fingerprint and encryption technique could be used to conduct remote register authentication of software to prevent unauthorized *** of all,as fingerprint of machine fulfills the goal of one code for one...
详细信息
Machine's fingerprint and encryption technique could be used to conduct remote register authentication of software to prevent unauthorized *** of all,as fingerprint of machine fulfills the goal of one code for one machine,it can cut the loss caused by disclosure of register ***,the introduction of encryption technique can prevent illegal interception of register code and fingerprint of ***'s more,remote-register of software is beneficial for large scale *** has been proved practically that this method could safeguard legal rights of developer efficiently.
暂无评论