In this short paper,we show the equivalence between weak context bisimulation and strong bisimulation for the linear *** as a corollary,we get a complete proof system of weak context bisimulation over the linear HOcore.
In this short paper,we show the equivalence between weak context bisimulation and strong bisimulation for the linear *** as a corollary,we get a complete proof system of weak context bisimulation over the linear HOcore.
WOSA / XFS is a standard protocol based on the extensions for financial services of WOSA, which provides a seamless interface among the Windows operating system, Windows- based applications and the customer service. I...
详细信息
WOSA / XFS is a standard protocol based on the extensions for financial services of WOSA, which provides a seamless interface among the Windows operating system, Windows- based applications and the customer service. It is an advanced technology for solving all sorts of equipment reliability, platform-independent accessing interface and security management, and it has been put into use in the current financial equipment in China. This paper first introduces the foundation and development of WOSA / XFS, and then elaborates WOSA / XFS Synchronous mechanism and Asynchronous mechanism, and then discuss the selected call model of financial facilities based on compositions of different parts. Finally, it chooses the proper call model used in ABIO.
Putting forward a network intrusion detection system model based on data mining and improving the FP-Growth algorithm based on associative *** experimental results show that the system developed by this paper can work...
详细信息
Putting forward a network intrusion detection system model based on data mining and improving the FP-Growth algorithm based on associative *** experimental results show that the system developed by this paper can work stably,find out intrusion activities accurately in time,improve the speed of data mining effectively,enhance the detective ability of intrusion detection,and provide a solid safeguard to the network security.
For the routers of network on chip(No C),arbitrator plays an important role in the performance of packets switching between each *** round robin algorithm is extensively used as its ***,the RR scheme seems difficult t...
详细信息
For the routers of network on chip(No C),arbitrator plays an important role in the performance of packets switching between each *** round robin algorithm is extensively used as its ***,the RR scheme seems difficult to guarantee Qo S and satisfy the delay sensitive *** this reason,a priority based parallel round robin(PP-RR) algorithm is proposed,which is aim to provide differentiated service according to the communication traffic ***,a mathematic analytic model is utilized for the performance evaluation of PP-RR *** closed form expression of mean waiting time is achieved.
The web service security standards of OASIS can not support trust evaluation and authorization decision-making based on *** this paper,in order to resolve access control and authorization in virtual temporary team of ...
详细信息
The web service security standards of OASIS can not support trust evaluation and authorization decision-making based on *** this paper,in order to resolve access control and authorization in virtual temporary team of web service,a swift-trust-based access control for web service(WS-STBAC) is designed based on ***-STBAC is a kind of middleware like authentication center,and composed of three parts:policy management,trust value computing,and decision-making of *** datum about trust computing from providers,WS-STBAC computes trust value of *** based on policy,WS-STBAC decides whether to give requestors permission,instead of providers.
Gobang is very popular around the world, and human-computer game Gobang is a issue of Artificial Intelligence research. In this paper, intelligent Gobang algorithms are analyzed to construct the valuation function, ga...
详细信息
Gobang is very popular around the world, and human-computer game Gobang is a issue of Artificial Intelligence research. In this paper, intelligent Gobang algorithms are analyzed to construct the valuation function, game tree, and α-β pruning algorithm is used to improve game-tree search efficiency, enhancing the level of computer intelligence. Finally, an intelligent Gobang system was designed and realized in Visual C ++ according to intelligent algorithms.
In this paper,the states of components and systems are considered as uncertain *** the uncertain coherent system is defined and its structural properties are ***,the dual of uncertain coherent system is introduced and...
详细信息
In this paper,the states of components and systems are considered as uncertain *** the uncertain coherent system is defined and its structural properties are ***,the dual of uncertain coherent system is introduced and some useful theorems are ***,the reliability of uncertain coherent system is arrived and some examples are given.
Along with the continuously extending of digital library construction, data scale in the database system is getting larger and larger. Cost for data storage becomes more expensive. Meanwhile, owing to the demand for t...
详细信息
Along with the continuously extending of digital library construction, data scale in the database system is getting larger and larger. Cost for data storage becomes more expensive. Meanwhile, owing to the demand for the data security becomes even stronger, traditional digital library cannot meet the needs of development. In digital library, Cloud storage technology is very suitable for resources storage requirements, all of the resources are stored in the cloud so that it can more easily share resources, data management, while maintaining more convenient. On the basis of which analyze the cloud storage technology, this paper designs cloud storage model that meet the development needs of digital library resources storage.
Compared with the large number of disabled population,medical resource is scarce and partially *** the development of Internet and information technology,more and more services can be provided through the network,not ...
详细信息
Compared with the large number of disabled population,medical resource is scarce and partially *** the development of Internet and information technology,more and more services can be provided through the network,not restricted by *** this context,this paper developed a P2 P instant communication system based on the WebRTC technology and realized a remote rehabilitation guidance *** goal of this system is to make sure that a user can receive remote rehabilitation guidance scheme through computer or mobile *** system has no need to install additional software and *** open web rehabilitation guidance can be realized through a browser only.
Due to the increase in web services, non-functional or QoS parameters have been widely addressed. QoS-Aware service selection is commonly formulated as an optimization problem aimed at achieving the execution plan tha...
详细信息
暂无评论