Fair certified email is an email system which employs the fair exchange protocol. All existing approaches to fair certified email achieve the fair exchange property between a single sender and a receiver only. But the...
详细信息
Fair certified email is an email system which employs the fair exchange protocol. All existing approaches to fair certified email achieve the fair exchange property between a single sender and a receiver only. But they do not offer the fair exchange between all senders and a receiver. So, a malicious receiver can deny receiving messages from some senders but do receive messages from other senders. Also, the existing certified email protocols do not prevent the distributed denial of service attack by malicious senders. We propose a new certified email protocol which provides the fair exchange for all senders, called the undeniable fairness, and distributed denial of service protection.
The SARBAU project is a study on a highly self configuring building automation and control network using IP as field level protocol. UPnP will be used for device operation and control. The paper gives an overview on t...
详细信息
The SARBAU project is a study on a highly self configuring building automation and control network using IP as field level protocol. UPnP will be used for device operation and control. The paper gives an overview on the SARBAU approach. Current work-in-progress including wired and wireless experimental device hardware is presented. A focus of this paper is "nearly automatic configuration". Using intelligent commissioning software and optional device localisation, we propose highly automated device commissioning and binding schemes.
Recently Bluetooth scatternet formation obtains much research attention. Besides proactive and reactive formation schemes, several hybrid schemes have been proposed to enjoy benefits of both proactive and reactive sch...
详细信息
Recently Bluetooth scatternet formation obtains much research attention. Besides proactive and reactive formation schemes, several hybrid schemes have been proposed to enjoy benefits of both proactive and reactive schemes. In this paper, we propose an enhancement based on a previous hybrid scheme TPSF+. The proposed TPSF+C scheme considers both node living time and connectivity to construct a more stable on-demand scatternet. The simulation results show that TPSF+C has lower reconstruction overhead than TPSF+.
Along with the GPS navigation applications development, location service concept has changed and its services has changed from single location information services to integration application services that integrate ma...
详细信息
Along with the GPS navigation applications development, location service concept has changed and its services has changed from single location information services to integration application services that integrate many network application services, so that it can provide individual, personalized service for users. At one time, Internet needs a simple, available method to organize a lot of network application services. XML-based Web service technology can solve it, but the application programs need to code and compile while the workflow has modified. This paper presents a location service integration strategy, it uses extended XML technology, and domain concept and dynamic invoking mechanism to realize system that has strongly usable, extensible, and maintainable.
Object models adopted in the object oriented software development reflect complex relations that exist between various entities in the real world. On the other hand, directory models adopted in directory service techn...
详细信息
Object models adopted in the object oriented software development reflect complex relations that exist between various entities in the real world. On the other hand, directory models adopted in directory service technologies map various relations into tree structures. Therefore, developing directory services by object oriented languages require writing lengthy procedures that bridge the gaps between object models and directory models. To overcome this drawback, in this paper, we propose a new technology named Object- Directory Mapping. We also present a Java based framework S2Directory to prove the effectiveness of the concept of Object-Directory Mapping. Implementation details are also given together with new dynamic implementation injection techniques.
This study focused on the infringement of online video game security, which up until now has relatively been considered relatively insignificant when compared to the online game industry's rapid growth these days....
详细信息
This study focused on the infringement of online video game security, which up until now has relatively been considered relatively insignificant when compared to the online game industry's rapid growth these days. The In this study, the state of infringement cases in the Korean game industry and related proposed security solutions corresponding to for such cases were examined and arranged. These cases were then also classified according to the infringement type of game security defined in advance infringement. Based on the classified infringement types of game security upon this classification, this study analyzed the causes that gave give rise to infringement of online infringement of game security, and developed technical solutions to solve such cases for such cases. Finally, this study verified whether or not these technical solutions can could be applied or not into online game sites.
SSC-DASH (Server Side C-like Design Automation Shell) has been developed as a Web-based HW/SW codesign tool for designing processors. SSC-DASH obtains a processor definition file via Web browser and generates a HW (sy...
详细信息
SSC-DASH (Server Side C-like Design Automation Shell) has been developed as a Web-based HW/SW codesign tool for designing processors. SSC-DASH obtains a processor definition file via Web browser and generates a HW (synthesizable Verilog-HDL description) and SWDE (Software Development Environment) for the generated processor. The SWDE includes ISS (Instruction Set Simulator), assembler, disassembler and compiler. For the verification of the defined processor, processor developers have to download the generated SWDE, every time, even where changes are small. To improve the usability of this system a Web-based interface for the generated SWDE is implemented using Ajax. Using Ajax, download of the SWDE becomes unnecessary and makes it possible to verify the processor on the server quickly and easily. This greatly improves the usability of the SWDE. In this paper, we describe implementation of Web-based ISS using Ajax.
This paper examines the generalization properties of online convex programming algorithms when the loss function is Lipschitz and strongly convex. Our main result is a sharp bound, that holds with high probability, on...
ISBN:
(纸本)9781605609492
This paper examines the generalization properties of online convex programming algorithms when the loss function is Lipschitz and strongly convex. Our main result is a sharp bound, that holds with high probability, on the excess risk of the output of an online algorithm in terms of the average regret. This allows one to use recent algorithms with logarithmic cumulative regret guarantees to achieve fast convergence rates for the excess risk with high probability. As a corollary, we characterize the convergence rate of PEGASOS (with high probability), a recently proposed method for solving the SVM optimization problem.
The common-use gap penalty strategies, constant penalty and affine gap penalty, have been adopted in the traditional three-sequence alignment algorithm which considers the insertion, deletion and substitution. However...
详细信息
The common-use gap penalty strategies, constant penalty and affine gap penalty, have been adopted in the traditional three-sequence alignment algorithm which considers the insertion, deletion and substitution. However, these strategies are not suitable to protein sequence alignments. For the alignment accuracy of protein sequences, the gap penalty is a major determinant. Incorporating protein structure information to vary the gap penalties can lead to more biologically correct alignments. Here, we present an algorithm to find a global and optimal alignment among three protein sequences by using position- specific gap penalties which allow gap penalties to be varied. Thus, residue-dependent information and protein structure information can be applied to the three-sequence alignment. The experimental results show that our algorithm achieves the significant improvement in the accuracy of alignments than the three-sequence alignment algorithm with the affine gap penalty for protein sequences.
Recently, there are numerous techniques have been proposed to forecast and identify the software development effort; such prediction has a prominent impact on the success of software development projects. The most com...
详细信息
Recently, there are numerous techniques have been proposed to forecast and identify the software development effort; such prediction has a prominent impact on the success of software development projects. The most common methods for estimating software development efforts that have been proposed in literature are: line of code (LOC)-based constructive cost model (COCOMO), function point- based regression model (FP), neural network model (NN), and case-based reasoning (CBR). Recent research has tended to focus on the use of function points (FPs) in estimating the software development efforts, however, a precise estimation should not only consider the FPs, which represent the size of the software, but should also include various elements of the development environment for its estimation. Therefore, the main benefit of this study is to design and analyze both function points and development environments of recent software development cases. Therefore, this paper presents a new intelligence paradigm scheme based on functional network to forecast that emphasizes on numerous software development elements. Both implementation and learning process are based on the utilization of functional networks as a new modeling scheme and investigate its efficiency as a software development estimation model for predicting the software development efforts.
暂无评论