the proceedings contain 30 papers. the special focus in this conference is on Formal Methods in Computer-Aided Design. the topics include: Generating fast multipliers using clever circuits;verification of analog and m...
ISBN:
(纸本)3540237380
the proceedings contain 30 papers. the special focus in this conference is on Formal Methods in Computer-Aided Design. the topics include: Generating fast multipliers using clever circuits;verification of analog and mixed-signal circuits using hybrid system techniques;a methodology for the formal verification of FFT algorithms in HOL;a functional approach to the formal specification of networks on chip;proof styles in operational semantics;integrating reasoning about ordinal arithmetic into acl2;combining equivalence verification and completion functions;synchronization-at-retirement for pipeline verification;non-miter-based combinational equivalence checking by comparing BDDS with different variable orders;scalable automated verification via expert-system guided transformations;simple yet efficient improvements of sat based bounded model checking;bounded probabilistic model checking withthe mur verifier;increasing the robustness of bounded model checking by computing lower bounds on the reachable states;a hybrid of counterexample-based and proof-based abstraction;memory efficient all-solutions sat solver and its application for reachability analysis;approximate symbolic model checking for incomplete designs;an operational semantics for weak PSL;accepting predecessors are better than back edges in distributed LTL model-checking;a simple method for parameterized verification of cache coherence protocols;a partitioning methodology for BDD-based verification;invariant checking combining forward and backward traversal and variable reuse for efficient image computation.
the proceedings contain 158 papers. the special focus in this conference is on Linear Mixture Models, Convolutive Models, Nonlinear ICA and Speech Processing Applications. the topics include: Exploiting spatiotemporal...
ISBN:
(纸本)3540230564
the proceedings contain 158 papers. the special focus in this conference is on Linear Mixture Models, Convolutive Models, Nonlinear ICA and Speech Processing Applications. the topics include: Exploiting spatiotemporal information for blind atrial activity extraction in atrial arrhythmias;new eigensystem-based method for blind source separation;optimization issues in noisy Gaussian ICA;optimization using Fourier expansion over a geodesic for non-negative ICA;an overview of BSS techniques based on order statistics;analytical solution of the blind source separation problem using derivatives;approximate joint diagonalization using a natural gradient approach;blind identification of complex under-determined mixtures;blind separation of heavy-tailed signals using normalized statistics;blind source separation of linear mixtures with singular matrices;closely arranged directional microphone for source separation;estimating functions for blind separation when sources have variance-dependencies;on the estimation of the mixing matrix for underdetermined blind source separation in an arbitrary number of dimensions;on the strong uniqueness of highly sparse representations from redundant dictionaries;reliability of ICA estimates with mutual information;robustness of prewhitening against heavy-tailed sources;simultaneous extraction of signal using algorithms based on the nonstationarity;wavelet de-noising for blind source separation in noisy mixtures;blind separation of nonstationary sources by spectral decorrelation;linear multilayer independent component analysis using stochastic gradient algorithm and a Grassmann-Rayleigh quotient iteration for dimensionality reduction in ICA.
the proceedings contain 38 papers. the special focus in this conference is on Internet Applications, Local Area and Ad Hoc Wireless Networks. the topics include: Performance analysis of peer-to-peer networks for file ...
ISBN:
(纸本)9783540232384
the proceedings contain 38 papers. the special focus in this conference is on Internet Applications, Local Area and Ad Hoc Wireless Networks. the topics include: Performance analysis of peer-to-peer networks for file distribution;building topology-aware overlay multicast trees;predicting the perceptual service quality using a trace of VoIP packets;evaluating the utility of media-dependent FEC in VoIP flows;architecture of end-to-end QoS for VoIP call processing in the MPLS network;an interaction model and routing scheme for QoS support in ad hoc networks connected to fixed networks;load analysis of topology-unaware TDMA MAC policies for ad hoc networks;a vegas-like congestion control mechanism for aggregated traffic;an aggregate flow marker for improving TCP fairness in multiple domain diffserv networks;combined use of prioritized AIMD and flow-based traffic splitting for robust TCP load balancing;a fast heuristic for genetic algorithms in link weight optimization;a new prediction-based routing and wavelength assignment mechanism for optical transport networks;on the construction of QoS enabled overlay networks;MPLS protection switching versus OSPF rerouting;a distributed-request-based diffserv CAC for seamless fast-handoff in mobile internet;cross-layer analytical modeling of wireless channels for accurate performance evaluation;efficiency issues in MPLS transport for the UMTS access networks and QoS constraints in bluetooth-based wireless sensor networks.
the proceedings contain 65 papers. the topics discussed include: an algorithm for computing the outcome of combinatorial auctions with proxy bidding;a heuristic bidding strategy for multiple heterogeneous auctions;aut...
ISBN:
(纸本)1581137885
the proceedings contain 65 papers. the topics discussed include: an algorithm for computing the outcome of combinatorial auctions with proxy bidding;a heuristic bidding strategy for multiple heterogeneous auctions;automated mechanism design: complexity results stemming from the single-agent setting;optimal clearing algorithms for multi-unit single-item and multi-unit combinatorial auctions with demand/supply function bidding;efficient monte carlo decision tree solution in dynamic purchasing environments;performance analysis of a counter-intuitive automated stock-trading agent;a comparison of two algorithms for multi-unit k-double auctions;multi-attribute supply chain negotiation: coordinating reverse auctions subject to finite capacity considerations;unified solution for procurement integration and B2B stores;and mechanisms for coalition formation and cost sharing in an electronic marketplace.
the proceedings contain 80 papers. the topics discussed include: intelligent target recognition based on hybrid support vector machine;a maximum likelihood function approach to direction estimation based on evolutiona...
ISBN:
(纸本)0769519571
the proceedings contain 80 papers. the topics discussed include: intelligent target recognition based on hybrid support vector machine;a maximum likelihood function approach to direction estimation based on evolutionary algorithms;improved decomposition method for support vector machines;face recognition using self-organizing feature maps and support vector machines;support vector machine classifications for microarray expression data set;intelligent encoding of concepts in web document retrieval;model of web oriented intelligent tutoring system for distance education;web mining research;web mining based on multi-agents;study on knowledge processing techniques in air defense operation intelligent aid decision;face detection and facial feature extraction in color image;similarity measure learning for image retrieval using feature subspace analysis;and image retrieval based on multiple features using wavelet.
the proceedings contain 64 papers. the special focus in this conference is on Quasi-Monte Carlo Methods, Robust Iterative Solution Methods, Control and Uncertain Systems. the topics include: An introduction to the the...
ISBN:
(纸本)3540006087
the proceedings contain 64 papers. the special focus in this conference is on Quasi-Monte Carlo Methods, Robust Iterative Solution Methods, Control and Uncertain Systems. the topics include: An introduction to the theory of plausible and paradoxical reasoning;comparison of ten methods for the solution of large and sparse linear algebraic systems;variable-coefficient difference schemes for quasilinear evolution problems;additive schemes for systems of time-dependent equations of mathematical physics;geometry of polynomials and numerical analysis;hybrid Monte Carlo methods for matrix computation;a new efficient algorithm for generating the scrambled sobol’ sequence;generating and testing the modified halton sequences;parallel importance separation and adaptive Monte Carlo algorithms for multiple integrals;Monte Carlo and quasi-Monte Carlo algorithms for the barker-ferry equation with low complexity;on some weight Monte Carlo methods for investigating the asymptotical behavior of solution of the transfer equation;a Monte Carlo approach for finding more than one eigenpair;a new class of grid-free Monte Carlo algorithms for elliptic boundary value problems;Monte-Carlo integration using cryptographically secure pseudo-random generator;galerkin and control volume finite element methods for large scale air pollution simulations;robust preconditioners for saddle point problems;on a multigrid adaptive refinement solver for saturated non-Newtonian flow in porous media;on a multigrid eigensolver for linear elasticity problems;discrete methods for optimal control problems and numerical schemes of higher order for a class of nonlinear control systems.
An overview of measures used to ensure data integrity in German and international payment systems will be given. While symmetrical cryptographic algorithms are mainly used in national electronic cash system or in elec...
详细信息
ISBN:
(纸本)1402074735
An overview of measures used to ensure data integrity in German and international payment systems will be given. While symmetrical cryptographic algorithms are mainly used in national electronic cash system or in electronic purse, asymmetrical procedures are in use in international systems in order to simplify the key management. the descriptions of the payment systems are kept short and focus merely on some measures to ensure integrity and process control. they are not suitable to give a complete description of the overall system security. It is assumed that the reader knows, how an asymmetrical cryptographic algorithm works and is acquainted withthe various operation modes of a symmetrical asymmetrical cryptographic (here Triple-DES).
the proceedings contain 149 papers. the special focus in this conference is on Parallel, Distributed Architectures, Scheduling and Load Balancing. the topics include: Session guarantees to achieve pram consistency of ...
ISBN:
(纸本)3540219463
the proceedings contain 149 papers. the special focus in this conference is on Parallel, Distributed Architectures, Scheduling and Load Balancing. the topics include: Session guarantees to achieve pram consistency of replicated shared objects;an extended atomic consistency protocol for recoverable DSM systems;hyper-threading technology speeds clusters;configurable microprocessor array for DSP applications;on generalized moore digraphs;RDMA communication based on rotating buffers for efficient parallel fine-grain computations;communication on the fly in dynamic SMP clusters;accelerated diffusion algorithms on general dynamic networks;suitability of load scheduling algorithms to workload characteristics;minimizing time-dependent total completion time on parallel identical machines;diffusion based scheduling in the agent-oriented computing system;approximation algorithms for scheduling jobs with chain precedence constraints;combining vector quantization and ant-colony algorithm for mesh-partitioning;wavelet-neuronal resource load prediction for multiprocessor environment;fault-tolerant scheduling in distributed real-time systems;online scheduling of multiprocessor jobs with idle regulation;predicting the response time of a new task on a beowulf cluster;space decomposition solvers and their performance in pc-based parallel computing environments;evaluation of execution time of mathematical library functions based on historical performance information;empirical modelling of parallel linear algebra routines;efficiency of divisible load processing;gray box based data access time estimation for tertiary storage in grid environment;performance modeling of parallel fem computations on clusters;asymptotical behaviour of the communication complexity of one parallel algorithm and analytical modeling of optimized sparse linear code.
the proceedings contain 37 papers. the special focus in this conference is on Distributed algorithms, Internetworking, Web, Parallel and Distributed Systems. the topics include: Scalable group rekeying for secure mult...
ISBN:
(纸本)3540207457
the proceedings contain 37 papers. the special focus in this conference is on Distributed algorithms, Internetworking, Web, Parallel and Distributed Systems. the topics include: Scalable group rekeying for secure multicast;a note on modalities for nonconjunctive global predicates;a synchronous self-stabilizing minimal domination protocol in an arbitrary network graph;decomposable algorithms for computing minimum spanning tree;clock synchronization algorithms and scheduling issues;estimating checkpointing, rollback and recovery overheads;analysis of BGP update surge during slammer worm attack;a scalable transition multicast scheme;transaction management in distributed scheduling environment for high performance database applications;a tool for the creation of interactive and dynamic grid testbed web portals;agent-based fair load distribution in Linux web server cluster;location management by movement prediction using mobility patterns and regional route maps;multi-path transmission algorithm for end-to-end seamless handover across heterogeneous wireless access networks;a three level architecture for next generation wireless networks;distributed certified e-mail system for mobile users;performance of a collaborative target detection scheme for wireless sensor networks;various distributed shortest path routing strategies for wireless ad hoc networks;towards privacy preserving distributed association rule mining;performance improvement of the contract net protocol using instance based learning;a hybrid model for optimising distributed data mining;tuning the quality parameters of a firewall to maximize net benefit;a token based distributed algorithm for medium access in an optical ring network and distributed connection control protocols in all-optical WDM networks.
the proceedings contain 33 papers. the special focus in this conference is on Side Channel Attack Methodology and Hardware Factorization. the topics include: the security challenges of ubiquitous computing;multi-chann...
ISBN:
(纸本)3540408339
the proceedings contain 33 papers. the special focus in this conference is on Side Channel Attack Methodology and Hardware Factorization. the topics include: the security challenges of ubiquitous computing;multi-channel attacks;hidden markov model cryptanalysis;power-analysis attacks on an FPGA;hardware to solve sparse systems of linear equations over GF;cryptanalysis of DES implemented on computers with cache;a differential fault attack technique against SPN structures, with application to the AES and KHAZAD;a new algorithm for switching from arithmetic to boolean masking;a new paradigm for key-dependent reversible circuits;parity-based concurrent error detection of substitution-permutation network block ciphers;securing encryption algorithms against DPA at the logic level;design and implementation of a true random number generator based on digital circuit artifacts;true random number generators secure in a changing environment;on low complexity bit parallel polynomial basis multipliers;faster double-size modular multiplication from euclidean multipliers;GCD-free algorithms for computing modular inverses;attacking unbalanced RSA-CRT using SPA;the doubling attack;a new type of timing attack;unified hardware architecture for 128-bit block ciphers AES and camellia;very compact FPGA implementation of the AES algorithm;efficient implementation of rijndael encryption in reconfigurable hardware;closing the performance gap to elliptic curves;countermeasures against differential power analysis for hyperelliptic curve cryptosystems and a practical countermeasure against address-bit differential power analysis.
暂无评论