this paper establishes a model of satellite mobile communication network end-to-end authentication and designs a distributed end-to-end authentication protocol for the model including initial authentication, authentic...
详细信息
this paper presents a new tool for the study of relationships between total path length or average depth and number of nodes of decision trees. In addition to algorithm, the paper also presents the results of experime...
详细信息
Information fusion is a hot topic in computer and related fields. It is widely used in military and civilian areas. In this paper, we first describe information fusion architectures of it to give a blueprint of inform...
详细信息
the authors present a new taxonomy for source code security defects based on three-dimension-tree, which considers the information of defect’s cause, impact and representation synthetically. Case studies show that a ...
详细信息
In this paper a novel data hiding scheme using least square mapping is proposed. the method conceals a k-ary secret digit in n-pixel block in which the embedding function with minimum mean square error (MSE) between t...
详细信息
Gazes and pointing gestures are important in performing collaborative work involving instructions with shared objects. However, in general video conferencing systems, the geometrical consistency of size and positional...
详细信息
the county science and technology workers are critical components of Chinese science and technology workers, playing an important role in science and technology application and popularization. Improving the skills for...
详细信息
this study aimed to compare the effectiveness and usability of using conventional devices, Wii and XaviX, in rehabilitation, and to propose advices to improve the digital game design. A clinical trial was implemented ...
详细信息
In recent years, we have seen a surge of cybersecurity incidents ranging fromwidespread attacks (e.g., large-scale attacks against infrastructures or end points [1]) to new technological advances (i.e., new generation...
详细信息
暂无评论