Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be...
详细信息
ISBN:
(纸本)0769523153
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be lost during the discretization of the experimental data. Indeed, fuzzy boundaries between species and degrees of character development are commonly found in nature. Therefore, we proposed the fizzy perfect phylogeny model that extends the perfect phylogeny model to allow for a fuzzy membership of the characters. The properties of this model, such as uniqueness and backward compatibility, were then shown. We also showed how the fuzzy perfect phylogeny problem can be transformed to the perfect phylogeny problem in O(mv) time where m is the number of objects and v is the number of distinct value of characters. As a result, valuable information from the experimental data can be used without substantially increase the problem complex.
Mobile Commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial ...
详细信息
ISBN:
(纸本)0769523153
Mobile Commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial opportunities and complexity, which will make computing globally pervasive and ubiquitous. Customers prefer a choice in the channels through which they do business and the same applies to transactions as well. This paper reports on a project which explored the current state Of mobile financial transactions globally using Bluetooth as an enabling technology.
The security of identity authentication and key negotiate is an important foundation of WLAN (Wireless Local Area Network) security. We present a new authentication and key exchange protocol Wireless Key Exchange (WKE...
详细信息
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive computing that is built on Web Services architecture, and incorporates Universal Plug and Play (UPnP). OSOA aims to c...
详细信息
ISBN:
(纸本)0769523153
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive computing that is built on Web Services architecture, and incorporates Universal Plug and Play (UPnP). OSOA aims to combine context awareness and human-centric requirements related to ubiquitous computing with a new ontology-based approach to ad-hoc and goal-driven service composition.
Retrieval performance evaluation measures of information retrieval algorithm are the foundation of evaluating and improving information retrieval algorithm. In this paper precision and recall are analyzed mathematical...
详细信息
information retrieval (IR) systems offer a variety of interfaces and interaction modes. A given IR system's interface and interaction mode may not be optimal for a given accessing device/network pair or desired by...
详细信息
ISBN:
(纸本)0769523153
information retrieval (IR) systems offer a variety of interfaces and interaction modes. A given IR system's interface and interaction mode may not be optimal for a given accessing device/network pair or desired by a given user. In this paper we propose a set of attributes to characterize IR interfaces, interaction and presentation modes. We call a set of these bound attributes an information Navigation Profile (INP). We suggest the use of INPs in dynamic adaptation of IR interface, interaction and presentation modes by both origin and proxy servers.
The client puzzles have been proposed as an important mechanism in defendiug against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). ...
详细信息
ISBN:
(纸本)0769523153
The client puzzles have been proposed as an important mechanism in defendiug against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). In this scheme a puzzle issuer on the behalf of a receiver responds to requests with puzzles that a sender must solve before sending in any packet to a receiver We design two new puzzle types, hash-chain-reversal puzzles and multiple-hashchains-reversal puzzles, with which a sender is expected to reverse one (multiple) hash chain(s) and send in packets with valid passwords (i.e., solutions of puzzles) to the receiver Out- design achieves three Main properties. First, the PP scheme is able to generate puzzles with different difficulties flexibly for various clients. Second, a puzzle issuer is able to generate puzzles at a per-flow and per-packet basis. Third, the PP scheme is able to converge to be a "nonpuzzle " protocol.
One of the key steps in economy based grid resource allocation is to make reasonable prices for the grid resources. For resources' prices decide the resource flow in the Grid, further influence Grid resources'...
详细信息
ISBN:
(纸本)0769523153
One of the key steps in economy based grid resource allocation is to make reasonable prices for the grid resources. For resources' prices decide the resource flow in the Grid, further influence Grid resources' trading efficiency. This article, instead of discussing the pricing algorithm, argues an autonomous pricing mechanism that leaves the prices to be decided by the Grid traders within their trading process. We firstly point out the factors that influence the resources' prices;then make out the trading flow for resource consumer agents and provider agents. By doing these, the two trading agents can decide their price due to the dynamic changes of the Grid environment without any manmade interferences. Since price is the core of market economy, the autonomous pricing strategy provides us with a foundation to use the invisible hand of market to allocate the Grid resource.
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are needed. We present some results about ...
详细信息
ISBN:
(纸本)0769523153
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are needed. We present some results about a novel hardware implementation for ECC, that introduces also a form of parallelism to maximize the use of function units and hence to improve the throughput. Then we propose a comprehensive comparison of this new architecture with both some RSA architectures and other ECC implementations in ASIC VLSI technology.
We propose an electronic voting (e-voting) scheme that combines user-centric mix networks with voter-verifiable receipts. Unlike traditional mixilet-based e-voting schemes, our scheme empowers voters;the voters themse...
详细信息
ISBN:
(纸本)0769523153
We propose an electronic voting (e-voting) scheme that combines user-centric mix networks with voter-verifiable receipts. Unlike traditional mixilet-based e-voting schemes, our scheme empowers voters;the voters themselves decide the degree of anonymity required. Voters requiring a greater degree of anonymity obtain it by performing several protocol iterations. The proposed scheme utilizes incoercible, voter-verifiable receipts. It is robust as no reasonable-sized coalition can interfere with the correct operation. Finally, it is efficient as the number of transmitted messages increases linearly with the number of voters.
暂无评论