In this paper we investigate the issues of independence and diversity among individual classifiers participating in a multiple classifier fusion scheme. First we present a formal definition of statistically independen...
详细信息
Majority of the research in multilevel secure database management systems (MLS/DBMS) focuses primarily on centralized database systems. However, with the demand for higher performance and higher availability, database...
详细信息
In this paper, a simple approach is proposed to improve the performance of JPEG. In the proposed approach, the coding scheme is identical to the JPEG except only a fixed number of coefficients are coded for each image...
详细信息
ISBN:
(纸本)0769523153
In this paper, a simple approach is proposed to improve the performance of JPEG. In the proposed approach, the coding scheme is identical to the JPEG except only a fixed number of coefficients are coded for each image block. Consequently, it is totally compatible with the JPEG and is termed as zonal JPEG. Simulation results indicate that the proposed zonal JPEG is able to trade little PSNR with significant bit rate reduction when compared with thee JPEG.
In this paper, we report on the design and implementation of a stemmer for the Farsi language. The results of our evaluation on a small Farsi document collection shows a significant improvement in precision/recall ove...
详细信息
In this paper, we report on the design and implementation of a stemmer for the Farsi language. The results of our evaluation on a small Farsi document collection shows a significant improvement in precision/recall over not stemming.
This paper develops a new idea, traces, which speeds up the search for candidate Blackjack betting systems by >400X. We then use traces to enable a new application of scatter search, which identifies alternative be...
详细信息
This paper develops a new idea, traces, which speeds up the search for candidate Blackjack betting systems by >400X. We then use traces to enable a new application of scatter search, which identifies alternative betting systems that are statistically identical to the best professional ones and exceed others in mean betting returns in a study of 21 systems.
To ensure the security of software executing on malicious hosts, as in digital rights management (DRM) applications, it is desirable to encrypt or decrypt content using white-box-encoded cryptographic algorithms in th...
详细信息
To ensure the security of software executing on malicious hosts, as in digital rights management (DRM) applications, it is desirable to encrypt or decrypt content using white-box-encoded cryptographic algorithms in the manner of Chow et al. (2002). Such encoded algorithms must run on an adversary's machine without revealing the private key information used, despite the adversary's ability to observe and manipulate the running algorithm. We have implemented obfuscated (white-box) DES and triple-DES algorithms along the lines of Chow et al., with alterations that improve the security of the key. Our system is secure against two previously published attacks on Chow et al.'s system, and our own adaptation of a statistical bucketing attack on their system.
We propose the n-state quantum coin flipping protocol by generalizing the three states protocol. Furthermore, we conduct security analysis on our protocol and show that in our protocol we can reduce the bias of one pl...
详细信息
We propose the n-state quantum coin flipping protocol by generalizing the three states protocol. Furthermore, we conduct security analysis on our protocol and show that in our protocol we can reduce the bias of one player arbitrarily, but at the cost of increase of the bias of the other.
Mobile commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial ...
详细信息
Mobile commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial opportunities and complexity, which makes computing globally pervasive and ubiquitous. Customers prefer a choice in the channels through which they do business and the same applies to transactions as well. This paper reports on a project which explored the current state of mobile financial transactions globally using Bluetooth as an enabling technology.
This paper aims to estimate the project cost contingency regardless the individual utility function and risk aversion. Considering a project alike a short selling, the option pricing theory is used to value the contin...
详细信息
This paper aims to estimate the project cost contingency regardless the individual utility function and risk aversion. Considering a project alike a short selling, the option pricing theory is used to value the contingency as a risk premium that would be required by the market if the project was a traded security.
作者:
S. HaciniLire Laboratory
Computer Science Department Mentouri University of Constantine Algeria
Mobile agents must be prepared to execute on different hosts where, according to specific environmental conditions, they adopt different behaviors. The aim of this paper is to describe how a mobile agent equipped with...
详细信息
Mobile agents must be prepared to execute on different hosts where, according to specific environmental conditions, they adopt different behaviors. The aim of this paper is to describe how a mobile agent equipped with a flexible capacity, can adapt its execution with the request and security found (in a visited environment). Based on its security, the agent becomes able to adapt itself to the environment where it is currently running, by composing only appropriate modules. This allows enhancement of the privacy of the agent code.
暂无评论