Covert channel analysis is an important requirement when building secure information systems and identification is the most difficult task. Although some approaches were presented they are either experimental or const...
详细信息
In this paper, a logic computing model was constructed using a DNA nanoparticle, combined with color change technology of DNA/Au nanoparticle conjugates, and DNA computing. Several important technologies are utilized ...
详细信息
In this paper, a logic computing model was constructed using a DNA nanoparticle, combined with color change technology of DNA/Au nanoparticle conjugates, and DNA computing. Several important technologies are utilized in this molecular computing model: DNA self-assembly, DNA/Au nanoparticle conjugation, and the color change resulting from Au nanoparticle aggregation. The simple logic computing model was realized by a color change, resulting from changing of DNA self-assembly. Based on this computing model, a set of operations computing model was also established, by which a simple logic problem was solved. To enlarge the applications of this logic nanocomputing system, a molecular detection method was developed for H1N1 virus gene detection.
Exception handling is a vital but often poorly tested part of a program. Static analysis can spot bugs on exceptional paths without actually making the exceptions happen. However, the traditional methods only focus on...
详细信息
Virtualization technology is the basis of cloud computing, and the most important property of virtualization is isolation. Isolation guarantees security between virtual machines. However, covert channel breaks the iso...
详细信息
Multi-type objects with multi-type relations are ubiquitous in real-world networks, e.g. bibliographic networks. Such networks are also called heterogeneous information networks. However, the research on clustering fo...
详细信息
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message passing protocols can achieve satisfacto...
详细信息
This paper presents an automatic line-drawing method designed for building images. The fast line segment detector with a false detection control and detects the outline and the door, or window edge features detected, ...
详细信息
In study of Petri net systems, the approach of synthesis process is playing an increasingly significant role. In a synthesis process, the properties of subsystems must be preserved in the global system in order to red...
详细信息
Service-oriented Architecture (SOA) is a leading paradigm that can be used to address the challenges of both cross-organisational and inter-organisational systems integration. This approach makes it necessary to inves...
详细信息
暂无评论