The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion proble...
详细信息
ISBN:
(纸本)9781424449934
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion problem. In this study, we decompose a parallel program's Petri net model into multiple process subnets to study liveness preservation instead of taking it as a whole, which thus mitigates efficiently the state explosion problem to some extent. In this paper, the liveness preservation relation between a MPINet and its process subnets is analyzed in detail. A necessary condition of keeping liveness of a MPINet composed of n live process subnets is given. And a class of CR-restricted MPINets is proposed. Liveness preservation can be efficiently verified based on only their net structures for CR-restricted MPINets.
Trusted platform module is the core component of trusted computing platform, the functional testing and validation is an important method to ensure the correctness and specification compliance of the trusted platform ...
详细信息
Trusted platform module is the core component of trusted computing platform, the functional testing and validation is an important method to ensure the correctness and specification compliance of the trusted platform module, but until now, there is no valid formal testing and validation method, meanwhile the specification which is given by trusted computing group is descriptive, it is not convenient for product development and testing. The paper firstly analyzes the problem of the trusted platform module, and then gives the Z specification of TPM's cryptography system, based on this formal specification, gives the extended finite state machine model. Finally, the authors use the EFSM model for generating the test case and analyze the testing results.
This paper is devoted to the problem of H filtering for a class of neutral stochastic systems with both discrete and distributed time-varying *** objective is to design a full order filter such that the resulting filt...
详细信息
This paper is devoted to the problem of H filtering for a class of neutral stochastic systems with both discrete and distributed time-varying *** objective is to design a full order filter such that the resulting filtering error system is stochastically asymptotically stable with a prescribed H∞performance *** on the stability theory of stochastic systems,a delay-dependent and rate-dependent sufficient condition for the existence of filter is obtained in terms of linear matrix inequalities(LMIs).The corresponding filter design method is also proposed,while the explicit expression for the desired filter is given.A numerical example is finally included to illustrate the effectiveness of the proposed method.
XACML is a kind of declarative policy language which has flexible expressive functions based on attributes and satisfies complex security requirements of access management in the open environment, but it lacks the cap...
详细信息
XACML is a kind of declarative policy language which has flexible expressive functions based on attributes and satisfies complex security requirements of access management in the open environment, but it lacks the capabilities of detecting conflict rules and analyzing rule redundancy. This paper proposes rule state concept and applies it to analyze several categories of rule conflict caused by attribute hierarchy. In order to detecting and locating these conflicts, resource semantic tree and state relativity are utilized for depicting conflict detecting algorithms. Besides that, rule redundancy is the other issue in this paper. Employing state covering method, the mechanism of rule redundancy is explained, and redundancy judgment theorems are proven for various rules combining algorithms. The emulation tests in the last part of this paper firstly analyze the algorithm's efficiency, secondly indicate that evaluation performance can profit from resource semantic tree index and redundancy disposing.
In order to identify the possible contributory factors on urban road environment to accident severity, the logistic regression model was applied to traffic accident data collected from police-reports. A total of 2117 ...
详细信息
ISBN:
(纸本)9781424435036
In order to identify the possible contributory factors on urban road environment to accident severity, the logistic regression model was applied to traffic accident data collected from police-reports. A total of 2117 accidents occurred in Shijiazhuang in 2002 were considered for the purpose of this paper. Accident severity (dependent variable) in this paper is a dichotomous variable with two categories: extra serious or major accident and ordinary or minor accident. Because of the binary nature of this dependent variable, the logistic regression model was found suitable. Of nine independent variables obtained from police-reports, five were found most significant associated with accident severity, namely, road cross-section, accident location, road alignment, road type and lighting condition. A statistical interpretation is given of the model-developed estimates in terms of odds ratio concept. The findings show that the logistic regression model as used in this paper provides a better understanding of risk factors related to urban road environment.
According to the principle of theory combining with practice, preliminary indicators of road safety evaluation are selected by integrating the characteristics of road traffic safety in China. On the basis of prelimina...
详细信息
ISBN:
(纸本)9781424447411
According to the principle of theory combining with practice, preliminary indicators of road safety evaluation are selected by integrating the characteristics of road traffic safety in China. On the basis of preliminary indicators, evaluation index system of regional road safety is constructed from three respects: importance, necessity and effectiveness. Based on numerous research works on road safety evaluation, the weights of evaluation indicators are determined by fuzzy AHP, and then a fuzzy comprehensive evaluation model for regional road safety is established. Finally, the examples of beijing and Shanghai are given for illustration and main influencing factors restricting the traffic safety level of two cities' are found.
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixi...
详细信息
ISBN:
(纸本)9781424449729;9780769538242
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixing operations and rotations other than substitution and permutation, thus there exists little literature on its immunity against fault attacks. In this paper, we apply differential fault analysis on SHACAL-1 in a synthetic approach. We introduce the random word fault model, present some theoretical arguments, and give an efficient fault attack based on the characteristic of the cipher. Both theoretical predications and experimental results demonstrate that, 72 random faults are needed to obtain 512 bits key with successful probability more than 60%, while 120 random faults are enough to obtain 512 bits key with successful probability more than 99%.
The emerging wireless network has called for new requirements for designing authentication protocols due to its dynamic nature and vulnerable-to-attack structure. In 2006, two mutual authentication and key exchange pr...
详细信息
The emerging wireless network has called for new requirements for designing authentication protocols due to its dynamic nature and vulnerable-to-attack structure. In 2006, two mutual authentication and key exchange protocols with anonymity were proposed for roaming services in the global mobility network. After careful analyse, it was found that both protocols suffer from a number of practical attacks. Two improved protocols which were immune to the presented attacks were also proposed. These protocols did not only preserve all the advantages of original protocols but also improved the second protocol's efficiency.
This paper deals with the robust iterative learning control(ILC) for time-delay systems(TDS) with both model and delay *** ILC algorithm with anticipation in time is considered,and a frequency-domain approach to its d...
详细信息
This paper deals with the robust iterative learning control(ILC) for time-delay systems(TDS) with both model and delay *** ILC algorithm with anticipation in time is considered,and a frequency-domain approach to its design is *** shows that a necessary and sufficient convergence condition can be provided in terms of three design parameters:the lead time,the learning gain,and the performance weighting *** particular,if the lead time is chosen as just the delay estimate,then the convergence condition is derived independent of the delay and the *** this case,with the selection of the performance weighting function,the perfect tracking can be achieved,or the least upper bound of the L2-norm of the limit tracking error can be guaranteed less than the least upper bound of the L2-norm of the initial tracking error.
This paper proposes a new type of regularization in the context of multi-class support vector machine for simultaneous classification and gene *** combining the huberized hinge loss function and the elastic net penalt...
详细信息
This paper proposes a new type of regularization in the context of multi-class support vector machine for simultaneous classification and gene *** combining the huberized hinge loss function and the elastic net penalty,the proposed support vector machine can do automatic gene selection and further encourage a grouping effect in the process of building classifiers,thus leading a sparse multi-classifiers with enhanced ***,a reasonable correlation between the two regularization parameters is proposed and an efficient solution path algorithm is *** of microarray classification are performed on the leukaemia data set to verify the obtained results.
暂无评论