Existing methods for modeling E-commerce systems (ECSs) focus mostly on either mathematically abstract verification or graphical modeling, and cannot explicitly describe and analyze the obligations of partners. This w...
详细信息
Existing methods for modeling E-commerce systems (ECSs) focus mostly on either mathematically abstract verification or graphical modeling, and cannot explicitly describe and analyze the obligations of partners. This work presents a new class of Labeled Petri nets for the modeling and analysis of ECSs. And the life cycle of a case and the time/date of firing an action are considered. It can model graphically the dynamic behavior of the systems, and analyze elegantly the obligations. This approach is illustrated with a nontrivial example of the modeling and analysis of the trading process of the Purchase transaction in the Internet open trading protocol.
The axial compression ratio has always been a vital element in shear wall seismic design. The experimental study on the seismic behavior of five 1/3 scale mid-rise shear walls with high axial compression ratio were ca...
详细信息
The axial compression ratio has always been a vital element in shear wall seismic design. The experimental study on the seismic behavior of five 1/3 scale mid-rise shear walls with high axial compression ratio were carried out, including a plain shear wall, a shear wall with steel frame, a shear wall with steel bar truss, a shear wall with both steel frame and steel bar truss, and a shear wall with steel truss. For each shear wall, this paper analyzed experimentally the load-carrying capacity, the stiffness and its attenuation, ductility, hysteretic property, energy dissipation and failure pattern. And the formulas of load-carrying capacity were established, whose results were in good agreement with the test results. The experimental results showed that the seismic behavior of the shear wall was improved by the embedded steel frame or truss.
A dynamic stock trading system with a distributed shared memory is analyzed formally based on its temporal Petri net model. The functional correctness of the system is formally verified and some important properties o...
详细信息
Information flow security has been an important security requirement of existing operating systems, especially for distributed applications. We are interested in protecting information flow security with an eye to inf...
详细信息
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi...
详细信息
A formal definition and analysis on the hierarchical key management is presented for permission management and access control problem in the role hierarchy. Based on one-way hash function, a practical hierarchical key...
详细信息
A formal definition and analysis on the hierarchical key management is presented for permission management and access control problem in the role hierarchy. Based on one-way hash function, a practical hierarchical key management scheme is proposed. This scheme allows the role to select its master key by itself, and constructs the hierarchical permission relationship with secure hash function and public parameters. The process of key generation and derivation is simple and effective in this proposed scheme, which satisfies the security requirement of the hierarchical permission management. Compared with other present schemes, the new scheme optimizes the efficiency of key derivation and storage overhead. The dynamic access control of hierarchical role can be adapted in this new scheme.
Bandelet is a new image representation method, which can efficiently indicate the local directions and is adapted to the image geometry. The set partitioning in hierarchical trees (SPIHT) algorithm is an efficient met...
详细信息
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approx...
详细信息
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approximating skinning algorithm for constructing B-spline surface based on Piegl's approach. By a more precise estimation of maximum value of a B-spline basis function and utilizing of the local support property of B-spline basis function, the control points of a set of compatible B-spline curves are reduced, which makes the skinning algorithm more effective. Under the same error bound, experimental results showed that our algorithm can reduce more control points than Piegl's.
Niederreiter showed that there is a class of periodic sequences which possess large linear complexity and large k-error linear complexity simultaneously. This result disproved the conjecture that there exists a trade-...
详细信息
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext ***, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-...
详细信息
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext ***, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang *** improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang *** then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.
暂无评论