Scalar product protocol and privacy preserving add to multiply protocol (PPAtMP) are two significant basic secure multiparty computation protocols. In this paper, we claim that the two protocols are equivalent to each...
详细信息
Currently, Java has been gradually applied in embedded real-time area with the improvement by the Real-Time Specification for Java (RTSJ). Accordingly, a hardware Java execution engine for embedded real-time applicati...
详细信息
This paper proposes the virtual honeynet collaboration system (VHS) to improve the designs and concepts of the honeynet architectures. Using virtualization technologies (VTs) as a development platform, the proposed ap...
详细信息
As computational clusters rapidly grow in both size and complexity, system reliability and, in particular, application resilience have become increasingly important factors to consider in maintaining efficiency and pr...
详细信息
ISBN:
(纸本)9781605589428
As computational clusters rapidly grow in both size and complexity, system reliability and, in particular, application resilience have become increasingly important factors to consider in maintaining efficiency and providing improved computational performance over predecessor systems. One commonly used mechanism for providing application fault tolerance in parallel systems is the use of checkpointing. By making use of a multi-cluster simulator, we study the impact of sub-optimal checkpoint intervals on overall application efficiency. By using a model of a 1926 node cluster and workload statistics from Los Alamos National Laboratory to parameterize the simulator, we find that dramatically over-estimating the AMTTI has a fairly minor impact on application efficiency while potentially having a much more severe impact on user-centric performance metrics such a queueing delay. We compare and contrast these results with the trends predicted by an analytical model. Copyright 2010 ACM.
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new netw...
详细信息
In this paper the authors present an attack on 7-round AES-128/256 to improve the known cryptanalysis by changing the order of round transformation , using the alternative representation of the round keys, exploiting ...
详细信息
We recently converted a CS1 (Introduction to computing) class to use the Python language in place of C++. Among other reasons, we hoped that the new language would help students who typically struggled with the course...
详细信息
We use web-scale N-grams in a base NP parser that correctly analyzes 95.4% of the base NPs in natural text. Web-scale data improves performance. That is, there is no data like more data. Performance scales log-linearl...
详细信息
We use web-scale N-grams in a base NP parser that correctly analyzes 95.4% of the base NPs in natural text. Web-scale data improves performance. That is, there is no data like more data. Performance scales log-linearly with the number of parameters in the model (the number of unique N-grams). The web-scale N-grams are particularly helpful in harder cases, such as NPs that contain conjunctions.
Iterative learning is a model of language learning from positive data, due to Wiehagen. When compared to a learner in Gold's original model of language learning from positive data, an iterative learner can be thou...
详细信息
This paper discusses a methodology for improved image processing for human facial analysis and tries to integrate results from the visible images with the corresponding thermal images. First, an enhanced face detectio...
详细信息
This paper discusses a methodology for improved image processing for human facial analysis and tries to integrate results from the visible images with the corresponding thermal images. First, an enhanced face detection algorithm in color images is described. The performance of Haar Classifiers is known as a fast real-time face detection algorithm. However, it generates false detection. The suggested solution in previous research is to increase the training set. The proposed solution in this paper is to pre-process the color images by implementing color segmentation in Chrominance component and Hue component prior to face detection algorithm. Datasets from different resources are tested and the experimental results produced suggested that this approach increases the detection rate and reduces the false detection rate in some datasets, but not for all. The performances from these datasets are compared and the possible future implementation is discussed. Further, the detection is extended to eyes, nose, and mouth detection. The second contribution of this paper is to establish a link between the visible images and thermal image. The method of applying visible image information to locate the face features in thermal image is illustrated. Finally, some possible future implementation of the results of the facial analysis within the domain of security is discussed.
暂无评论