Traditionally, interlibrary cooperation is an important interaction between libraries. Nevertheless, the emerging digital library architecture has not explicitly supported this requirement. In this paper, we proposed ...
详细信息
Traditionally, interlibrary cooperation is an important interaction between libraries. Nevertheless, the emerging digital library architecture has not explicitly supported this requirement. In this paper, we proposed an interlibrary cooperation framework for digital libraries using P2P technology. An application of this framework to Faculty Publication Sharing System was presented. Besides, a reputation model based on data mining is utilized to provide libraries with incentives to join this framework
In this paper, we propose a cooperative control strategy for a group of robotic vehicles to achieve the specified task issued from a high-level astronaut command. The problem is mathematically formulated as designing ...
详细信息
In this paper, we propose a cooperative control strategy for a group of robotic vehicles to achieve the specified task issued from a high-level astronaut command. The problem is mathematically formulated as designing the cooperative control for a general class of multiple-input-multiple-output (MIMO) dynamical systems in canonical form with arbitrary but finite relative degrees such that the outputs of the overall system converge to the explicitly given steady state. The proposed cooperative control for individual vehicle only need to use the sensed and communicated outputs information from its local neighboring vehicles. No fixed leader and time-invariant communication networks are assumed among vehicles. Particularly, a set of less-restrictive conditions on the connectivity of the sensor/communication networks are established, under which it is rigorously proven by using the newly found nice properties of the convergence of sequences of row stochastic matrices that the cooperative objective of the overall system can be achieved. Simulation results for a group of vehicles achieving a target and surrounding a specified object in formation are provided to support the proposed approach in this paper.
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated that Hwang et al., scheme is vulnerable to the forgery attack. And also improved scheme...
详细信息
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated that Hwang et al., scheme is vulnerable to the forgery attack. And also improved scheme is quite similar to Hwang et al's scheme; the modified scheme is secure against the attack. The time complexity of computing the parameter a requires just one more modular multiplication operation. Thus, the scheme is not only far more secure but also efficient than Hwang et al's
As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to managed security service providers (MSSPs). However, the core problem of sharing p...
详细信息
As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to managed security service providers (MSSPs). However, the core problem of sharing private security logs creates a barrier to the widespread adoption of this business model. In this paper we analyze the logs used for security analysis with the concern of privacy and propose the constraints on anonymization of security monitor logs. We believe if the anonymization solution fulfills the constraints, MSSPs can detect the attacks efficiently and protect privacy simultaneously
The Collaborative Large-scale engineering Analysis Network for Environmental Research (CLEANER) Project Office has been established with funding from the National science Foundation (NSF) to the University of Illinois...
详细信息
A general study of the singlet-triplet energy separation (exchange energy) in the two-electron system confined in a realistic double-quantum-dot system is performed using a hybrid multiscale approach where the many-bo...
A general study of the singlet-triplet energy separation (exchange energy) in the two-electron system confined in a realistic double-quantum-dot system is performed using a hybrid multiscale approach where the many-body Schrödinger equation is solved exactly within the full quantum dot device environment. The exchange energy is computed as a function of the gate confinement and magnetic field. In particular, it is found that at zero magnetic field the exchange energy varies from meV to sub-μeV values as the confinement gate biases (tunneling barrier) are changed and the system is driven from a single quantum dot to two coupled quantum dots. The small values of the exchange coupling in this structure are attributed to the large interelectron separation arising when the Coulomb repulsion dominates tunneling.
Knowledge about multi-dimensional frequent patterns is interesting and useful. The classic frequent pattern mining algorithms based on a uniform minimum support, such as Apriori and FP-growth, either miss interesting ...
详细信息
Group communication is the basis for many recent multimedia and web applications. The group key management is one of the most critical problems in a large dynamic group. All group rekeying protocols add communication ...
详细信息
Stock market prediction is a complex and tedious task that involves the processing of large amounts of data, that are stored in ever growing databases. The vacillating nature of the stock market requires the use of da...
详细信息
暂无评论