A new approach for bridging over the semantic gap is presented. This approach is based solely on the extraction of low-level illumination features, and by using well defined film rules regarding scene lighting, it gen...
详细信息
A new approach for bridging over the semantic gap is presented. This approach is based solely on the extraction of low-level illumination features, and by using well defined film rules regarding scene lighting, it generates high level semantic descriptors for scenes. These illumination descriptors could be further combined with other descriptors like motion and shot tempo, to generate a more complete automatic semantic analysis of video media.
In 1986, Fiat and Shamir proposed a general method for transforming secure 3-round public-coin identification schemes into digital signature schemes. The idea of the transformation was to replace the random message of...
详细信息
In 1986, Fiat and Shamir proposed a general method for transforming secure 3-round public-coin identification schemes into digital signature schemes. The idea of the transformation was to replace the random message of the verifier in the identification scheme, with the value of some deterministic hash function evaluated on various quantities in the protocol and on the message to be signed. The Fiat-Shamir methodology for producing digital signature schemes quickly gained popularity as it yields efficient and easy to implement digital signature schemes. The most important question however remained open: are the digital signatures produced by the Fiat-Shamir methodology secure? We answer this question negatively. We show that there exist secure 3-round public-coin identification schemes for which the Fiat-Shamir transformation yields insecure digital signature schemes for any hash function used by the transformation. This is in contrast to the work of Pointcheval and Stern which proved that the Fiat-Shamir methodology always produces digital signatures secure against chosen message attack in the "Random Oracle Model" - when the hash function is modeled by a random oracle. Among other things, we make new usage of Barak's technique for taking advantage of nonblack-box access to a program, this time in the context of digital signatures.
We revisit the two standard dense methods for matrix Sylvester and Lyapunov equations: The Bartels-Stewart method for A1X+XA2+D=0 and Hammarling's method for AX+XAT+BBT=0 with A stable. We construct three schemes ...
For a class of continuous - time nonlinear system, a novel robust adaptive fuzzy controller is proposed by using of Lyapunov method. It is proven that the control algorithm is globally stable, the output tracking - er...
详细信息
ISBN:
(纸本)0780372689
For a class of continuous - time nonlinear system, a novel robust adaptive fuzzy controller is proposed by using of Lyapunov method. It is proven that the control algorithm is globally stable, the output tracking - error of the system can convergence to a domain of zero under the assumptions. As a result, the system controled has stronger robustness for disturbance and modeling error.
We give a development of universal lossy data compression based on a lossy version of the Kraft inequality. As an application, we evaluate the performance of universal mixture codebooks.
We give a development of universal lossy data compression based on a lossy version of the Kraft inequality. As an application, we evaluate the performance of universal mixture codebooks.
The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network (e.g., an Internet si...
详细信息
The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network (e.g., an Internet site). A vertex (peer) can communicate with another vertex directly if and only if it knows a certain routing information to that other vertex. Hence, it is critical for peers to convey this routing information to each other. The problem was formalized by Harchol-Balter et al. (1999). The routing information needed for a vertex to reach another peer is that peer's identifier (e.g., IP address). A logical directed edge represents the fact that the peer at the tail of the edge knows the IP address of the one at its head. A number of algorithms were developed by Harchol-Balter et al. for this problem in the model of a synchronous network over a weakly connected directed graph. The best of these algorithms was randomized. Subsequently, a deterministic algorithm for the problem on synchronous networks with improved complexity was presented by Kutten et al. (2001). The current paper extends this deterministic algorithm to the environment of asynchronous networks, maintaining similar complexities (translated to the asynchronous model). These are lower than the complexities that would be needed to synchronize the system. The main technical difficulty in a directed, weakly connected system is to ensure that vertices take consistent steps, even if their knowledge about each other is not symmetric, and even if there is no timeout mechanism (which does exist in synchronous systems) to assist in that.
In this paper we show that any two-party functionality canbe securely computed in a constant number of rounds, where security isobtained against malicious adversaries that may arbitrarily deviate fromthe protocol spec...
详细信息
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilistic polynomial-time adversaries that ...
详细信息
This paper describes a chat room application suitable for teaching basic network programming and security protocols. A client/server design illustrates the structure of current scalable network services while a multic...
详细信息
This paper describes a chat room application suitable for teaching basic network programming and security protocols. A client/server design illustrates the structure of current scalable network services while a multicast version demonstrates the need for efficient simultaneous distribution of network content to multiple receivers (e.g., as required by video broadcasts). The system also includes implementations of two security protocols, one similar to Kerberos and another based on public key encryption.
We deal with the problem of a center sending a messageto a group of users such that some subset of the users is consideredrevoked and should not be able to obtain the content of the *** concentrate on the stateless re...
详细信息
暂无评论