We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilistic polynomial-time adversaries that ...
详细信息
The biological function of proteins is dependent, to a large extent, on their native three dimensional conformation. Thus, it is important to know the structure of as many proteins as possible. Since experimental meth...
详细信息
The biological function of proteins is dependent, to a large extent, on their native three dimensional conformation. Thus, it is important to know the structure of as many proteins as possible. Since experimental methods for structure determination are very tedious, there is a significant effort to calculate the structure of a protein from its linear sequence. Direct methods of calculating structure from sequence are not available yet. Thus, an indirect approach to predict the conformation of protein, called threading, is discussed. In this approach, known structures are used as constraints, to restrict the search for the native conformation. Threading requires finding good alignments between a sequence and a structure, which is a major computational challenge and a practical bottleneck in applying threading procedures. The Genetic Algorithm paradigm, an efficient search method that is based on evolutionary ideas, is used to perform sequence to structure alignments. A proper representation is discussed in which genetic operators can be effectively implemented. The algorithm performance is tested for a set of six sequence/structure pairs. The effects of changing operators and parameters are explored and analyzed.
A parallel computation model that takes advantage of a networking infrastructure that enables server-free resource sharing based on the Jini approach is described. The network is a connected network of nodes that dire...
详细信息
ISBN:
(纸本)1581134282
A parallel computation model that takes advantage of a networking infrastructure that enables server-free resource sharing based on the Jini approach is described. The network is a connected network of nodes that directly know their neighborhood but can access the entire network. The constructed network infrastructure of handheld machines tolerates the dynamic nature of a mobile ad hoc network and provides the foundation for applications to take advantage of this type of computing network.
In order to model the behaviour of open concurrent systems by means of Petri nets, we introduce open Petri nets, a generalization of the ordinary model where some places, designated as open, represent an interface of ...
详细信息
Industrial-size specifications/models (whose state space is often infinite) can not be model checked in a direct way - A verification model of a system is model checked instead. Program transformation is a way to buil...
详细信息
The minimum test collection problem is defined as follows. Given a ground set S and a collection C of tests (subsets of S), find the minimum subcollection C‘ of C such that for every pair of elements (x;y) in S there...
详细信息
Responsibility for management of the main memory of each machine in a network of workstations has migrated from the paging concept to an object structure. We propose a new hybrid memory management mechanism that combi...
详细信息
Responsibility for management of the main memory of each machine in a network of workstations has migrated from the paging concept to an object structure. We propose a new hybrid memory management mechanism that combines the advantages of both pages and objects while avoiding their disadvantages. Our approach is based on the inherent relationship among objects for caching different type of remote pages and objects. High-profile and low-profile objects with their respective h-cache and h-cache axe introduced. We implemented our technique through simulation and showed that it dramatically reduces miss-penalties and outperforms earlier methods.
This paper describes a chat room application suitable for teaching basic network programming and security protocols. A client/server design illustrates the structure of current scalable network services while a multic...
详细信息
This paper describes a chat room application suitable for teaching basic network programming and security protocols. A client/server design illustrates the structure of current scalable network services while a multicast version demonstrates the need for efficient simultaneous distribution of network content to multiple receivers (e.g., as required by video broadcasts). The system also includes implementations of two security protocols, one similar to Kerberos and another based on public key encryption.
We deal with the problem of a center sending a messageto a group of users such that some subset of the users is consideredrevoked and should not be able to obtain the content of the *** concentrate on the stateless re...
详细信息
Dynamic events can be regarded as long-term temporal objects, which are characterized by spatio-temporal features at multiple temporal scales. Based on this, we design a simple statistical distance measure between vid...
详细信息
ISBN:
(纸本)0769512720
Dynamic events can be regarded as long-term temporal objects, which are characterized by spatio-temporal features at multiple temporal scales. Based on this, we design a simple statistical distance measure between video sequences (possibly of different lengths) based on their behavioral content. This measure is non-parametric and can thus handle a wide range of dynamic events. We use this measure for isolating and clustering events within long continuous video sequences. This is done without prior knowledge of the types of events, their models, or their temporal extent. An outcome of such a clustering process is a temporal segmentation of long video sequences into event-consistent sub-sequences, and their grouping into event-consistent clusters. Our event representation and associated distance measure can also be used for event-based indexing into long video sequences, even when only one short example-clip is available. However, when multiple example-clips of the same event are available (either as a result of the clustering process, or given manually), these can be used to refine the event representation, the associated distance measure, and accordingly the quality of the detection and clustering process.
暂无评论