This work introduces a two-dimensional modal logic to represent agents' Concurrent Common Knowledge in distributed systems. Unlike Common Knowledge, Concurrent Common Knowledge is a kind of agreement reachable in ...
详细信息
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive and popular security technique for many applications, such as electronic commerce and secure inter...
详细信息
This paper- studies different error control schemes in wireless sensor networks with Bluetooth technology. The tradeoff between reliability and energy consumption of Bluetooth packets are analyzed, using different err...
详细信息
This paper presents a configuration memory architecture that offers fast FPGA reconfiguration. The underlying principle behind the design is the use of fine-grained partial reconfiguration that allows significant conf...
详细信息
MicroRNAs (miRNAs) are small endogenous RNAs of ∼22nt that act as direct post-transcriptional regulators in animals and plants. MicroRNAs generally perform a function by binding to the complementary site on the 3'...
详细信息
作者:
James CraftWilliam ClevelandThe Information Systems Security Officer at the United States Agency for International Development (USAID)
Bureau for Management Information Resources Management (M/IRM) Information Systems Security Team. He has a BS in business management from George Mason University and has 22 years of experience focusing primarily on systems engineering cybersecurity and enterprise operations. He has played a major role in the implementation of the U.S. Government's Model Information Security Policy. The USAID PRIME Security Program Manager
Computer Sciences Corporation in Arlington Virginia. He has MS degrees in information and telecommunications systems management and in military science. Cleveland has over 20 years of experience in the planning and management of a wide variety of functions including business process reengineering and IT security.
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, Information Resources Management (M/IRM), Information Systems Secu...
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, Information Resources Management (M/IRM), Information Systems Security Team. The USAID is an independent agency that provides economic, development, and humanitarian assistance around the world in support of the foreign policy goals of the United States. It is located in the Ronald Reagan Building in Washington, D.C.
Broadband Wireless Access (BWA) systems offer a solution for broadband access and high data rate transmission of multimedia services with distinct Quality-of-Service (QoS) requirements through a wireless medium. IEEE ...
详细信息
Mathematical models are often used in system identification applications. The dynamics of most systems, however, change over time and the sources of these changes cannot always be directly determined or measured. To m...
详细信息
Edge detection is an important topic in image processing and a main tool in pattern recognition and image segmentation. Many edge detection techniques are available in the literature. 'A number of recent edge dete...
详细信息
Edge detection is an important topic in image processing and a main tool in pattern recognition and image segmentation. Many edge detection techniques are available in the literature. 'A number of recent edge detectors are multiscale and include three main processing steps: smoothing, differentiation and labeling' (Ziau and Tabbone, 1997). This paper, presents a proposed method which is suitable for edge detection in images. This method is based on the use of the clustering algorithms (Self-Organizing Map (SOM), K-Means) and a gray scale edge detector (Canny, Generalized Edge Detector (GED)). It is shown that using the grayscale edge detectors may miss some parts of the edges which can be found using the proposed method.
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performance. Building a custom benchmark suite i...
详细信息
暂无评论