Java is widely used because its security and platform independence. Although Java's security model is designed for protecting users from untrusted sources, Java's security is not under fully control at the app...
详细信息
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multilayered embedding scheme to hide secret messages in the vertices of 3D pol...
详细信息
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multilayered embedding scheme to hide secret messages in the vertices of 3D polygon models. Experimental results show that the cover model distortion is very small as the number of hiding layers ranges from 7 to 13 layers. To the best of our knowledge, this novel approach can provide much higher hiding capacity than other state-of-the-art approaches, while obeying the low distortion and security basic requirements for steganography on 3D models.
There are many distributed, autonomous, heterogeneous and dynamic data sources in data sharing environment. In order to achieve the goal of global data sharing without compromising the security of local domain respect...
详细信息
Nowadays complex information system's integrated formal models of function verification and performance evaluation lack properties constraint about space aspect. This paper presents an integrated verification mode...
详细信息
Nowadays complex information system's integrated formal models of function verification and performance evaluation lack properties constraint about space aspect. This paper presents an integrated verification model atsFPM by defining a space requirement function over the states of the considered information system. The patterns of paths which are based on regular expressions is proposed in order to specify the functional specifications. The syntax and semantic of the model atsFPM is defined. A conversion product model is obtained by the combination of the system model and the automaton of the pattern of paths which expresses the functional specifications. The verification of the model atsFPM is tackled by the performance verification technique of Markov Reward Model. Experimental results show that the atsFPM model and its verification approach can satisfy the modeling of information system and verification of functional and performance specifications.
作者:
Chandrajit L. Bajaj徐国良张琴CVC
Department of Computer ScienceInstitute for Computational Engineering and Sciences University of Texas at Austin LSEC
Institute of Computational MathematicsAcademy of Mathematics and System Sciences Chinese Academy of Sciences School of Sciences
Beijing Information Science and Technology University
We present a general framework for a higher-order spline level-set (HLS) method and apply this to biomolecule surfaces construction. Starting from a first order energy functional, we obtain a general level set formu...
详细信息
We present a general framework for a higher-order spline level-set (HLS) method and apply this to biomolecule surfaces construction. Starting from a first order energy functional, we obtain a general level set formulation of geometric partial differential equation, and provide an efficient approach to solving this partial differential equation using a C2 spline basis. We also present a fast cubic spline interpolation algorithm based on convolution and the Z-transform, which exploits the local relationship of interpolatory cubic spline coefficients with respect to given function data values. One example of our HLS method is demonstrated their individual atomic coordinates which is the construction of biomolecule and solvated radii as prerequisites. surfaces (an implicit solvation interface) with
One of the most promising advantages of Web service technology is the possibility of creating value-added services by combining existing ones. A major challenge is how to discover and select concrete service according...
详细信息
One of the most promising advantages of Web service technology is the possibility of creating value-added services by combining existing ones. A major challenge is how to discover and select concrete service according to user requirements. This paper addresses the topic of service discovery composite Web services. The main feature is that we take the process model as well as service profile into account. Firstly, the process models of Web services are translated into Petri nets. Based on this, we propose a service matchmaking algorithm, via comparing the functionality compatibility and process consistency, thus leading to more accurate matchmaking.
Multicast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non-technical, multicast IP hasn't yet been totally adopted for Internet. Durin...
详细信息
ISBN:
(纸本)9783901882272
Multicast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non-technical, multicast IP hasn't yet been totally adopted for Internet. During recent years, an active area of research is that of implementing this kind of traffic in the application layer where the multicast functionality isnt a responsibility of the routers but that of the hosts, which we know as Multicast Overlay Networks (MON). In this article, routing in an MON is put forward as a multiobjective optimization problem (MOP) where two functions are optimized: 1) the total end to end delay of the multicast tree and 2) the maximum link utilization. The simultaneous optimization of these two functions is an NP-Complete problem and to solve this we suggest using Multiobjective Evolutionary Algorithms (MOEA), specifically NSGA-II.
This paper proposes an optimal approach for design of a hybrid photovoltaic (PV)-wind generating system with adaptive-fuzzy controller, which is based on discrete optimisation and energy balance calculations. The tota...
详细信息
This paper proposes an agent-based simulation model to analyze how team management affects performances of the team with three fundamental parameters: team size, skill combination among team members and task structure...
详细信息
This paper proposes an agent-based simulation model to analyze how team management affects performances of the team with three fundamental parameters: team size, skill combination among team members and task structure. The results confirmed are as follows: first, communication cost increases when the team size grows, and team-workers benefit from a right team size to obtain higher productivity;second, each team member has more chances to receive tasks that he/she is good at and then strengthen this skill ability by accumulative experience;third, a team shows more efficiency and robustness under a task environment where both workload and sub-task variety get to a balanceable distribution in a long term.
We propose an intuitive computer graphics authoring method based on interactive evolutionary computation (IEC). Our previous systems employed genetic algorithm (GA) and mainly focused on rapid exploration of a single ...
详细信息
暂无评论