In order to set up universal criteria for measuring and evaluating network security and survivability, this paper presents a novel index system. This index system was built according to the Protection-Detection-Respon...
详细信息
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boo...
详细信息
The Multi-Label Classification (MLC) problem has aroused wide concern in these years since the multi-labeled data appears in many applications, such as page categorization, tag recommendation, mining of semantic web d...
详细信息
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ...
详细信息
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on the special properties of single cycle T-function and an algorithm due to Wei, linear complexities of these four kinds of sequence are all acquired. The results show that single cycle T-function sequences have high linear complexity. Therefore, T-function satisfies the essential requirements being a basic component of stream cipher.
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO s...
详细信息
ISBN:
(纸本)9781467321006
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO sparse channel,the prevalent compressed sensing (CS) theory is *** to random pilot construction,a deterministic pilot de- sign method is exploited to form the measurement matrix by deterministically extracting some rows of Fourier matrix that satisfies Restricted Isometry Property (RIP).Two families of continuous functions,namely f1 -SL0 and f 2-SL0,are investi- gated in this paper to approximate A 0norm for MIMO sparse channel *** results suggest that the de- terministic pilot design scheme performs as well as the random one at both low and high signal noise ratio (SNR).Moreover,f1 - SL0 and f 2-SL0 outperform A 1-dantzig algorithm with faster running time and better anti-noisy performance.
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis...
详细信息
Rendering of volume caustics in participating media is often expensive, even with different acceleration approaches. Basic volume photon tracing is used to render such effects, but rather slow due to its massive quant...
详细信息
A number of mobile Online Social Networking (OSN) services have appeared in the market in recent times. While most mobile systems benefit greatly from cloud services, centralized servers and communications infrastru...
详细信息
A number of mobile Online Social Networking (OSN) services have appeared in the market in recent times. While most mobile systems benefit greatly from cloud services, centralized servers and communications infrastructure is not always available. Nor are location-based services offered to mobile devices without GPS. To take advantage of cloud and to address these problems, a Wi-Fi based multihop networking system called MoNet is proposed. On top of MONET we propose a privacy-aware geosocial networking service called WiFace. Where there is no infrastructure, a distributed content sharing protocol significantly shortens the relay path, reduces conflicts, and improves data availability. Furthermore, a security mechanism is developed to protect privacy. Comprehensive experiments performed on MoNet show that the system is more than sufficient to support social networking and even audio and video applications.
The idea of using a one-time-one-key design has been widely applied in conventional cryptography. With the security theory of conventional cryptology, encryption algorithms are made public while all the secrets are en...
详细信息
The idea of using a one-time-one-key design has been widely applied in conventional cryptography. With the security theory of conventional cryptology, encryption algorithms are made public while all the secrets are encoded only in the keys. This paper applies chaos theory to conventional cryptography to develop a one-time-one-algorithm design. A general theory is given to generate the clock key, substitution box, permutation box and operational sign functions for a one-time-one-algorithm scheme. This scheme is then implemented in a system to manage the tradeoff between speed and the security of the encryption algorithm.
We present a fast collision detection method for deformable surfaces with parallel spatial hashing on GPU architecture. The efficient update and access of the uniform grid are exploited to accelerate the performance i...
详细信息
暂无评论