Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inefficient schedule results. In this paper, a new scheduling mode...
详细信息
Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inefficient schedule results. In this paper, a new scheduling model which integrates the communication awareness was proposed. Then, a novel scheduling algorithm based on list heuristic was put forward for the new model, which can produce optimal schedule by serializing the communications edges. Experimental results show that the accuracy and efficiency of the new model and algorithm are significantly improved.
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approx...
详细信息
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approximating skinning algorithm for constructing B-spline surface based on Piegl's approach. By a more precise estimation of maximum value of a B-spline basis function and utilizing of the local support property of B-spline basis function, the control points of a set of compatible B-spline curves are reduced, which makes the skinning algorithm more effective. Under the same error bound, experimental results showed that our algorithm can reduce more control points than Piegl's.
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. security results of existing work are based on decisional Diffie-Hel...
详细信息
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.
In this paper, we present the parallel implementation of the traffic microsimulation PMTS (Parallel Microscopic Traffic Simulation) focusing on the performance issues. The parallelization of PMTS is domain decompositi...
详细信息
ISBN:
(纸本)9781427629807
In this paper, we present the parallel implementation of the traffic microsimulation PMTS (Parallel Microscopic Traffic Simulation) focusing on the performance issues. The parallelization of PMTS is domain decomposition, which means that each processor of the PC cluster is responsible for a different geographical area of the simulation region. We describe the transportation network graph partition and information exchange between domains. We demonstrate the time cost mathematics models for PMTS: the vehicle generation, vehicle position calculation, and vehicle information exchange between domains. The workload balance is obtained by adjusting the boundary lines according to the relative load of adjacent subnetworks. All these works have been proved to be effective when PMTS put into use and the experiment results are also provided which match our analysis.
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signa...
详细信息
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well.
In this paper, we highlight the use of multimedia technology in generating intrinsic summaries of tourism related information. The system utilizes an automated process to gather, filter and classify information on var...
详细信息
ISBN:
(纸本)9781605580852
In this paper, we highlight the use of multimedia technology in generating intrinsic summaries of tourism related information. The system utilizes an automated process to gather, filter and classify information on various tourist spots on the Web. The end result present to the user is a personalized multimedia summary generated with respect to users queries filled with text, image, video and real-time news made retrievable for mobile devices. Preliminary experiments demonstrate the superiority of our presentation scheme to traditional methods.
Signature, encryption and key exchange are some of the most important and foundational cryptographical tools. In most cases, they are all needed to provide different secure functions. There exist called authenticated ...
详细信息
security video communication is a challenging task, especially for wireless video applications. A perceptual video encryption scheme is proposed based on exploiting the special feature of entropy coding in H.264. The ...
详细信息
Semi-fragile watermarking can tolerate general signal processing, detect any spiteful tamper on marked multimedia data, and locate spatial regions within an altered image. A semi-fragile audio watermarking against she...
详细信息
Semi-fragile watermarking can tolerate general signal processing, detect any spiteful tamper on marked multimedia data, and locate spatial regions within an altered image. A semi-fragile audio watermarking against shearing is proposed in this paper. The features of the proposed algorithm are as follows: 1) Full advantage of multilevel scrambling is taken to locate tampered region;2) The algorithm can locate tampered regions without the help from the original watermark;3) By using the normalized cross-correlation, the proposed scheme can not only authenticate the integrity of the audio signal but also evaluate the temper degree. The experimental results show that the proposed algorithm has the advantages such as simple computation complexity, good robustness against shearing attack, and accurate location for tamper.
Being a fast-growing Internet application, streaming media application shares the network resources with the regular Internet traffic, and is susceptible to the existing security holes of the Internet, such as SETUP R...
详细信息
暂无评论