An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC...
详细信息
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.
We have seen a surge of interest in spectral-based methods and kernel-based methods for machine learning and data mining. Despite the significant research, these methods remain only loosely related. In this paper, we ...
详细信息
We have seen a surge of interest in spectral-based methods and kernel-based methods for machine learning and data mining. Despite the significant research, these methods remain only loosely related. In this paper, we give theoretically an explicit relation between spectral clustering and weighted kernel principal component analysis (WKPCA). We show that spectral clustering is not only a method for data clustering, but also for feature extraction. We are then able to reinterpret the spectral clustering algorithm in terms of WKPCA and propose our spectral feature analysis (SFA) method. The spectral features extracted by SFA can capture the distinguishing information of data from different classes effectively. Finally some experimental results are presented to show the effectiveness of our method.
An approach to detection of phishing Web pages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution to antiphishing. A legitimate Web page owner can use this approach to se...
详细信息
An approach to detection of phishing Web pages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution to antiphishing. A legitimate Web page owner can use this approach to search the Web for suspicious Web pages which are visually similar to the true Web page. The approach first decomposes the Web pages into salient (visually distinguishable) block regions. The visual similarity between two Web pages is then evaluated in three metrics: block level similarity, layout similarity, and overall style similarity. A Web page is reported as a phishing suspect if any of them (with regards to the true one) is higher than its corresponding preset threshold. Preliminary experiments show that the approach can successfully detect those phishing Web pages with few false alarms at a speed adequate for online application.
This paper presents the Intelligent Meeting Room, anongoing project dedicated to the development of anaugmented meeting room. which facilitates participantswith mobile device to argue or discuss their ideas. Forpresen...
详细信息
ISBN:
(纸本)0780379411
This paper presents the Intelligent Meeting Room, anongoing project dedicated to the development of anaugmented meeting room. which facilitates participantswith mobile device to argue or discuss their ideas. Forpresenter, the interaction becomes friendlier and moreefficient by personalizing shared devices-projector. Thecontext-aware note program, ConNote, can automaticallyadd the contextual information into note so that it lessensthe audience's burden of taking note. By making full usecontextual information, ConQuiz can help presenter toefficiently answer audience's question. ConLog modulecan create live meeting record. The underlying softwareinfrastructure is a multi agent system called SmartPlatform.
Publicly verifiable sealed electronic auctions are proposed. The schemes enjoy the following advantages. They require no special trusted parties. After bid opening phase, only the winning price is revealed and the rel...
详细信息
TMS (Targeted Marketing system) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,...
详细信息
TMS (Targeted Marketing system) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,...
详细信息
ISBN:
(纸本)9780769521008
TMS (Targeted Marketing system) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine, and a presentation and evaluation module. It supports marketing decision making for a company or an organization by combining results from information retrieval, data mining, information theory, and utility theory.
In this paper, identification and verification approach based on human iris pattern is presented. The system is based on several steps from capturing the iris pattern, determining and localizing the iris boundaries, t...
详细信息
In this paper, identification and verification approach based on human iris pattern is presented. The system is based on several steps from capturing the iris pattern, determining and localizing the iris boundaries, transformation of localized iris into rectangular and polar components, extracting the features from the image, based on wavelet transformation and at the end the matching of the iris. Matching is based on calculating the hamming codes of different irises. The algorithms used in this research are computationally effective, reliable, robust, and meet the industry standards in an efficient and effective manner. The accuracy of the presented work shows that our system is ideal for human recognition at high security places.
Machine vision is an active branch of Artificial Intelligence. An important problem in this area is the balance among efficiency, accuracy and huge computing. The visual system of human can keep watchfulness to the pe...
详细信息
Machine vision is an active branch of Artificial Intelligence. An important problem in this area is the balance among efficiency, accuracy and huge computing. The visual system of human can keep watchfulness to the perimeter of visual field while at same time their central attention is focused to the center of visual field for fine information processing. This mechanism of computing resource assignment could ease the demand for huge and complex hardware structure. Therefore designing computer model based on biological visual
With the development of well drilling technique and the reform on drill bit technique, each oil field has adopted new PDC drill bit to smash rock cuttings. However, the severely mixed cuttings have greatly increased t...
详细信息
ISBN:
(纸本)0780384032
With the development of well drilling technique and the reform on drill bit technique, each oil field has adopted new PDC drill bit to smash rock cuttings. However, the severely mixed cuttings have greatly increased the difficulty in collecting samples through traditional geochemical logging technique. Based on the further study on geochemical logging and gas logging techniques, a new approach is presented in the paper to analyze rock cutting samples by hydrocarbon component through complete degasification. In addition, using PLC programmed control, an automatic degasification system of hydrocarbon component in rock cuttings is developed, which has achieved good testing results. The precision of exploration for petroleum and natural gas is hereby enhanced.
暂无评论