Recently, the connection between p-measures of asymmetry and the L_p-mixed volumes for convex bodies was found soon after the p-measure of asymmetry was proposed, and the Orlicz-measures of asymmetry was proposed insp...
详细信息
Recently, the connection between p-measures of asymmetry and the L_p-mixed volumes for convex bodies was found soon after the p-measure of asymmetry was proposed, and the Orlicz-measures of asymmetry was proposed inspired by such a kind of connection. In this paper, by a similar way the dual p-measures of asymmetry for star bodies(naturally for convex bodies) is introduced first. Then the connection between dual p-measures of asymmetry and Lp-dual mixed volumes is established. Finally, the best lower and upper bounds of dual p-measures and the corresponding extremal bodies are discussed.
Analyzing international political behavior based on similar precedent circumstances is one of the basic techniques that policymakers use to monitor and assess current situations. Our goal is to investigate how to anal...
详细信息
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by network service providers if multicast data distribution is used. However, accounting for the re...
详细信息
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by network service providers if multicast data distribution is used. However, accounting for the resources consumed by subscribers becomes essential. Using an e-commerce (payment recovery) operational environment, in turn, requires support for security properties such as authentication, authorization, data confidentiality, and non-repudiation. However, multicast data distribution is inherently more susceptible to attack than unicast distribution, given its greater susceptibility to interception of the network traffic. Securing multicast sessions in B2C commerce requires authentication of the end-host, authorization of the subscriber and his e-payments, and accounting for a subscriber's consumed resources. In this paper, we present a comprehensive survey of the literature on e-payment platforms and protocols that provide some form of security to e-commerce transactions, followed by a comparative study of these e-payment platforms and protocols. We show the security problems that are currently unaddressed by the existing multicast protocols and e-payment platforms and protocols, in securing the operating environment of B2C commerce for multicast networks
暂无评论