Networks of Workstations (NOWs) are usually arranged as a set of interconnected switches with hosts connected to switch ports through interface cards. Several commercial interconnects for high-speed NOWs use up✶/down✶...
详细信息
Least Squares Support Vector Machines (LS-SVM) are the state of the art in kernel methods for regression and function approximation. In the last few years, these models have been successfully applied to time series mo...
详细信息
This paper presents a fault-tolerant middleware for private storage services based on a client-server model. A client-side API split files into redundant chunks, which are encoded/decoded, anonymized, and distributed ...
详细信息
An approach to the word sense disambiguation (WSD) relaying on the WordNet synsets is proposed. The method uses semantically tagged glosses to perform a process similar to the spreading activation in semantic network,...
详细信息
In Community question answering (QA) sites, malicious users may provide deceptive answers to promote their products or services. It is important to identify and filter out these deceptive answers. In this paper, we fi...
详细信息
With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their ***,this architecture engenders new risks and challeng...
详细信息
With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their ***,this architecture engenders new risks and challenges to patients'and the server's confidentiality,integrity and *** order to avoid any resource abuse and malicious attack,employing an authentication scheme is widely considered as the most effective approach for the TMIS to verify the legitimacy of patients and the ***,several authentication protocols have been proposed to this *** recently,Chaudhry et *** that there are vulnerabilities of impersonation attacks in Islam et al.'s ***,they introduced an improved protocol to mitigate those security ***,Qiu et *** that these schemes are vulnerable to the man-in-the-middle,impersonation and offline password guessing ***,they introduced an improved scheme based on the fuzzy verifier techniques,which overcome all the security flaws of Chaudhry et al.'s ***,there are still some security flaws in Qiu et al.'s *** this article,we prove that Qiu et al.'s protocol has an incorrect notion of perfect user anonymity and is vulnerable to user impersonation ***,we introduce an improved protocol for authentication,which reduces all the security flaws of Qiu et al.'s *** also make a comparison of our protocol with related protocols,which shows that our introduced protocol is more secure and efficient than previous protocols.
computer systems in the near future are expected to have Non- Volatile Main Memory (NVMM), enabled by a new generation of Non-Volatile Memory (NVM) technologies, such as Phase Change Memory (PCM), STT-MRAM, and Memris...
详细信息
We have been witnessing a rapid growth in quantum computing research over the years, with the emergence of demonstrable quantum computers of moderate size. The major issues that are faced to run a quantum algorithm re...
详细信息
Architects typically tell stories about their design intentions and then translate the verbal descriptions into action-based commands in computer Aided Design tools. In other words, during the creative process the des...
详细信息
暂无评论