A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's sch...
详细信息
A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.
Skyline query processing has recently received a lot of attention in database *** a set of multi-dimensional objects,the skyline query finds the objects that are not dominated by *** the best of our knowledge,the exis...
详细信息
Skyline query processing has recently received a lot of attention in database *** a set of multi-dimensional objects,the skyline query finds the objects that are not dominated by *** the best of our knowledge,the existing researches mainly focus on how to efficiently return the whole skyline ***,as the cardinality and dimensionality of input dataset increase,the number of skylines grows exponentially,and hence this "huge" skyline set is completely useless to *** by the above fact,in this paper,we present a novel type of l-SkyDiv query,which only returns l skylines having maximum diversity,to improve the usefulness of skyline ***,we prove that the l-SkyDiv query belongs to the NP-Hard problem theoretically,and propose three efficient heuristic algorithms whose time complexities are polynomial to fast implement the proposed ***,we present detailed theoretical analyses and extensive experiments,demonstrating that our algorithms are both efficient and effective.
Hot trace building plays an important role in enhancing the performance of dynamic binary translators, since in most cases 10% of code takes 90% of execution time of the whole program. Hot traces can promote the code ...
详细信息
Electroencephalography (EEG) is considered a reliable indicator of a person's vigilance level. In this paper, we use EEG recordings to discriminate three vigilance states of a person, namely alert, drowsy, and sle...
详细信息
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public...
详细信息
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same message can then be recovered with Bob's private key. In this paper, in the identity-based setting, we first investigate the relationship between so called mediated encryption and unidirectional PRE. We provide a general framework which converts any secure identity-based unidirectional PRE scheme into a secure identity-based mediated encryption scheme, and vice versa. Concerning the security for unidirectional PRE schemes, Ateniese et al. previously suggested an important property known as the master secret security, which requires that the coalition of the proxy and Bob cannot expose Alice's private key. In this paper, we extend the notion to the identity-based setting, and present an identity-based unidirectional PRE scheme, which not only is provably secure against the chosen eiphertext attack in the standard model but also achieves the master secret security at the same time.
Utilizing virtualization technology to combine real-time operating system (RTOS) and off-the-shelf time-sharing general purpose operating system (GPOS) is attracting much more interest recently. Such combination has t...
详细信息
The PDZ domain is one of the largest families of protein domains that are involved in targeting and routing specific proteins in signaling pathways. PDZ domains mediate protein-protein interactions by binding the C-te...
详细信息
The PDZ domain is one of the largest families of protein domains that are involved in targeting and routing specific proteins in signaling pathways. PDZ domains mediate protein-protein interactions by binding the C-terminal peptides of their target proteins. Using the dipeptide feature encoding, we develop a PDZ domain interaction predictor using a support vector machine that achieves a high accuracy rate of 82.49%. Since most of the dipeptide compositions are redundant and irrelevant, we propose a new hybrid feature selection technique to select only a subset of these compositions that are useful for interaction prediction. Our experimental results show that only approximately 25% of dipeptide features are needed and that our method increases the accuracy by 3%. The selected dipeptide features are analyzed and shown to have important roles on specificity pattern of PDZ domains.
Many SoCs adopt multicore architectures. As a result, embedded programmers are also facing the challenge of parallel programming. We propose a parallel skeleton library that can be used on embedded multicores. Our lib...
详细信息
Chinese word segmentation is an active area in Chinese language processing though it is suffering from the argument about what precisely is a word in Chinese. Based on corpus-based segmentation standard, we launched t...
详细信息
The event-related brain oscillatory responses have a substantial role in motor imagery experiments. There are two patterns, i.e. event-related desynchronization (ERD) and eventrelated synchronization (ERS). In clinica...
详细信息
The event-related brain oscillatory responses have a substantial role in motor imagery experiments. There are two patterns, i.e. event-related desynchronization (ERD) and eventrelated synchronization (ERS). In clinical applications and scientific experiments, an obvious event-related potential (ERP) is pivotal to achieve required tasks. Therefore, we explore how subjects generate the obvious ERP more easily. Eight healthy subjects participated in the experiments and completed motor imagery on two different scales (index finger versus arm). The results indicate that the motor imagery of arm reaches the better performance compared with the motor imagery of index finger. Furthermore, we make a comparative analysis in averaged power spectrum in order to reveal inherent phenomenon. The analysis of power spectrum further confirms that arm motor imagery has an advantage over index finger motor imagery.
暂无评论