The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle Un...
详细信息
ISBN:
(纸本)9781605580760
The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle University and City University of London, UK and Åbo Akademi University, Turku, Finland. The state-of-the-art, completed work as well as the next steps of the development of master and doctoral courses for the specialty in critical software engineering, computersystems and networks are described. The inputs from each of the European consortium members are presented. Copyright 2008 ACM.
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel...
详细信息
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.
We present a new approach for modeling color attacks of rgb-color watermarked images. We have used a based interpolation watermarking algorithm and supposed that the attacks are simulated by a scaling of the colors fo...
详细信息
ISBN:
(纸本)9780769532783
We present a new approach for modeling color attacks of rgb-color watermarked images. We have used a based interpolation watermarking algorithm and supposed that the attacks are simulated by a scaling of the colors followed by a translation. We give bounds for the extracted watermark depending on the original image, the watermark and the attack. Different attacks like LSB, embedding another watermark, Stirmark have been simulated and the quality of the extracted watermark is discussed in each case.
In this article, we have concentrated on selecting the reliable path from source to destination in a mobile ad-hoc network (MANET) framework using Dempster-Shafer Theory (DST) of evidence. The belief and plausibility ...
详细信息
ISBN:
(纸本)9780769535135
In this article, we have concentrated on selecting the reliable path from source to destination in a mobile ad-hoc network (MANET) framework using Dempster-Shafer Theory (DST) of evidence. The belief and plausibility functions are used here for calculating the suitable path for sending data packet from source to destination selecting the proper neighborhood oil the basis of radio range of the source node. The radio range is determined depending on the Proximity Index and birth rate and death rate of the neighborhood nodes of the source node. Whenever data packet is changing hops within source and destination some credit and penalty are introduced to the next and previous hops respectively. In the concluding section of the present article a measure of gain (in delay) has been introduced for comparison of the existing methods vis-a-vis that of the proposed one.
Large open source software repositories are polluted with incomplete or inadequately functioning projects having scarce or poor descriptions. Developers often search these repositories to find sample applications cont...
详细信息
ISBN:
(纸本)9781605582283
Large open source software repositories are polluted with incomplete or inadequately functioning projects having scarce or poor descriptions. Developers often search these repositories to find sample applications containing implementations of relevant features. While relying on software search engines that retrieve germane applications based on direct matches between user queries and words in the descriptions (or source code files), it is difficult to warrant that retrieved applications contain functionality described by their authors in project summaries. We propose a novel approach called K9 that helps users evaluate if recommended applications implement functionality, which is described by the authors in project summaries. Using programmers' queries describing high-level concepts (e.g., sql server, floating toolbar, or smart card), K9 uses information retrieval and program analysis techniques to evaluate recommended applications based on how they implement these high-level concepts. We conjecture that K9 will effectively support developers in evaluating functionality of the retrieved applications. Copyright 2008 ACM.
The rapid progress of Information & Telecommunication technology, in particular internet technology, has also brought about many changes in educational forms. e-learning system utilizing the internet has created t...
详细信息
The rapid progress of Information & Telecommunication technology, in particular internet technology, has also brought about many changes in educational forms. e-learning system utilizing the internet has created the open educational environment which can overcome restrictions in time and space. The system can provide students with instruction tailored to each of them, covering such aspects as attendance, learning, questioning/answering, homework and test. Despite many strong points of E-learning system, however, it involves quite a few problems to be rectified. Hence the need of Learning Management system(LMS) is increasing, which is aimed at assisting students of varied levels to conduct self-directed learning in an efficient way by using educational contents.
Information-seeking has been recognized as a core subtask in software maintenance. While much of the research in this area attempts to identify the information sought by programmers, the work to date has been typicall...
详细信息
Information-seeking has been recognized as a core subtask in software maintenance. While much of the research in this area attempts to identify the information sought by programmers, the work to date has been typically based on pre-defined information types limiting the potential for new information types to arise. Hence, this paper presents a small empirical study on open-source programmer mailing lists, to iteratively refine a schema of the information that programmers seek based exclusively on an analysis of these programmers’ naturalistic communication. Subsequently it places this schema in the context of the existing literature in the area. The analysis was undertaken on information requests in 288 emails, taken from 2 open source project mailing lists; The Java Bean Scripting Framework (BSF)[1] and the Java Development Tool (JDT)[2]. This work produced a preliminary schema of 3 main categories divided into 18 sub categories.
In this paper, we propose a new Link-Based Hamiltonian Cycle Protection (LBHCP) scheme for tolerating the single-link failure in WDM optical networks. From theoretical analysis and simulation results, we can clearly s...
详细信息
作者:
Kurdi, MazenBooz, George W.Department of Chemistry and Life Sciences
College of Sciences and Computer Engineering Holy Spirit University of Kaslik Jounieh Lebanon Division of Molecular Cardiology
Cardiovascular Research Institute The Texas A and M University System Health Science Center College of Medicine Scott and White Hospital The Central Texas Veterans Health Care System Temple TX United States
An important class of distributed Trust-based solutions is based on the information sharing. A basic requirement of such systems is the ability of participating agents to effectively communicate, receiving and sending...
详细信息
暂无评论