To generate a multi-document extractive summary, the measurement of sentence relevance is of vital importance. Earlier work, exploring statistics of textual terms at the word (surface) level, faces the problem that th...
详细信息
A copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed in this paper. In this method, the original image is lossless and the watermark is robust to malicious attacks i...
详细信息
This paper presents an adaptive routing protocol named Adaptive Route Selection in Mobile Ad Hoc Networks (ARSMA). The aim of this work is to improve the delivery ratio and reduce the end-to-end delay. In the route re...
详细信息
ISBN:
(纸本)9781424443376
This paper presents an adaptive routing protocol named Adaptive Route Selection in Mobile Ad Hoc Networks (ARSMA). The aim of this work is to improve the delivery ratio and reduce the end-to-end delay. In the route request phase, source nodes will discovery multiple routes to the destination node, one for primary path, and the others for the backup paths. During the discovery procedure, each node will estimate the link expire time by way of the moving speed and direction of the precursor node. When a link breakage is about to occur, source node will try to switch the transmission to the backup route. The simulation result shows that ARSMA is able to improve the delivery ratio and reduce the end-to-end delay.
Steganography is a study to hide secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. In this paper, a novel scheme is proposed...
详细信息
The workshop on architectures and platforms was organized at AMIN as a collaborative effort involving 4 projects (ASTRA, DAIDALOS, PERSIST, and Ubicollab). These projects address, in different ways, the challenge of d...
详细信息
ISBN:
(纸本)9783642106064
The workshop on architectures and platforms was organized at AMIN as a collaborative effort involving 4 projects (ASTRA, DAIDALOS, PERSIST, and Ubicollab). These projects address, in different ways, the challenge of developing platforms for Ambient Intelligence. The workshop aimed at bringing together the different perspectives gained in these projects, opening the discussion to the wider research community. In particular, focus has been on comparing and discussing lessons learned in the development of specific vs. generic platforms for AMI.
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications ...
详细信息
ISBN:
(纸本)9781605583945
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ciphertext satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We further extend the construction to allow multiple conditions with a slightly higher overhead. Copyright 2009 ACM.
The current Internet did not define any inherent management constructs and mechanisms;such concepts were added after networking standards and architectures were constructed. This also influenced network management for...
详细信息
ISBN:
(纸本)9781424443376
The current Internet did not define any inherent management constructs and mechanisms;such concepts were added after networking standards and architectures were constructed. This also influenced network management for other types of networks. This paper is the first in a series that explores concepts for a new autonomic approach to network management that can be used for current and next generation networks as well as for the Future Internet.
The existing sequential pattern mining algorithms fall into two categories. One is the candidate-generation-and-test approach such as GSP, and the other is the pattern-growth approach such as PrefixSpan. Both GSP and ...
详细信息
暂无评论