Developing vehicles with the Internet of Thing technology including driver health monitoring systems, driver safety systems, and accident prevention has drawn the attention of researchers in the last few years. The mo...
详细信息
Optical speed sensors based on the spatial frequency filter method are a proven technology that offer high measurement accuracy over a wide speed range. Newly developed variants also enable measurements at very low sp...
详细信息
The paper gives an overview of research devoted to developing a semi-automatic methodology of building a semantic model of medical diagnostic knowledge. The methodology is based on natural language processing methods ...
详细信息
In this paper we present the LearnLib, a library for automata learning and experimentation. Its modular structure allows users to configure their tailored learning scenarios, which exploit specific properties of the e...
详细信息
ISBN:
(纸本)1595931481
In this paper we present the LearnLib, a library for automata learning and experimentation. Its modular structure allows users to configure their tailored learning scenarios, which exploit specific properties of the envisioned applications. As has been shown earlier, exploiting application-specific structural features enables optimizations that may lead to performance gains of several orders of magnitude, a necessary precondition to make automata learning applicable to realistic scenarios. Copyright 2005 ACM.
Notice of Violation of IEEE Publication Principles "The Use of Cryptography in Network Security" by Zafar Jafarov in the Proceedings of the 9th International Conference on Application of information and Comm...
Notice of Violation of IEEE Publication Principles "The Use of Cryptography in Network Security" by Zafar Jafarov in the Proceedings of the 9th International Conference on Application of information and Communication Technologies (AICT), October 2015 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Network Security Using Cryptographic Techniques" by Sumedha Kaushik, Ankur Singhal in the International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 12, December 2012 Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.
The distributed evaluation of functional programs and the communication between computational nodes require high-level process description and coordination mechanism. This paper presents the D-Clean high-level functio...
The distributed evaluation of functional programs and the communication between computational nodes require high-level process description and coordination mechanism. This paper presents the D-Clean high-level functional language, which supports the distributed computation of Clean functions over a cluster. The lazy functional programming language Clean is extended by new language elements in order to achieve parallel features. The distributed computations of functions are expressed in the form of process-networks. D-Clean introduces language primitives to control the dataflow in a distributed process-network. A process scheme defines a partial computation graph, where the nodes are functions to be evaluated and the edges are communication channels. The computational nodes are implemented as statically typed Clean programs. The schemes are parameterized by functions, types and data for defining process networks. D-Clean is compiled to an intermediate level language called D-Box. The D-Clean generic constructs are instantiated into D-Box expressions. D-Box is designed for the description of the computational nodes. D-Box expressions hide implementation details and enable direct control over the process-network. The asynchronous communication is based on language-independent middleware services. The present paper provides the syntax and the informal semantics of both coordination languages. To illustrate the definition of a distributed functional computational pattern using the D-Clean language a farm skeleton running example is presented.
The diagnosis of possible faults in railway signaling systems is an important issue to provide safe travel and transportation in railways. Signaling system designers have to consider the possible faults which may occu...
详细信息
the article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
The paper formulates an algorithm for searching the optimal temperature regime of the catalytic process in an ideal mixing reactor. The problem of optimal control of the catalytic process is formulated in a general fo...
详细信息
暂无评论