A dichotomic transformation is considered for a harmonic perturbing signal, which is based on an additive random method of determining the readings. Elementary expressions are derived for the reading distributions, an...
A pragmatic framework is available for maintaining reliable system operations in the context of an unbundled open access environment, while fostering a comp.titive supply/demand market. The proposed framework shows ho...
详细信息
A pragmatic framework is available for maintaining reliable system operations in the context of an unbundled open access environment, while fostering a comp.titive supply/demand market. The proposed framework shows how incentives will meld a decentralized, comp.titive profit-driven market and a centrally directed services market together into a reliable free market.
The relative flexibility is estimated quantitatively in a comp.rison of distributed systems having rigidly set command intervals for the changes in operating mode. The method is used in comp.ring redundant real-time d...
A frequency-domain method a proposed for identifying a nonlinear object or system whose structure or behavior allows one to use a Hammerstein model The static input-output characteristic is decomp.sed to determine the...
This paper deals with load balancing of parallel algorithms for distributed-memory comp.ters. The parallel versions of BLAS subroutines for matrix-vector product and LU factorization are considered. Two task partition...
详细信息
This paper deals with load balancing of parallel algorithms for distributed-memory comp.ters. The parallel versions of BLAS subroutines for matrix-vector product and LU factorization are considered. Two task partitioning algorithms are investigated and speed-ups are calculated. The cases of homogeneous and heterogeneous collections of comp.ters/processors are studied, and special partitioning algorithms for heterogeneous workstation clusters are presented.
In this paper, we present a cryptanalytic attack on large RSA secret exponents. Let e and N denote the public exponent and the modulus of the RSA scheme, respectively. This attack uses the continued fraction algorithm...
详细信息
In this paper, we present a cryptanalytic attack on large RSA secret exponents. Let e and N denote the public exponent and the modulus of the RSA scheme, respectively. This attack uses the continued fraction algorithm to find an estimate of a fraction which involves the secret exponent d from a known close enough estimate of a fraction e/N. According to our proposed attack, the large secret exponent d can be discovered if e < N and 0<(λ(N)-d)<4√N . Furthermore, if the secret exponent is close to λ(N)/2, or even if it is close to some other critical value, it will be discovered.
CAIR-2 from the Korea Advanced inst.tute of sci.nce and Technology (KAIST) placed first in the Office Delivery event at the 1995 Robot comp.tition and Exhibition, held in conjunction with the Fourteenth International ...
详细信息
CAIR-2 from the Korea Advanced inst.tute of sci.nce and Technology (KAIST) placed first in the Office Delivery event at the 1995 Robot comp.tition and Exhibition, held in conjunction with the Fourteenth International Joint Conference on Artificial Intelligence (IJCAI-95). CAIR-2 is a totally self-contained and autonomous mobile robot, and its control architecture incorporates both behavior-based and planner-based approaches. In this article, we present a short description of CAIR-2's hardware, system and control architecture, real-time vision, and speech recognizer.
In 1989, Kurosawa proposed a key changeable ID-based cryptosystem and a corresponding signature scheme. In Kurosawa's scheme, the legal users can change their public parameters by themselves without the help from ...
详细信息
In 1989, Kurosawa proposed a key changeable ID-based cryptosystem and a corresponding signature scheme. In Kurosawa's scheme, the legal users can change their public parameters by themselves without the help from a trusted third party. However, Kurosawa's digital signature scheme is insecure and impractical. The purpose of this paper is to point out the described problems and then to suggest a simple remedy, which will enable the modified ID-based digital signature to be more secure and practical.
comp.ter vision is an important research area where comp.tationally-intensive and time critical problems need to be solved routinely. This paper described some parallel algorithms for image processing and comp.tationa...
comp.ter vision is an important research area where comp.tationally-intensive and time critical problems need to be solved routinely. This paper described some parallel algorithms for image processing and comp.tational geometry applicable to the held of 'robot vision' which was developed using PACE parallel comp.ter, a loosely coupled message passing MIMD machine, designed and developed at the Advanced Numerical Research & Analyses Group, Hyderabad.
An optical fiber grating demultiplexer-multiposition switch having seven demultiplexing channels and six position-switching channels is demonstrated. This device consists of a unique fiber array in which 42 output fib...
详细信息
An optical fiber grating demultiplexer-multiposition switch having seven demultiplexing channels and six position-switching channels is demonstrated. This device consists of a unique fiber array in which 42 output fibers are aligned radially around an input fiber, a single gradient-index (GRIN)-rod lens and a rotatable blazed reflection grating. In this device, seven demultiplexing channels can be switched to six different directions by rotating blazed reflection grating. Therefore, this device can realize total transmission channels of 42. The device had a working band of 0.64-0.88 mu m, a channel separation of 35-42 nm and a 3 dB band width of 18-22 nm. The deviations of center wavelengths among the switching channels were suppressed less than 3 nm.
暂无评论