Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they give two solutions that are applicable for the case k>m/2,in Nikov et al.'s scheme,they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k,in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
The design of a finite impulse response (FIR) digital filter is essentially a multi-parameter and multi-objective optimization problem, different optimization techniques can be utilized to minimize the latency in the ...
详细信息
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe...
详细信息
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) together. By introducing generalized computing into knowledge management, this paper presents a kind of knowledge decision-making model, and a kind of control model of enterprise knowledge flow.
Wireless senor networks have more and more applications while fundamental constraint still exists, such as limited power supply and bandwidth. When the sensing signal exhibits spare, we can sampling only a part of sig...
详细信息
Nowadays, most of the data traffic on the Internet is audio and video content, such as streaming media, Internet TV and so on. High-quality interactive multimedia content requires a high-quality real-time network. The...
详细信息
Wireless communication system plays a more and more important role in many fields. Wireless network using traditional AODV algorithm only considers the minimal hop of all routes and can not meet specific QoS requireme...
详细信息
The routing optimized problem in HAPs-Satellite integrated network is focused on this paper. A novel routing algorithm(AR-HS) based on the swarm intelligence by changing the pheromone updating strategy is proposed. In...
详细信息
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b...
详细信息
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation by using the similar method in an English SRL system. We also explore dependency-based predicate analysis in Chinese SRL. We perform our experiments on two datasets. Our results show that dependency-based Chinese SRL is not only feasible but also superior to the constituent-based SRL in some respects.
暂无评论