In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbol...
详细信息
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching t...
详细信息
ISBN:
(纸本)9788988678213
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching time logic for ZIAs is presented. We then give an algorithm for model checking this logic on ZIAs with finite domain. Furthermore, we present a mu-calculus logic for ZIAs, and give a model checking algorithm for this logic.
Combing with specific temporal information of video, this paper proposes a kind of video object tracking method based on normalized cross-correlation matching by using the high precision characteristics of normalized ...
详细信息
Combing with specific temporal information of video, this paper proposes a kind of video object tracking method based on normalized cross-correlation matching by using the high precision characteristics of normalized cross-correlation image matching. Firstly, extract video background from the temporal information of video. Then, acquire the region of moving object using background subtraction. Lastly, carry out related matching and updating towards the extracted moving object by means of normalized cross-correlation. Experimental result shows that the adaptability of our method is strong, which can well solve the tracking problems when tracking objects have scale transform. It also has good anti-interference ability and robustness, and can track moving objects accurately under the condition of noise interference, lens dithering and background mutation.
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement ...
详细信息
ISBN:
(纸本)1891706268
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement relation between ZIAs with finite domain.
Image segmentation based on Bee Colony Algorithm (BCA) and fuzzy entropy is presented in this paper. The fuzzy entropy function is simplified with single parameter. The BCA is applied to search the minimum value of fu...
详细信息
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak...
详细信息
ISBN:
(纸本)9788988678251
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leakage-resilient IB-HPS based on a simple assumption and also prove its security by the variant of dual system encryption. Then, based on our IB-HPS scheme, we construct directly an efficient leakage-resilient identity-based encryption(IBE) scheme in the model.
The rapid growth in the development of Internet-based information systems increases the demand for natural language interfaces that are easy to set up and maintain. Unfortunately, the problem of deep understanding nat...
详细信息
Peer-to-peer (P2P) systems have become increasingly popular for a variety of applications in Internet for their several advantages over traditional client/server architecture. And they also generate most traffic in al...
详细信息
Peer-to-peer (P2P) systems have become increasingly popular for a variety of applications in Internet for their several advantages over traditional client/server architecture. And they also generate most traffic in all regions around the world. Thus, the ISPs and all network administrators have a mutual interest in limiting P2P traffic. Before doing these, understanding and analyzing their traffic is necessary. In this paper, we inside analyze BitTorrent (BT) traffic with a special modified Vuze client in a stub network. Preliminary results indicate that among all BT clients we have detected, the most popular two outside China are μTorrent and Azureus. They have over 50%-86% market share. But in China, the Xunlei client is almost the No. 1, but is can not support the Message Stream Encryption (MSE) protocol. And there are also lots of proprietary or unknown BT clients can not support the MSE protocol, and some users looks like to be unwilling to use it. The proportion in China is bigger. And some BT clients may upgrade or downgrade the encryption level independently, disobeying the user configuration of MSE. All BT clients relied excessively on trackers, especially in China. Moreover, Distributed Hash Table (DHT) does not play the proper role as we expected. Although BT systems can use both TCP and UDP protocols for transportation, the TCP protocol is the dominant one by 99%. Finally, we investigate the port used by all peers. Unexpectedly, the most popular used port is 6881 outside China and 80 in China. And in China, small port numbers are often used.
Peer-to-peer (P2P) systems enable a wide range of important, scalable and reliable services such as file sharing, voice-over-IP (VoIP) and video streaming. And they also generate most traffic in all regions. Excessive...
详细信息
ISBN:
(纸本)9781424451623;9781424451616
Peer-to-peer (P2P) systems enable a wide range of important, scalable and reliable services such as file sharing, voice-over-IP (VoIP) and video streaming. And they also generate most traffic in all regions. Excessive P2P traffic can cause significant network management problems because these systems are notoriously greedy with regard to bandwidth consumption. As a result, the ISPs and all network administrators have a mutual interest in shaping, blocking or otherwise limiting P2P traffic. Before doing these, understanding, analyzing and identifying P2P traffic is necessary. In this paper, we inside analyze BitTorrent (BT) traffic with a special modified Vuze client in a stub network. Preliminary results indicate that among all forty-nine BT clients we have detected, the most popular two are μTorrent and Azureus. They have over 50%-86% market share. And about one-third of all clients are the legacy or proprietary client, which have no capacity of supporting the Message Stream Encryption (MSE) protocol. Further, the BT clients relied excessively on trackers, because near half peers' information come from trackers, especially in the beginning of new mission. Moreover, Distributed Hash Table (DHT) did not play the proper role as it is expected. Finally, we unexpectedly find that the most popular used port is still 6881, but it is only 2.24%.
Terrain LOD algorithm is a dynamic and local dough sheet subduction algorithm. On the basis of the research on traditional quadtree algorithm, this paper proposed a new terrain LOD algorithm using quadtree. On deviati...
详细信息
暂无评论