As one foundational technology of cloud computing, services computing is playing a critical role to enable provisioning of software as a service (SaaS). However, how to effectively and efficiently discover proper avai...
详细信息
For a long time, the fault diagnosis and assessment for power transformer is a quite complex and difficult problem. In this paper, we propose a transformer fault diagnosis method based on fuzzy theory. The dissolved g...
详细信息
Since the investors often react to news and consequently make stock prices move, financial news has an impact on stock prices. However, the price adjustment process is a complex one. In this paper, a statistical learn...
详细信息
This paper proposes a novel idea of reducing the complexity of processing magnanimous information in content services by making use of user behaviour information. A practical approach and an empirical case are elab.ra...
详细信息
For parallel applications running on high-performance clusters, performance is usually satisfied without paying much attention to energy consumption. In this paper, we develop a new scheduling algorithm called Energy ...
详细信息
PageRank has been widely used in ranking retrieval results on the web, finding the top influential papers in citation networks or detecting valuable users in online social networks. However, in practice, it is usually...
详细信息
Content-aware image retargeting is a technique that can flexibly display images with different aspect ratios and simultaneously preserve salient regions in images. Recently many image retargeting techniques have been ...
详细信息
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ...
详细信息
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering the key schedule and the time-memory tradeoff approach. New attacks improve the best known meet-in-the-middle attacks on reduced AES presented at *** reduce the time complexity of attacks on 7-round AES-192 and 8-round AES-256 by a factor of at least 28. Moreover,the distinguisher can be exploited to develop the attack on 8-round AES-192.
Similarity matching is one of the most important operations for data mining over time series. But previous works mainly focus on certain data. With the development of the internet of things and sensor networks, uncert...
详细信息
The crosscutting phenomena has been found at architectural level. Using aspects, AOP effectively solves the code tangling problem produced by the crosscutting phenomena at code level. This paper presents an approach t...
详细信息
暂无评论