Two of the most significant factors in the success of today's system-on-chip (SoC) designs are the ability to deliver efficient access to off-chip high speed memory and the ability to be compatible with several di...
详细信息
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad...
详细信息
In an attempt to enhance the efficiency of searching Web services across multiple sources, a discovery approach based on information retrieval technology was proposed, which was designed for multi-source web service. ...
详细信息
In an attempt to enhance the efficiency of searching Web services across multiple sources, a discovery approach based on information retrieval technology was proposed, which was designed for multi-source web service. It could not only overcome the barrier among different publication strategies, but also support integrated management of diverse service description and the semantic information. The limitations of related work were analyzed and an original service discovery framework MWSD(Multi-source Web Service Discovery) was proposed. The function of each module was introduced in detail. Those mappings between different types of service description were illustrated. Results show that MWSD is capable of crawling multiple sources and establishing unified Web services' repository. It can support the complex semantic management of Web services and be applied to the discovery of the public Web services on the Internet.
The nature of mobile ad hoc networks make the routing is highly dependent on cooperate behavior between nodes, and using reputation mechanism can enforce cooperation among the nodes to prevent selfish behavior. This a...
详细信息
The nature of mobile ad hoc networks make the routing is highly dependent on cooperate behavior between nodes, and using reputation mechanism can enforce cooperation among the nodes to prevent selfish behavior. This article proposes a functional ontology for reputation routing mechanisms base on node behavior. In this ontology, the functional structures and conceptualize that compose the reputation routing mechanism are identified. At the end of this paper, an ontological view of routing reputation query also has been proposed to describe the inner relationships of the reputation routing discovery, which try to prove the dependability of routing relationships that established between independent nodes based on their routing reputation.
Information flow security has been an important security requirement of existing operating systems, especially for distributed applications. We are interested in protecting information flow security with an eye to inf...
详细信息
This paper presents a novel color face recognition approach based on 2DPCA. A matrix-representation model, which encodes the color information directly, is proposed to describe the color face image. The matrix-represe...
详细信息
This paper presents a novel approach for replacing textures of specified regions in the input image and video using stretch-based mesh optimization. The retexturing results have the similar distortion and shading effe...
详细信息
The performance and reliability of component-based software architectures rely fundamentally on the quality of the components and the configuration that the system is composed. This paper analysis the assembly pattern...
详细信息
The performance and reliability of component-based software architectures rely fundamentally on the quality of the components and the configuration that the system is composed. This paper analysis the assembly patterns and interaction behaviors of components at first, then an ontology of the component¿s operation is proposed, which the interactions of components are formalized and abstracted. Based on the in-depth analysis of the component assembly patterns, this paper try to define the assembly patterns in architecture on process algebra theory, which can establish a practical means of describing and analyzing the component assembly pattern in the software architectures. Furthermore, the architecture algebra model has been built, which can set a theoretical foundation for the further research on analysis and validation of architecture.
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, Signed Integer Exponential-Golomb Coded (SE) Encryption Algorithm and Context-A...
详细信息
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres...
详细信息
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper presents an efficient algorithm based on the malefactor's access level vector in every host of the network to generate a reduced attack graph in polynomial compute complexity. In this algorithm, the state space is reduced to O(nm) , where n is the number of nodes and m is the whole number of vulnerabilities in the network. We also present a standard method to generate attack templates from the vulnerabilities.
暂无评论