The paper presents a new trust-based access control model. In this model, the service provider registers trust threshold and trust weight on the trust server. Only the service requester's trust value exceeds the t...
详细信息
Education resources network is a typical complex network. On the basis of introduction to the concepts of complex network, it analyzed the current situation of complex networks and its application in education resourc...
详细信息
To improve the accuracy of plant leaf area, a new measurement method of plant leaf area based on Snake model was adopted in this study. In this paper, we captured leaf counter with improved Snake model, built up 8-dir...
详细信息
To solve the problem of the typical histogram equalization method used to enhance cardiac coronary artery angiography images, a novel method based on histogram equalization is proposed. Firstly, the Fuzzy C-Means clus...
详细信息
The paper proposes a method for automatically identifying plants by computer based on the analysis that the plants and culture media have different RGB color coordinates and HSI color coordinates scales. The method ca...
详细信息
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th...
详细信息
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is that,when the output of each step satisfies our condition,the message m can collide with m'= m + Δm,where Δm =(0,0,0,0,231,0,...,0).There is only one bit difference between m and m'.Two pairs of collision examples for HAVAL-128 are *** order to improve the probability of collision,we use four tricks of message *** attack's running time is less than 225.83 2-pass HAVAL computations,which is the best result for one-bit collision of HAVAL so far.
Wireless sensor networks have been widely used in many areas, and the network channel allocation depends on the Medium Access Control (MAC) protocol, so, it is critical to the performance of wireless sensor networks (...
详细信息
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info...
详细信息
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ...
详细信息
For mining sequential patterns on massive data set, the distributed sequential pattern mining algorithm based on MapReduce programming model and PrefixSpan is proposed. Mining tasks are decomposed to many small tasks,...
详细信息
暂无评论