Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w' if and only if w is close enough to w...
详细信息
Range ambiguity in synthetic aperture radar (SAR) imaging primarily arises from scattered energy of bright targets out-side the interested region. So to reduce the ambiguity, we need to identify these targets addition...
详细信息
ISBN:
(纸本)9781467311601
Range ambiguity in synthetic aperture radar (SAR) imaging primarily arises from scattered energy of bright targets out-side the interested region. So to reduce the ambiguity, we need to identify these targets additionally, which yields an ill-posed problem. To find a feasible solution where the range ambiguity can be sufficiently reduced, we propose in this paper a new method using compressed sensing, a theory which tells when sparse signal can be reconstruct from undetermined linear system, by observing that the recognizable targets are approximately sparse in the ambiguous range zones. Therefore, it is possible to reconstruct the main region and identify the ambiguous targets simultaneously. The simulation results demonstrate the validation of the proposed method.
parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this *** framework is composed of two parts:(1) construction of the stiffness matrix and right hand side vector; (2) a parall...
parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this *** framework is composed of two parts:(1) construction of the stiffness matrix and right hand side vector; (2) a parallel sparse solver.
This paper presents a mixed deterministic model for coreference resolution in the CoNLL-2012 shared task. We separate the two main stages of our model, mention detection and coreference resolution, into several sub-ta...
详细信息
ISBN:
(纸本)9781627484046
This paper presents a mixed deterministic model for coreference resolution in the CoNLL-2012 shared task. We separate the two main stages of our model, mention detection and coreference resolution, into several sub-tasks which are solved by machine learning method and deterministic rules based on multi-filters, such as lexical, syntactic, semantic, gender and number information. We participate in the closed track for English and Chinese, and also submit an open result for Chinese using tools to generate the required features. Finally, we reach the average F1 scores 58.68, 60.69 and 61.02 on the English closed task, Chinese closed and open tasks.
security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p...
详细信息
security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids
There are a number of leaf recognition methods, but most of them are based on Euclidean space. In this paper, we will introduce a new description of feature for the leaf image recognition, which represents the leaf co...
详细信息
NAND Flash memories have rapidly emerged as a storage class memory such as SSD (Solid State Disk), CF (Compact Flash) Card, SD (Secure Digital Memory) Card. Due to its distinct operation mechanisms, NAND Flash memory ...
详细信息
NAND Flash memories have rapidly emerged as a storage class memory such as SSD (Solid State Disk), CF (Compact Flash) Card, SD (Secure Digital Memory) Card. Due to its distinct operation mechanisms, NAND Flash memory suffers from erase/program endurance, data retention and program/read disturbance problems. Specifically, erase and program operation keeps in developing bad blocks during the lifetime of memory chips. Bad blocks are blocks that contain faulty bits but the ECC (Error Correction Code) algorithm cannot correct them. Although wear leveling tries to balance the erase/program operations on different blocks so that all blocks can wear out at a similar pace, new bad blocks still inevitably *** propose an in-field testing technique which takes some pages in a block as predictors. Due to wear out faster than the other pages, the predictors will become bad before the other pages in the block become bad. The further questions are (1) how to detect those wearing fast pages so as to use them as predictors, (2) how many predictors are needed to achieve a satisfactory prediction accuracy, (3) misprediction will result in what negative impact on performance and endurance.
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera...
详细信息
Forward secure threshold signature plays an important role in distributed signature. In order to enhance the security and efficient of the forward secure threshold signature, a new forward secure threshold signature i...
详细信息
Forward secure threshold signature plays an important role in distributed signature. In order to enhance the security and efficient of the forward secure threshold signature, a new forward secure threshold signature is proposed. The proposed scheme achieves not only the forward security but also the backward security for the threshold signature. The disclosure of group secret key or individual secret keys can not threat the signature security of all time period. Instead of signing the whole document, the group members only sign a smaller part by themselves in the scheme. The size of a group signature is equivalent to that of any individual signature. Such an approach achieves the justification of labor-division and responsibility-sharing inherent in the group works. Moreover, the bandwidth of data transmission for group signature construction can be further reduced. Analysis shows that the proposed scheme is more secure and efficient.
Delay/disruption tolerant network adopts a storecarry-and-forward mechanism, of which all the participants are assumed to cooperate with one another in message delivery, to overcome the challenges of the intermittent ...
详细信息
暂无评论