To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-an...
详细信息
To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-analyzing for the deduplication methods are proposed. According to this method, the data object is divided into non-overlapped mini chunks based on its content firstly, and then a variable-size sliding window, which uses the mini chunks as its basic unit of movement, is used to identify the duplicate data blocks. Further more, different chunking strategies are used on the data changing regions and the non-changing regions respectively. The theoretical analyzing indicates that this method can achieve satisfying deduplication performance even with a relatively larger expected chunk size, because it can reduce the metadata cost effectively and identify smaller duplicate data blocks. The experimental results on real data show that the average compression ratio of the method can be increased 13.02% than SWC, which has the optimal deduplication performance among the current deduplication methods. Moreover, the average time cost of this method is reduced 97.45% than SWC. This method is suitable for the applications of mass data backup in network environment, which have more rigorous requirements on the deduplication performance and the time cost.
Based on the adoption of dependency grammar to analyze the structure of Chinese sentences, this paper suggests to analyze Chinese sentence with semantic dependency method. The correlation between words and phrases can...
详细信息
Based on the adoption of dependency grammar to analyze the structure of Chinese sentences, this paper suggests to analyze Chinese sentence with semantic dependency method. The correlation between words and phrases can be gotten by way of analysis and calculation of the similarity between the words and phrases from How net, and then the formula to analyze the similarity between sentences can be designed. Fully considering the relationship between structure and semantics of Chinese sentences, this methodology can be adopted to analyze the correlation between topics and to categorize them. It has certain prospect in the field of Chinese language research, personalized online education and recommendation of resources for the users.
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale Integration (VLSI). The proposed algorit...
详细信息
Bent functions, which have the highest nonlinearity, play an important role in coding theory, sequence design and cryptography. On the basis of a given 2n-variable Maiorana-McFarland (M-M) Bent function and the 2n ...
详细信息
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ba...
详细信息
Alignment of RNA structures is very important in biological research. Similar to pair-wise sequence alignment, there is often disagreement about how to weight matches, mismatches, indels and gaps when comparing two RN...
详细信息
Alignment of RNA structures is very important in biological research. Similar to pair-wise sequence alignment, there is often disagreement about how to weight matches, mismatches, indels and gaps when comparing two RNA structures. Here, we develop a visual tool for computing parametric alignment of two RNA structures. With this tool, users can see explicitly and completely the effect of parameter choices on the optimal alignments of RNA structures. The software is available for academic use (http://***/~lwang/software/ParaRNA/).
A DIDS(Distributed Intrusion Detection System) named as F-DIDS is built to defend against flooding DoS(Denial of Services) attacks in the paper. F-DIDS is composed of F-IDSes which are settled in nodes who need to be ...
详细信息
Conventional chaotic hash functions adopt a number of iterations of chaotic map and a large number of floating point calculations, thus the implement of these hash functions require a great many resources. This kind o...
详细信息
Conventional chaotic hash functions adopt a number of iterations of chaotic map and a large number of floating point calculations, thus the implement of these hash functions require a great many resources. This kind of hash functions are hard to implement on the equipments which have limited resources, such as mobile phone and smart cards. In this paper, a novel hash algorithm is proposed which combines the advantage of both chaotic system and Tandem-DM compression structure. The proposal follows the usual Merkle-Damgard construction while compression function adopts the Tandem DM compression structure. Block cipher used in the Tandem DM compression function is replaced by the discretized chaotic map network (DCMN). The proposed hash function runs in the integer field and needs fewer computations. Compared with other chaotic hash functions, the algorithm inherits the efficiency of the conventional hash function while improves the security of hash function. Theoretical and simulation results show that the proposed hash algorithm has strong diffusion and confusion capability and good collision resistance, as required by practical hash functions.
We study the problem of synchronization-based parameters identification of dynamical systems from time series. Through theoretical analysis and numerical examples, we show that some recent research reports on this iss...
详细信息
We study the problem of synchronization-based parameters identification of dynamical systems from time series. Through theoretical analysis and numerical examples, we show that some recent research reports on this issue are not perfect or even incorrect. Long-time full rank and finite-time full rank conditions of Gram matrix are pointed out, which are sufficient for parameters identification of dynamical systems. The influence of additive noise on the proposed parameter identifier is also investigated. The mean filter is used to suppress the estimation fluctuation caused by the noise.
With the spread of RFID technology, Lots of authentication schemes for RFID have been proposed to provide user privacy and security. However, most of these protocols are limited in scalability, in which the server'...
详细信息
With the spread of RFID technology, Lots of authentication schemes for RFID have been proposed to provide user privacy and security. However, most of these protocols are limited in scalability, in which the server's efficiency declines rapidly while the number of tags grows. In support of scalability, some efficient schemes are suggested recently. Unfortunately, these previous schemes have various shortcomings. This paper presents a new efficient RFID authentication scheme with strong security and privacy. The proposed scheme is suitable for managing a large number of tags, for taking constant time to authenticate a tag by using hash chain. Meanwhile, this scheme can resists tag information leakage, tag location tracking, backward traceability, forward traceability, replay attacks, denial of service attacks and other common attacks. The scheme also requires less tag-side computation than existing protocols and requires less communication.
暂无评论