The physical topology discovery is one of the difficulties in network measurements. This paper proposes a novel algorithm for discovering the physical topology of networks based on Spanning Tree Protocol (STP). Our al...
详细信息
To evaluate the security situation of hierarchical network, a novel evaluation algorithm based on the method of constructing a security risk function is proposed. The proposed algorithm is the aggregation of qualitati...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement *** this mechanism a single user,whose attributes satisfy the predicate,endorses the *** signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the *** security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
It is generally believed that Zipf's law is well applied for Web objects. However, as OSNs prevail and Internet begins to concentrate more and more on individuals, many researchers report that request frequency of...
详细信息
Analyzing factors of affecting Web Service invocation performance is a hot topic. Among the factors, service interface complexity is a key one investigated by much research work. However, these researches mainly analy...
详细信息
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm...
详细信息
ISBN:
(纸本)9781612847719
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm of topic elements is proposed. Firstly, noise filtering and Chinese word segmentation on the original corpus are executed. Secondly, the identifying and extracting method in group of mixed turn is used to extract the topic elements, such as time, place and figure. Finally, performance evaluation of identification recall, identification accuracy and extraction accuracy are achieved. The experimental results show the effectiveness of the algorithm.
Digital rights management (DRM) is indispensable to prevent various kinds of illegal content usage. In this paper, we present a Digital interface-based DRM scheme (DI-DRM) for digital cinema, which can provide a new m...
详细信息
Digital rights management (DRM) is indispensable to prevent various kinds of illegal content usage. In this paper, we present a Digital interface-based DRM scheme (DI-DRM) for digital cinema, which can provide a new multi-interfaces oriented DRM solution for dig- . ital cinema. The authentication protocol and the encryption algorithm are described in detail. The two kinds of digital interfaces-based DRM prototype system are developed. security and performance analysis show the proposed scheme has several advantages. First, it is more secure than the existing scheme. Second, it is supported more rights, including the downstream devices. Finally, the cost of the chip based on DI-DRM is low. The scale of SOC application scheme is only 1/3 to 1/6 of the existing DTCP.
Quantized projection technology (QP) is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-sided additive embedder. In this article, the concept...
详细信息
Quantized projection technology (QP) is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-sided additive embedder. In this article, the concept of sign quantized projection (SQP) is proposed, which differs from the conventional QP when working as a single-sided embedder. Theoretical analysis reveals that SQP has the same probability of miss and probability of false alarm as QP. Also, the document-to-watermark ratio (DWR) of SQP is less than its counterpart of QP by lOlg(1+ γ) dB.
It is now well-known that one can reconstruct sparse or compressible signals accurately from a very limited number of measurements. This technique is known as "compressed sensing" or "compressive sampli...
详细信息
It is now well-known that one can reconstruct sparse or compressible signals accurately from a very limited number of measurements. This technique is known as "compressed sensing" or "compressive sampling" (CS). A basic requirement of CS is that a signal should be sparse or it can be sparsely represented in some orthogonal bases. Based on the Peak Transform (PT) and modulus maximum of wavelet coefficients, a new algorithm was proposed for the signals that are non-sparse themselves and can not be sparsely represented by wavelet transform such as the Linear Frequency Modulated signal. According to this algorithm, K-sparse wavelet coefficients can be obtained. For the peak sequence produced by the Peak Transform, value expansion approach of reversible watermarking is exploited such that the peak sequence can be embedded into the measurements of the signal, which avoids increasing additional points for transmission. By using the Peak Transform and modulus maximum, non-sparse wavelet coefficients can be transformed into K-sparse coefficients, which improves the reconstruction result of CS. Simulation results showed that our proposed algorithm achieved better performance comparing with the original CS algorithm.
The degree of similarity between fuzzy numbers plays an important role in fuzzy information fusion. In this paper, improved ROG-based similarity measure developed from the current ROG method is presented. It is shown ...
详细信息
暂无评论