The watermark is split into a set of shares and represented as a set of graphs, which are embedded into the program dynamically. Code obfuscating technique in the embedding phase was used. A novel scheme of dynamic da...
详细信息
The watermark is split into a set of shares and represented as a set of graphs, which are embedded into the program dynamically. Code obfuscating technique in the embedding phase was used. A novel scheme of dynamic data structure software watermarking is presented. This scheme can restore the watermark according to partial watermark shares and is very robust and stealthy.
This paper first gives an analysis of data aggregation and data compression based on energy consumption of sensor nodes, after which an approach is proposed to construct an aggregation tree in the case of non-perfect ...
详细信息
This paper first gives an analysis of data aggregation and data compression based on energy consumption of sensor nodes, after which an approach is proposed to construct an aggregation tree in the case of non-perfect aggregation, since GIT considers only the case of perfect aggregation and it does not work well if the aggregation is non-perfect. An assessment scheme that can get the information of hops from the aggregation point to the sink and the hops from the aggregation point to the source node is used to construct such an aggregation tree. Moreover, the energy consumption of the aggregation is also considered. This scheme can be used when perfect aggregation cannot be performed. In this paper, an approach to reduce the cost of reinforcement is also proposed, in which the reinforcement work is done by the source nodes themselves, not by the sink node. Simulation result shows that this approach can save more energy than GIT when the aggregation ratio is small. This result also provides a theoretical limit of aggregation to tell when GIT will lose its superiority and thus gives a direction to choose among the aggregation algorithms. Another result shows that the further the sources are away from the sink, the less reinforcement messages are needed. Finally a guidance to tell when to use the EGA (energy consumption assessment) scheme is given.
Signed network is an important kind of complex network, which includes both positive relations and negative relations. Communities of a signed network are defined as the groups of vertices, within which positive relat...
详细信息
Signed network is an important kind of complex network, which includes both positive relations and negative relations. Communities of a signed network are defined as the groups of vertices, within which positive relations are dense and between which negative relations are also dense. Being able to identify communities of signed networks is helpful for analysis of such networks. Hitherto many algorithms for detecting network communities have been developed. However, most of them are designed exclusively for the networks including only positive relations and are not suitable for signed networks. So the problem of mining communities of signed networks quickly and correctly has not been solved satisfactorily. In this paper, we propose a heuristic algorithm to address this issue. Compared with major existing methods, our approach has three distinct features. First, it is very fast with a roughly linear time with respect to network size. Second, it exhibits a good clustering capability and especially can work well with complex networks without well-defined community structures. Finally, it is insensitive to its built-in parameters and requires no prior knowledge.
Ontologies are widely used for capturing and organizing knowledge of a particular domain of interest, and they play a key role in the Semantic Web version, which adds a machine tractable, repurposeable layer to comple...
详细信息
In this paper, a genetic algorithm approach with a novel mutation operator based on perturbation and local search has been proposed to solve an advanced planning and scheduling (APS) model in manufacturing supply chai...
详细信息
The difficulties of modeling complex knowledge system lie in a large quantity of knowledge rules and the difficulty in organizing rules and grasping their mutual logical relationships. This article proposed a concept ...
详细信息
A novel dynamic software watermark scheme based on the Shamir threshold and branch structure is presented. First, we split the watermark into a set of shares using the Shamir threshold scheme. Second, these values are...
详细信息
A novel dynamic software watermark scheme based on the Shamir threshold and branch structure is presented. First, we split the watermark into a set of shares using the Shamir threshold scheme. Second, these values are encrypted with the DES block cipher that forms the watermark shares to be embedded into different methods of program according to the dynamic behavior of the branch structure. Our scheme can withstand most semantics-preserving attacks and can retrieve the original watermark based on partial information. Simulation tests show that our scheme is very robust, stealthy and has a high price performance rate compared with other methods.
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this p...
详细信息
ISBN:
(纸本)9781601320254
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this paper we first present a fuzzy extension of ALC and define its syntax and semantics. Then we devote to taking advantage of the expressive power and reasoning capabilities of fuzzy ALC by encoding flexible planning problems within the framework of fuzzy ALC. Both theory and experimental results have shown that our method is sound and efficient.
It is inadequate considering only one aspect of spatial information in practical problems, where several aspects are usually involved together. Reasoning with multi-aspect spatial information has become the focus of q...
详细信息
The existing 3D direction models approximate spatial objects either as a point or as a minimal bounding block, which decrease the descriptive capability and precision. Considering the influence of object's shape, ...
详细信息
暂无评论