ATP (automated theorem proving) has always been one of the most advanced areas of computer science. The traditional idea used in ATP is to try to deduce the empty clause to check satisfiability, such as resolution bas...
详细信息
ATP (automated theorem proving) has always been one of the most advanced areas of computer science. The traditional idea used in ATP is to try to deduce the empty clause to check satisfiability, such as resolution based theorem proving, which is one of the most popular methods. Extension-rule-based theorem proving is a new resolution-based theorem proving method. After a deep research work on the extension rule, a brilliant property of the rule is obtained. In this paper, the property and an algorithm which is used to decide it are proposed firstly. In addition, the algorithm's time complexity and space complexity are analyzed and proved. Based on the above work, a novel extension rule based theorem proving algorithm called NER is proposed. The NER algorithm transforms the problem which decides whether a clause set is satisfiable to a series of problems deciding whether one literal set includes another one, while the original extension algorithm transforms them to problems counting the number of maximum terms that can be expended. A number of experiments show that the NER algorithm obviously outperforms both the original extension rule based algorithm ER and the directional resolution algorithm DR. Especially, it can be improved up to two orders of magnitude.
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up...
详细信息
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up a personal security key escrow model, thus providing identity validation, confidentiality and integrality check for the application, backup, recovery, and renewal of the escrowed keys. The mechanism, taking advantage of the IBE, simplified the process of authentication and encryption, mede it possible for users to complete independently the escrow of personal security keys. Therefore, it is more practical than traditional key escrow schemes.
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo...
详细信息
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANET with self-organization, a new authentication and trust evaluation framework was proposed based on trusted computing technology, the concepts of "trusted attribute" and "trusted grade" were introduced, and the key management architecture as well as authentication process of mobile node were explained in detail. Moreover, the potential real application of the presented framework was discussed, and the trust evaluation method and its argumentation in the presented framework were given.
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical...
详细信息
A hybrid of graph-based and neural network recognition system is developed. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are ...
详细信息
A hybrid of graph-based and neural network recognition system is developed. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checked to see whether they match with the predefined feature library. If so, a feature vector is assigned to them. Otherwise, base faces are obtained as heuristic information and used to restore the missing faces and update the sub-graphs. The sub-graphs are transformed into vectors, and these vectors are presented to the neural network, which classifies them into feature classes. The scope of instances variations of predefined feature that can be recognized is very wide. A new BP algorithm based on the enlarging error is also presented.
An efficient methodology for recognizing features is presented. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checke...
详细信息
An efficient methodology for recognizing features is presented. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checked to see whether they match with the predefined feature library. If so, a feature vector is assigned to them. Otherwise, base faces are obtained as heuristic information and used to restore missing faces, meanwhile, update the sub-graphs. The sub-graphs are transformed into vectors, and these vectors are presented to the neural network which classifies them into feature classes.
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s...
详细信息
We present a novel object localization approach based on the Global Structure Constraint model (GSC) and Optimal Algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa...
详细信息
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by onepoint coverage random sets theory and also the unified framework ...
详细信息
In this paper, we mainly discuss the relationship between the extended Pawlak flow graph (EFG) with granular computing (GrC), and develop a both simple and concrete model for EFG using GrC. The distinct advantage is t...
详细信息
暂无评论