Power analysis attack is a powerful cryptanalytic technique aiming to extract the secret data from a cryptographic device by collecting and analyzing power consumption traces. In this paper, we present a practical pow...
详细信息
Software testing is essential to ensure that the software Quality. On most software projects testing activities consume at least 30 percent of the project effort. On safety critical applications, software testing can ...
详细信息
Software testing is essential to ensure that the software Quality. On most software projects testing activities consume at least 30 percent of the project effort. On safety critical applications, software testing can consume between 50 to 80 percent of project effort. While the scale of software development and application expands dramatically, to guarantee the quality and reliability of software is becoming a huge challenge. For the ever-expanding software to reach the standard of Software Engineering, the best possible testing should be applied. During the testing, automatic generation of test data is especially important for improving testing efficiency. This paper presents the results of the author's study on problems and algorithms related to the automatic generation of software testing data. Results indicated that the method designed by the author can be used to perform iterative computation on needed data more efficiently, and then reach an essentially feasible solution. Although the exploratory study presented here proved rather demanding because few had adopted the approach, it has achieved positive results in improving the validity and the temporal and spatial complexity of the existent iterative algorithm.
In wireless sensor networks (WSNs) environment, since the battery limitation of the node energy, energy efficiency is an key factor should be considered as the communication methods are designing. As classical and hie...
详细信息
In wireless sensor networks (WSNs) environment, since the battery limitation of the node energy, energy efficiency is an key factor should be considered as the communication methods are designing. As classical and hierarchical routing protocols, Leach Protocol plays an important role. In response to the uneven energy distribution that is caused by the randomness of cluster heads forming, this paper presents a increased method of Leach protocol which is intended to trade off the energy consumption of the entire network and extend the life of the network. The new algorithm is verified by simulation platform, the simulation results show that the energy consumption and the lifetime of the network are both well improved than that of original Protocol.
Energy consumption and time delay, i.e., the amount of energy and time consumed by all the nodes for transmitting data, are two critical factors for estimating the efficiency of algorithms in wireless sensor networks....
详细信息
Energy consumption and time delay, i.e., the amount of energy and time consumed by all the nodes for transmitting data, are two critical factors for estimating the efficiency of algorithms in wireless sensor networks. We focus on the application of time-driven data gathering, where all nodes act as sources at the same time to transmit data to an immobile sink node. We propose an efficient algorithm called DGNC for this scenario using inter-session network coding and opportunistic routing. Besides, we theoretically quantify the energy and time delay saving that our algorithm could offer in a rectangular grid network, and demonstrate the fact by simulation results in random networks, which DGNC could offer significant benefits in terms of both energy consumption and time delay in timedriven data gathering.
Algebraic thickness is an important property of Boolean functions. In this paper we give the relationship between algebraic thickness of Boolean functions with disjoint variables and their algebraic thickness, and der...
详细信息
In this paper, we determine zeta-functions of some curves of genus 3 over finite fields by gluing three elliptic curves based on Xing's research, and the examples show that there exists a maximal curve of genus 3 ove...
详细信息
In this paper, we determine zeta-functions of some curves of genus 3 over finite fields by gluing three elliptic curves based on Xing's research, and the examples show that there exists a maximal curve of genus 3 over F49.
暂无评论