Internet Data Centers (IDC) emerge as a major network service platform to converge Internet related services and applications to one location, managing servers, networks, together with valuable and sensitive data of m...
详细信息
Many web sites have features that are only accessible after registering a user account on them. These sites include forums, on-line games, corporate Intranets and many on-line shops. The sites are typically secured th...
详细信息
ISBN:
(纸本)9781424462704
Many web sites have features that are only accessible after registering a user account on them. These sites include forums, on-line games, corporate Intranets and many on-line shops. The sites are typically secured through a system whereby a user chooses both a unique user name and a password that will be used to authenticate them. An alternative system proposed here is more convenient for users, and in many cases more secure by removing the requirement for the user to choose or remember a password.
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ...
详细信息
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it hav...
详细信息
The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, a...
详细信息
ISBN:
(纸本)9781424469611
The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, and the objective text and the suspect patterns are simultaneously detected by comparing with the existing structure. This research article introduces a new algorithm of multi-string pattern matching by means of a new data structure called inverted lists. The inverted lists structure, inherited from the inverted index, is represented by the positions of characters which appear in the patterns. The new algorithm, which is more efficient time than the traditional algorithms, scans the given text in a single pass. More importantly, the structure of patterns is able to update the patterns over time.
This paper proposes an annealed particle swarm optimization based particle filter algorithm for articulated 3D human body tracking. In our algorithm, a sampling covariance and an annealing factor are incorporated into...
详细信息
Utilizing virtualization technology to combine real-time operating system (RTOS) and off-the-shelf time-sharing general purpose operating system (GPOS) is attracting much more interest recently. Such combination has t...
详细信息
Microarray technology allows for the simultaneous monitoring of thousands of genes expressions per sample. Unfortunately, the classification of these samples into distinct classes is often difficult as the number of g...
详细信息
Microarray technology allows for the simultaneous monitoring of thousands of genes expressions per sample. Unfortunately, the classification of these samples into distinct classes is often difficult as the number of genes (features) greatly exceeds the number of samples. Consequently, there is a need to investigate new, robust machine learning techniques capable of accurately classifying microarray data. In this paper, we present a coevolutionary learning classifier system based on feature set partitioning to classify gene expression data. A distributed implementation, which leverages Cloud computing technologies, is used to address the inherent computational costs of our model. The development and execution of this application was done using the Aneka middleware on the public Cloud (Amazon EC2) infrastructure. Experiments conducted using gene expression profiles demonstrates that the proposed implementation outperforms other well-known classifiers in terms of accuracy. Preliminary analysis into the impact of different Cloud setups on the performance of the classifier are also reported.
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad ho...
详细信息
Embracing reduced requirements and leveraging commercial technology has led to a fast growing small satellite industry. Although most interest in small satellites has hovered around the micro-satellites through to the...
详细信息
ISBN:
(纸本)9781617823688
Embracing reduced requirements and leveraging commercial technology has led to a fast growing small satellite industry. Although most interest in small satellites has hovered around the micro-satellites through to the pico-satellites, academic interest now extends up to the sub 100 g range of satellites as well. Femto-satellites with a mass range between 10 g and 100 g could in the future be mass produced and hundreds to thousands of femto-satellites can be deployed as a cluster to enhance, for example, the situational awareness of the Earth's environment. Femto-satellite is seen to form the next class of miniature satellites which will exploit spacecraft engineering, swarm science and mission design to realize exciting new space missions. Consequently, there has been considerable research interest in the sub 100 g range of satellites and the advantage of distributed satellites in space. However, most of the research work has been limited to a bottom-up approach to realize an individual femto-satellite with as much functionality as possible, without sufficient attention to the realization of an application using these distributed femto-satellites in space. This has resulted in an ambiguous top tier of space applications whose realization with a cluster of femto-satellites is arguable. The paper outlines the different realizations of distributed systems in space and identifies the most suitable candidate for femto-satellites. The aim is to map the user requirements for applications to the scaled capability of a cluster of femto-satellites, thereby aiding to systematically identify potential applications for femto-clusters. The principal challenge is that there exists no simple means to scale the capability of an individual femto-satellite to the capability of a distributed cluster of femto-satellites. Scaling certain capabilities is not straightforward. For example, when we consider a user requirement such as orbit control, the inherent virtue of a distributed system
暂无评论