After the construction of S-boxes satisfying some good cryptographic properties, the ByteSub step in Rijndael algorithm was improved based on the dynamical selection of S-boxes depending on the round keys. The improve...
详细信息
ISBN:
(纸本)0972147950
After the construction of S-boxes satisfying some good cryptographic properties, the ByteSub step in Rijndael algorithm was improved based on the dynamical selection of S-boxes depending on the round keys. The improved algorithm has been proved to have stronger ability to resist differential attack. Meanwhile, the avalanche probability of this algorithm is more reasonable and the design method is a challenge to the Kerckhoff hypothesis.
A hybrid workflow system could be treated as a domain-across infrastructure by incorporating different workflow systems and WfMSs engaged in the complex business processing. For enacting a hybrid workflow system, the ...
详细信息
Clustering provides an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques, selecting cluster heads with more residual energy and rotati...
详细信息
This paper proposes LCSE, a learning classifier system ensemble, which is an extension of the classical learning classifier system(LCS). The classical LCS includes two major modules, a genetic algorithm module used to...
详细信息
The information transformation problem of model driven software development (MDSD) processes is gaining increasing attentions. In this paper, we present an indepth analysis of the major causes leading to the ambiguiti...
详细信息
The widely use of extensible Markup Language (XML) raises the importance of security and access control for XML documents. Besides access control for XML document on node-level, it is also important to control users f...
详细信息
ISBN:
(纸本)9781932415810
The widely use of extensible Markup Language (XML) raises the importance of security and access control for XML documents. Besides access control for XML document on node-level, it is also important to control users for accessing association between the nodes. Inference detection plays a central role in associationlevel access control. In this paper we propose a logicbased approach for inference detection in querying XML document. At first, Basic information is obtained from user query logs and "information-trees" are used to represent all the information a user gets. Then Logic-based method is used to find overlapping parts between "information-trees". Finally, inference detection is achieved by merging the "information-trees". This approach can be used to detect much common inference channels, and can serve as a basic model for future extension.
One of the challenges that come from the development of Grid Computing applications is to predigest complicated process of compiling, deploying on the infrastructures and toolkits such as Globus Toolkit. As we explain...
详细信息
One of the challenges that come from the development of Grid Computing applications is to predigest complicated process of compiling, deploying on the infrastructures and toolkits such as Globus Toolkit. As we explain in this article, we think it is essential to find the solution for rapid Grid Computing applications development. GBuilder is just such a tool we worked out for rapid develop on extant Grid Computing infrastructure platforms. By using GBuilder, applications should be able to react dynamically to different infrastructures and toolkits. Since WS-Resource Framework (WSRF) specifications provide technique standard to developers to declare and implement the association between Web service and one or more stateful resources, we aim at making infrastructures provide WS-Resource according these specifications automatically by adding a middleuaare. This paper focuses on the adapting mechanisms that are provided as the lowermost component of GBuilder. First we study the adapting model for Globus Toolkit in patterns of combination dynamic and static. Then it describes how to apply the dynam-static adaptation flexibly to adjust different infrastructures to provide WS-Resource based on WSRF. At last, it comes along the conclusion and we give out our future works.
Reasonable analysis and corrective measurement for the testing results of Web applications can effectively judge the effect and efficiency of the testing. Therefore, based on the previous work, we propose a new method...
详细信息
In this paper, inspired by a unified probabilistic model of information retrieval, we propose a general framework of targeted marketing by considering three types of information, namely, the customer profiles, the pro...
详细信息
暂无评论