Shape similarity measure is an important and difficult problem in computer vision and has been extensively studied for decades. In this paper, we propose a kind of shape similarity measure methods based on partition b...
详细信息
Shape similarity measure is an important and difficult problem in computer vision and has been extensively studied for decades. In this paper, we propose a kind of shape similarity measure methods based on partition block statistic According to the difference of partition methods, we extend the idea into eight shape similarity measure methods. Zernike moments and Hu moments methods are also included for performance comparison. Shape retrieval experiments have been conducted on the MPEG-7 Core Experiment CE-Shape-1 database of 1400 images which illustrate the performance of the ten algorithms.
A security, efficient group key management scheme was presented and its security was proved. The scheme was based on one-way accumulators. The dynamic event that external nodes joined the team or internal nodes exited...
详细信息
A security, efficient group key management scheme was presented and its security was proved. The scheme was based on one-way accumulators. The dynamic event that external nodes joined the team or internal nodes exited the team was supported. The protocol can provide perfect forward secrecy and backward secrecy. The related analysis shows new distributed group rekeying algorithms is efficient in the computation cost, storage cost, communication cost and feasibility.
The basic security of NTRU is based on the hardness of the shortest vector problem (SVP) of some lattice, named as CS lattice. Dealing with the decryption failure problem of NTRU is an important topic. The logical mis...
详细信息
The basic security of NTRU is based on the hardness of the shortest vector problem (SVP) of some lattice, named as CS lattice. Dealing with the decryption failure problem of NTRU is an important topic. The logical mistakes and defects of NTRU compensation algorithm which is used for dealing with the decryption failure problem of NTRU are analyzed. The compensation algorithm is proven to be incorrect in this paper. It seems that NTRU encryption verification algorithm can cope with the decryption failure problem of NTRU. But in fact, it is hard to get a satisfying result. An improvement scheme on NTRU encryption verification algorithm is also put forward and discussed, which can correctly resume the plaintext in high probability while the security is the same with NTRU.
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PHI (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co...
详细信息
ISBN:
(纸本)1424409624
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PHI (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A composite algorithm is adopted to generate the initial seed. Job insertion in PHI (p) is replaced with an existing constructive heuristic. Experimental results show that the proposal outperforms PHI (p), especially for large scale instances.
A new traitor tracing scheme with revocation capability was proposed which can be used in digital right management. Only one key was held by each receiver and when traitors were found, their private keys can be revoke...
详细信息
A new traitor tracing scheme with revocation capability was proposed which can be used in digital right management. Only one key was held by each receiver and when traitors were found, their private keys can be revoked without updating the private keys of other receivers. In particular, no revocation messages are broadcast and all receivers do nothing. It is conceptually simple and fully k-resilient, that is, all traitors can be found if the number of them is k or less. The encryption algorithm of our scheme is secure assuming that the discrete logarithm problem is hard.
In this paper, a Web Service based method is presented to conduct parallelized operations in an algorithm on multiple computers. Parallelizable operations in a constructive heuristic for flow shop scheduling problem w...
详细信息
ISBN:
(纸本)1424409624
In this paper, a Web Service based method is presented to conduct parallelized operations in an algorithm on multiple computers. Parallelizable operations in a constructive heuristic for flow shop scheduling problem with total flowtime minimization are analyzed. A parallel heuristic for the problem is described and its parameters are analyzed in theory. The proposed parallel heuristic is compared with the corresponding centralized one. Experimental results show that the proposed method can substantially increase efficiency.
Cost optimization for workflow applications with deadline constraints is fundamental and intractable in grids. In this paper, early tree is introduced to find an early feasible schedule for a workflow application. Acc...
详细信息
ISBN:
(纸本)1424409624
Cost optimization for workflow applications with deadline constraints is fundamental and intractable in grids. In this paper, early tree is introduced to find an early feasible schedule for a workflow application. According to the early tree, a cost optimization algorithm is proposed. Taking into account the workflow total float, the workflow deadline is segmented to activity deadlines while keeping precedence constraints. Costs of all activities are locally optimized, so does the workflow cost. Experimental results show that the proposal that this approach can dramatically decrease workflow cost with different deadlines. Moreover, it outperforms other two leveling algorithms in performance on average.
Communication burden and security are important for agent-based scheduling architectures in uncertain and dynamic scheduling environments, which have not yet been fully solved in traditional *** this paper, a multi-ag...
详细信息
Communication burden and security are important for agent-based scheduling architectures in uncertain and dynamic scheduling environments, which have not yet been fully solved in traditional *** this paper, a multi-agent based framework is *** Network Protocol is combined with Marked-based negotiation protocol to get a trade-off between effectiveness and efficiency.A registration mechanism is given to reduce the communication *** Signature is adopted to enhance the *** well, XML is integrated with KQML to improve the *** with the existing methods, the proposed one is not only securer in data exchanging but also more effective for dynamic scheduling problems.
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in traditional ID-based crypto systems. In this paper, we present an efficient mediated certificateless public...
详细信息
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in traditional ID-based crypto systems. In this paper, we present an efficient mediated certificateless public-key encryption scheme (MCL-PKE for short) without using bilinear pairing. The proposed MCL-PKE scheme solves the inherent key escrow problem of traditional identity-based cryptosystems and provides instantaneous revocation property simultaneously. In addition, our scheme is IND-CCA secure against two types of adversaries in random oracle based on the hardness of the computational Diffie-Hellman problem.
Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dy...
详细信息
Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dynamic traffic. Extensive measurements found that Internet traffic is extremely bursty and possibly self-similar. We propose in this paper a new AQM scheme called multiscale controller (MSC) based on the understanding of traffic burstiness in multiple time scale. Different from most of other AQM schemes, MSC combines rate-based and queue-based control in two time scales. While the rate-based dropping on burst level (large time scales) determines the packet drop aggressiveness and is responsible for low and stable queuing delay, good robustness and responsiveness, the queue-based modulation of the packet drop probability on packet level (small time scales) will bring low loss and high throughput. Stability analysis is performed based on a fluid-flow model of the TCP/MSC congestion control system and simulation results show that MSC outperforms many of the current AQM schemes.
暂无评论