The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing algorithms in conic curves cryptosystem are all sequential ones. It is important to have fast parallel algorithms to both encrypt and decrypt data for cryptosystem on conic curves. This paper proposes our own parallel algorithms for conic curves cryptosystem over finite field Fp. Our main works are paralleling the basic multiple-precision integer algorithms and the point-addition operation...
Processing multi-extreme value queries efficiently over data streams is important for data analysis in real-time environment. Cost-efficient processing of continuous extreme values queries over sliding windows, especially about resource sharing, is considered. Firstly, an effective storage structure to minimize the number of elements to be kept for queries is given. We prove the average the cardinality...
With the development of computer technology, network security has become an important issue of concern. In view of the growing number of network security threats and the current intrusion detection system development, this paper gives a new model of anomaly intrusion detection based on clustering algorithm. Because of the k-means algorithm's shortcomings about dependence and complexity, the paper...
Continuous top-k query over data stream is very important for several on-line applications, including network monitoring, communication, sensor networks and stock market trading, etc. In this paper, we propose an effective pruning technique, which minimizes the number of tuples that need to be stored and manipulated. Based on it, a cost-efficient method for continuous top-k processing over single...
The problem of communication reduction over continuous threshold monitoring in distributed systems is considered in this paper. A Communication Efficient Method (CEM) is proposed which utilizes the relationship among objects and processes them as a whole, therefore achieves better performance than those who holding each object separately. In specific, the object with largest value is chose as the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.