The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, software systems are moving towards online deployment as collaborative composite services, the operating environments and users' needs for which are continuously changing. Thus, it is important to understand how to cope with run-time requirements by dynamic adaption at different levels. This paper aims to summarize our general position and understanding of this problem. In particular, we introduce...
Requirements engineering has gained growing attention in both academia and industry, as today's software intensive systems are expected to provide highly user-centric functions and qualities. Thus, it is important to understand under what situations existing requirements engineering practice is not working well. Continuing our probe into the industrial practices status quo, this paper reports the...
In this paper, we develop a sophisticated algorithm which has been used in our frequency estimation system of frequency-hopping(FH) signal. By combining the adaptive Pisarenko's Harmonic Deposition(PHD) with the modified least-square-lattice(LSL) algorithm and using a proper initial tap setting, we can see that the convergence rate of this algorithm has been further increased and convergent property...
With the development of the knowledge economy, knowledge-intensive business service (KIBS) becomes the important part of the knowledge infrastructure of the society. It has not only represented the multi-functions as fundamental knowledge production and reallocation, but also has a significant stimulated power for the other industries in the national economy. KIBS plays an important role in the national...
Two methods are proposed to speed up the Batch RSA decryption. The first method (BMRSA- Batch Multi-Prime RSA) speeds up the Batch RSA decryption by reducing modules in modular exponentiation. Another method (BEARSA- Batch Encrypt Assistant RSA) speeds up the Batch RSA decryption by transferring some decryption computations to encryption. The solutions improve the performance without decreasing security...
With conventional edge detection algorithms, the shortcomings of undetected and artificial information will happen. An improved method based on grey prediction model is proposed to improve the performance of image edge detection considerably, and the corresponding experiments is carried out. The results show that the algorithm can effectively detect the edge of images, while retaining more vivid image...
Vision based cyclist detection is a new application in the field of intelligent transportation. Compared with pedestrian detection, this new problem is more challenging because various appearance and motion of bicycles increase the diversity of the detection objects; therefore existing pedestrian detection approaches can hardly get good overall performance because cyclist detection requires more information...
With the growth of Internet, “always on” services are becoming increasingly important in software evolution. Component based software architecture (CBSA) is one of the hottest fields in software research, how to apply non-stop software evolution to CBSA has been an urgent task in software evolution. Component relativity is a key issue in solving this problem. In this paper, we established a component...
This paper aims at speeding up Batch RSA decryption. BEARSA (Batch Encrypt Assistant RSA) and BEAMRSA (Batch Encrypt Assistant Multi-Prime RSA) are proposed to improve Batch RSA decryption performance. Two variants of Batch RSA speed up decryption by reducing modules in modular exponentiation and shifting some decryption work to encryption. The experimental results and the theoretical values show...
Regarding the symbiotic environment as the special resource for the logistics enterprises, this paper proposes the residual differential method to measure the effect that the symbiotic environment acts upon the growth of the logistics enterprises' profit. The core thought is that symbiotic environment is the main factor that causes the fluctuation of the growth of the logistics enterprises' profit...
Negotiation is an important activity in both conventional requirements engineering and the new online service era. It encompasses a wide range of functional and non-functional requirements (QoS), including price, performance, security, delivery time, etc. In order to meet service requirements in the open and distributed environment, systems need to be adaptive to the changing needs. In this paper,...
Security analysis is a knowledge intensive process, in which the attackers and the system owners are competing with their knowledge about how the system is built, what are the weakest points of the system, and how to exploit or to protect them. In other words, it is a race of knowledge. In this paper, we present a service security modeling approach based on the agent-oriented requirement modeling...
In this paper, we develop a sophisticated time-based clustering algorithm to identify the BGP faults in the Internet inter-domain routing system. The algorithm fully utilizes the hidden temporal and topological correlations among the BGP routing updates to identify the common BGP faults that might trigger the routing updates. To verify the correctness and accuracy of the algorithm, several systematic...
On the basis of engineering geological analysis method, the stability of a certain steel plant foundation in the underlying mined-out area is evaluated. In accordance with the loading concentration of steel plant structures and their importance, a classification is carried out and different grouting treatment measures are used accordingly. Afterwards, XB-160-foot vibrating wire strain gauges and XBHV-10-foot...
In this paper, we explicitly propose the problem of fault identification in the Internet inter-domain routing system, and develop a systematic and sophisticate algorithm to identify the BGP faults in the Internet inter-domain routing system. The algorithm fully utilizes the hidden temporal and topological correlations among the BGP routing updates to identify the common BGP faults that might trigger...
In recent years, human resource recruitment websites have been more and more popular in the talent market. The HR recruitment website is an important part in the E-business world. Several HR recruitment websites in China have been in a leading position in this field. In the mean time job hunters find it difficult to assess those websites for their choice decision. This paper utilizes Analytical Hierarchy...
In recent years, electronic information industry has been developed rapidly. Many companies in the industry have been listed on the security market in China. They are very popular in the stock market and have achieved excellent performance, as well as value returns to the shareholders. Some of them have “internet of things” concept, and some of them have “3G” concept. Even four of them occupy both...
Among the newly explored research areas of digital watermarking, various types of data embedding technologies for vector graphics have drawn more and more attention. The features of vector graphics on the data expression and use were analyzed. The requirements of watermarking for vector graphics are discussed. Utilizing the characteristics of vector graphics, an adaptive classification method is proposed,...
This paper aims at speeding up RSA decryption and signature. The performance of RSA decryption and signature has direct relationship with the efficiency of modular exponentiation implementation. This paper proposes a variant of RSA cryptosystem (EAMRSA-Encrypt Assistant Multi- Prime RSA) by reducing modules and private exponents in modular exponentiation. The experimental result shows that the speed...
Experiential marketing has been illustrated and discussed by many scholars in the past several decades. But the application of experiential marketing in electronic business field can only be sourced to several years before. With the rapid development of information technology and knowledge economy, the prospect of experiential marketing in e-commerce area is foreseeable. Netizens and net customers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.