The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, cloud computing is increasingly becoming the focus of attention at home and abroad. When the big data storage is become the core of cloud computing system, cloud computing system would evolve into a cloud storage system. With rapidly development of cloud computing, cloud storage has become one of most popular research field. HDFS (Hadoop Distributed File System) has a powerful data storage...
Maximum entropy method (MEM) is the traditional approach to estimate interbank exposure matrix, which is the key to assess contagion effect in banking system. Recently, a new transfer entropy method (TEM) is proposed to estimate interbank exposure matrix. This paper employs the two approaches to estimate interbank exposure matrix of Chinese banking system, and then simulate the contagion process given...
Software risk management is an important approach to obtain trustworthy software. In this paper, entropy was applied to uncover the reasons of chaos and gave the mechanism of risk management in development life cycle. Information entropy was introduced to assess risk uncertainty and a three-dimension risk assessment was obtained through a questionnaire survey. The finding of the study shows the necessity...
Single biometric cryptosystems were developed to obtain win-win scenarios for security and privacy. They are seriously threatened by spoof attacks, in which a forged biometric copy or artificially recreated biometric data of a legitimate user may be used to spoof a system. Meanwhile, feature alignment and quantization greatly degrade the accuracy of single biometric cryptosystems. In this paper, by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.