The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most speech enhancement algorithms are derived by applying gauss hypothesis based on decor related speech samples. And recently it is accepted that the real pdf of speech spectral amplitude lies between the Laplace and Gamma amplitude approximation. This paper presents a supper gauss mixture model of speech spectral amplitude which can accurately approximates real speech spectral amplitude distribution...
As a critical component of grid security, secure and efficient grid authentication needs to be well addressed. However, the most widely accepted and applied grid authentication is based on public key infrastructure (PKI) and X.509 certificates, which make the system have low processing efficiency and poor anti-attack capability. To accommodate the challenge of grid authentication, this article aims...
Security has been the focus of grid systems recently. As a kind of tool, grid security infrastructure (GSI) provides the authentication and authorization services and so on. These mechanisms mostly belong to the objective factors, which have not met the needs of security. As the subjective factor, trust model plays an important role in security field. A new two-level reputation trust architecture...
Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography...
This article proposes the extended role-based access control (RBAC) model for solving dynamic and multidomain problems in grid computing, The formulated description of the model has been provided. The introduction of context and the mapping relations of context-to-role and context-to-permission help the model adapt to dynamic property in grid environment. The multidomain role inheritance relation...
While grid computing receives more and more attentions, it is not widely used partly due to requirement of sophisticated development. This paper discusses a code generation framework for grid computing. We firstly introduce GBuilder as a rapid development tool for building grid computing applications, then present the details of the code generation framework. We then discuss a case study to show the...
This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.