The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this research is to provide a puzzle-based framework to study how global and local information is interacted on human's visual perception during the decision making process. Since the Deep Convolutional Neural Networks (DCNN) has shown the state of the art performance in image classification and object detection, DCNN can output scores to reflect the level of global information, which...
There exists a specific security issue in symmetric searchable encryption that, when doing CKS(Conjunctive Keywords Search), the trapdoors and search results may reveal the relationships between the keywords being searched. For example, if the search result of keywords set A is the superset of keywords set B's, it indicates A is a subset of B by a high chance. Most existing search methods that support...
To keep data confidential against unauthorized cloud servers and users, cryptographic access control mechanisms must be adopted. However, user revocation is a challenging issue since it would inevitably require data re-encryption, and may need user secret key updates. Considering the complexity of fine-grained access control policy and the large number of users in cloud, this issue would become extremely...
Recently, Yang and Tan proposed a certificateless key exchange protocol without pairing, and claimed their scheme satisfies forward secrecy, which means no adversary could derive an already-established session key unless the full user secret keys (including a private key and an ephemeral secret key) of both communication parties are compromised. However, in this paper, we point out their protocol...
According to prior studies, aggressive behavior and some other anti-social personality maybe originate from home environment, peer pressure, video game. Violent video game as one part of a violent culture that many children and adults inhabit, it plays more important role in today society. The social effect of violent video game has been discussed by many scientists concerning the juvenile violence...
The region of economic circle, based on central cities of developed economy and strong urban functions as the core, is covered by the central cities and a number of neighboring cities with which they have strong economic ties. In order to achieve equilibrium state between transportation efficiency of traffic network and transportation requirement of economic circle, the relationship between economic...
eDonkey has become the most reliable and popular P2P file sharing software with largest users. But currently it is still a problem that how to find resources you need exactly and quickly. The traditional searching method which is based on keywords cannot fulfill the needs of people. The effective and promising method is semantic searching. Semantic-based study has become one of hot spots in the nature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.