The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We address the problem of anomaly detection in machine perception. The concept of domain anomaly is introduced as distinct from the conventional notion of anomaly used in the literature. We propose a unified framework for anomaly detection which exposes the multifaceted nature of anomalies and suggest effective mechanisms for identifying and distinguishing each facet as instruments for domain anomaly...
This paper presents a codebook learning approach for image classification and retrieval. It corresponds to learning a weighted similarity metric to satisfy that the weighted similarity between the same labeled images is larger than that between the differently labeled images with largest margin. We formulate the learning problem as a convex quadratic programming and adopt alternating optimization...
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in...
Trusted computing and chain of trust are the very mechanisms to solve the security problems of information system. A chain of trust is established by validating each component of hardware and software from the bottom up. There is an urgent need to test the chain of trust according to the specification of TC to ensure its security. This paper presents a test method on chain of trust by model checking...
Analyzing the growth rhythm of a plant correctly is very important during modeling its whole growth process. Now the parametric L-system is a kind of popular plant modeling tool in which many parameters are introduced to build up the production rules. To depict growth details of a plant the growth function is combined with the L-system production rules in which the interaction among several plant...
With the increasing requirement of resource sharing, security has become a crucial item of application system. In order to improve the secure assurance of resource sharing, many researches have been carried out. Aiming at the efficiency and extreme ideal assumption problems of multi-party secure computation, this paper proposed a secure computation mechanism based on trusted computing platform. And...
The next few years will see distributed real-time computer systems playing an important role in control systems of high-dependability applications, such as rail transportation. In these applications a failure in the temporal domain can be as critical as a failure in the value domain. In rail transportation, train control system has become more complex and the methods to ensure its correctness of have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.