The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Protecting data is a critical part of life in the modern world. The science of protecting data, known as cryptography, makes use of secret keys to encrypt data in a format that is not easily decipherable. However, most modern cryptography systems use passwords to perform user authentication. These passwords are a weak link in the security chain, and are a common point of attack on cryptography schemes...
Due to the thriving of the mobile devices market, there has been a great momentum in adopting Java technology in embedded mobile devices where optimizing energy consumptions extremely critical. However, since Java Virtual Machines(JVMs) are conventionally used for server side clusters, the energy and memory tradeoffs on embedded devices are not well understood. In this work, we attempt to find out...
Extensible Markup Language (XML) has become a widely adopted standard for data representation and exchange. However, its features also introduce significant overhead threatening the performance of modern applications. In this paper, we present a study of XML parsing and determine that memory-side data loading in the parsing stage incurs a significant performance overhead, as much as the computation...
Based on the statistic data of some BBS forum, the general properties of topic diffusion is analyzed from growing and scale-free in internet virtual community. Furthermore, considering the accelerating and attenuating of user joining in growing of topic network, a network growing model of virtual community is given. The simulation results show that the topic network growing from our model has power-law...
Security is very important in modern life due to most information is now stored in digital format. A good security mechanism will keep information secrecy and integrity, hence, plays an important role in modern information exchange. However, cryptography algorithms are extremely expensive in terms of execution time. To make data not easily being cracked, many arithmetic and logical operations will...
This paper presents generic cryptographic accelerator. Certain "hotspot function" are found in the cryptographic algorithm which consume a substantial amount of execution time of the specific algorithm. INTEL performance analyzer VTune was used which analyzes the software performance on IA-32 and Intel64-based machines to examne the hotsport function. By moving the operations to hardware,...
This paper presents a novel on-line optimal task-allocation methodology for the interception of a group of mobile targets by a team of robotic pursuers. The mobile targets are highly maneuverable. A rolling-horizon concept is used to increase the depth of the online search for the optimal solution. Guidance theory is utilized to navigate each pursuer independently toward its assigned target. Extensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.