The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Predicting the High Intensity Radiated Field (HIRF) coupling in complex system is highly required in the aeronautic industry, which can be performed by electromagnetic simulation. But the validation of electromagnetic simulation is a difficult issue which needs proper flowchart and validation methods. In this paper, the numerical simulation by the parallel Finite-Difference Time-Domain (FDTD) method...
Cloud computing is a type of Internet-based service computing that provides computing, storage and networking services to multiple users. With the increase of data size, computing capacity runs out quickly in cloud computing services. To fill the shortage of computation capacity, we propose to adopt variable precision by implementing unum (universal number), which is a number format different from...
In the industrial world, the access control is still mostly based on traditional “Role-Based Access Control” for cloud services. Cloud Computing United Open Laboratory in Chengdu University of Information Technology develops “the large virtualization infrastructure platform for cloud data center” which realizes access control strategy according to the characteristics of the multi-tenancy. Firstly,...
An essential component of threshold cryptography is to generate a distributed key based on univariate symmetric polynomials, where a constant fraction of the players can reconstruct the key. We, however, with rigorous proof of security, present a new distributed key generation (DKG) protocol, using bivariate symmetric polynomials. It is regarded as more efficient in computation, simpler and more flexible...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.