The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited...
The tradition standby mechanism can??t carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid calculation is an important research subject. In this paper, some technique and strategy of allopatric isomeric backup in grid calculation environment are researched by comparing and analyzing...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types...
Non-linear regression algorithm is proposed based on the analytic center of feasible region, which overcomes the drawback the generalization performance of support vector regression degrades when the feasible space is elongated or asymmetric; the proof is given that the algorithm proposed is equivalent to the maximum likelihood parameter estimation when fitting error satisfies a class of probability...
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types...
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the underlying connectivity and routing protocols defined by MANET in order to perform resource discovery and access. This paper proposes a mobility-aware zoned routing protocol for MANET-MAFZP,...
The tradition standby mechanism can?t carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid calculation is an important research subject. In this paper, some technique and strategy of allopatric isomeric backup in grid calculation environment are researched by comparing and analyzing...
A 3D graphical representation of RNA secondary structures(3DGRR) has been derived for mathematical denotation of RNA structure. The three-dimensional graphical representation avoids loss of information and resolves structures’ degeneracy. The RNA pseudoknots also can be represented as three-dimensional graphical representations
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.