The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microblog is becoming more and more popular in our life. Due to the numerous information on this platform, it is very useful to detect bursty topic in real-time to help people get essential information quickly. As a necessary stage, detecting busty feature effectively is important for bursty topic detection. Based on dynamics model, we propose a new microblog bursty feature detection method. Firstly,...
In this paper, we study secure communications over a two-user semi-deterministic broadcast channel, i.e., one of the receivers is connected to the transmitter through a deterministic channel. We consider the case where the deterministic receiver is also the eavesdropper for the other receiver's message. We derive the secrecy capacity region by showing that superposition encoding plus Gel'fand-Pinsker...
TA4SP is a state-of-art tool of AVISPA that can automatically verify security protocol with unbounded number of parallel sessions. But it still has some limitations and can't verify hierarchy of authentication automatically. In this paper, we use an approximation-based model to define security protocol and design an algorithm close to the real implementation to calculate the fix-point tree automata...
Fair exchange protocols have been studied intensively in recent years. But a lot of methods are still performed manually. In this paper an automatic method is proposed for analyzing fair exchange protocols. In this method we formalize security properties of fairness and non-repudiation in TLA (temporal logic of action) and define common predicates to make the analysis automatic. An "end"...
In this paper, a kind of shape memory alloy (SMA) model based on hysteretic nonlinear theory and data mining was developed and applied in vibration control on rotor system with SMA bearing. Nonlinear difference item was introduced to interpret the hysteretic phenomenon of SMA. Arctangent function was introduced to describe the variation of SMA stiffness with temperature. Based on above, all of possible...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.