The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the exploding number of functionally similar Web services has led to a new challenge of selecting the most relevant services using quality of service (QoS) aspects. Traditionally, the relevance of a service is determined by computing an overall score that aggregates individual QoS values. Users are required to assign weights to QoS attributes. This is a rather demanding task and an imprecise...
We introduce a model for secure managing virtual infrastructure in IaaS Cloud which called Trusted Private Virtual Data center (TVPDc). It can offer centralized management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. Additionally, we propose a hierarchical management framework and a TVPDc establishment and deployment protocol...
Multiple Independent Levels of Security (MILS) is a high-assurance architecture which protects information sharing at different security levels. MILS ensures mutual independence and prevents the spread of the error effectively between partitions. However, in some specific applications, there exists enormous amount of information interaction and sharing between partitions, the process of which has...
Along with the development of the Internet, university network system has a lot of potential safety problems. Information security level protection system has been included in the state council of the People's Republic of China concerning the strengthening information security work among the opinion ". In information system adopt to enforce the protection of classification of development idea...
In this paper, we present a two-party key agreement protocol, which is secure in standard model. By using the Goldreich-Levin hardcore predicate, we reduce the security of our scheme to Computational Bilinear Diffie-Hellman assumption, and a proof is given. Furthermore, with the consistency of messages exchanged publicly verifiable, our scheme achieves most of the known security attributes.
In this paper, improved Logistic models are given, which are called Logarithm Logistic Models. Based on U.S. Census data, the parameters of the models were estimated by applying the Least Squares Method. The experiments show that the prediction value of the new models is much closer to the actual value than the classical Logistic model. Finally, through analyzing the rationality of the maximum population...
At Eurocrypt'02, Horwitz and Lynn first introduced the concept of HIBS. Till now, many HIBS schemes have been proposed. Recently (2011), Yang et al.'s proposed a hierarchical identity based signature (HIBS) scheme based on computational Diffie-Hellman (CDH) assumption in the standard model. They claimed that their scheme has more secure and more efficient than the existing HIBS schemes. However, we...
This paper finds the same framework underlying some designated verifier signature schemes: each of them can be seen as a message authentication code scheme (MAC) where the private key is generated by the Diffie-Hellman key agreement protocol. So all these schemes could have been very simply constructed. Utilizing this framework, we can modularly construct private designated verifier signature schemes...
In real application, many important physical phenomena are sufficiently localized that adaptive finite element analysis methods are necessary. In the numerical solution of practical problems in engineering and physics such as in electromagnetic mechanics, the overall accuracy of numerical approximations often deteriorates due to local singularities like those arising from re-entrant corners of domains,...
In many application fields, an appropriate high-quality fast image up sampling method is required. Although many interpolation-based up sampling methods have been proposed, the quality of result images is not satisfactory. Some of them are very fast, but produce poor quality images, the others can produce high quality images, but the methods in them are slow. In our paper, we proposed a fast statistical...
Hierarchical prosody structure generation is a key component for a speech synthesis system. As the basic prosodic unit, the prosodic word plays an important role for the naturalness and the intelligibility for the Chinese TTS system. In this paper we proposed an approach for prediction of Chinese prosodic word boundaries in unrestricted Chinese text, which combines Maximum Entropy Markov Model(MEMM)...
In order to solve the view redundant problem in existing research work, we propose an approach based on a single view for 3D model shape feature measuring, and the similarity between models is calculated through dynamic programming algorithm. This method implements single view feature description and shape matching for 3D model. The algorithm is composed of three steps: Firstly, the pose of a 3D model...
In this paper, we firstly analyze the requirement of building fault model libraries and then clarify programs for building fault model libraries in Simulink. Additionally, we present an ontology-base method for reuse of the fault model libraries. The libraries and its reuse are hopeful to enhance the quality and efficiency of safety analysis of critical systems developed with model-based method.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.