The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Binary Decision Diagrams (BDDs) and their exten-sions multiple-valued decision diagrams (MDDs) have been adapted for reliability analysis of fault tolerant systems. Par-ticularly, the MDDs are used to solve traditional coveragemodels (CMs) where an uncovered component failure maylead to system failure without constraint. This paper presentsa new family of decision diagrams, generalized multiple-valued...
The increasing pressures faced by manufacturers, the shortening of innovation cycles and the growing importance of high-efficiency manufacturing demand a higher versatility of factory automation. In order to achieve this target, engineering tasks currently performed manually need to be automated. In this case, ontologies emerge as a significant method for representing manufacturing knowledge in a...
Computing systems and services are now required to provide services with quality, intelligence, accuracy, adaptation, and effectiveness to satisfy the demands of users. Most of the existing systems are executed with fixed computing logic and rules without the flexibility and smartness to react the dynamic changes of computing situations and environment. Information technology is moving toward a new...
P2P streaming systems are popular applications on internet. However, due to the open nature, P2P streaming systems are vulnerable to malicious attacks, especially data pollution attacks. Reputation-based mechanisms are most effective mechanisms to defend data pollution attacks in P2P streaming systems. In this paper, we propose a dynamic reputation management. In our proposed mechanism, a peer's reputation...
With the high frequent use of social applications on Android platform, the cache file privacy disclosure issues have become increasingly serious. To our best knowledge, there is no effective privacy protection solution for social applications cache files. In this paper, we analyze the present situation of social applications cache file leaks on Android platform, and provide a privacy disclosure assessment...
Nowadays, big data has brought us a lot of results which we did not expect as before. Development of cultural and creative enterprises is greatly significant to enhance the country's cultural soft power, which is every enterprise managers need to consider. Innovation behavior of cultural and creative talents affects the relationship between incentives and analysis, whereby incentives make recommendations...
In order to improve the synchronous phasor measurement unit (PMU) configuration efficiency and enlarge its application in the large-scale system, a novel PMU configuration method based on the system topology model and considering zero injection buses is proposed. This proposed method considers different cases of buses connection including leaf nodes, buses with the most and same number of connection...
With the rapid development of information communication, computer and control technology, the smart grid has become a direction and trend of the development of electric power industry. The ultimate goal of smart grid is to build a panoramic real-time system which covers the whole production process of power system. However, it is difficult to meet the demand of the power system dispatching department...
The new generation architecture of NVIDIA launched Multi-Process Services (MPS), which provides a context manager in the software layer to handle tasks with different processes. MPS can only be used on the Linux platform, and requires a computing capability of 5.0 or higher NVIDIA GPU card [1]. Although these constraints limit the applicability, but it is a relatively inexpensive way to make multiple...
Digital evidence might be tampered in the process of digital forensics, which would reduce the credibility of the evidence. Considering the lack of reliability in traditional digital forensics, the authors introduce the idea of a time-space attribute-based evidence fixing method (TAEFM). It fixes digital evidence by generation hash code with fingerprint identification data, trusted time-stamp and...
Encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based onmathematical methods. Sometimes there are traces left behind, which can be possibly detected and utilised by attackers. Basedon the ideas of knowledge combination derived from CreativeComputing, in order to provide a safer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.