The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Program slicing is used to program analysis and reverse engineering. It can give the programmer the statements only relevant to the computation of a given function. Traversal across the program dependence graph is a basic way to compute the program slice. In this paper, we present a new algorithm to produce control dependence subgraph (CDS) which is the component of program dependence graph. The algorithm...
With serious situation of data leakage in many enterprises, sensitive dataflow protection based on Trusted Virtual Domains (TVD) has been gradually paid much attention to. Remote attestation among two or more entities across trusted virtual domains is an important means to ensure sensitive dataflow, but the existing schemes could not satisfy the higher requirements of flexibility and security in the...
Motivated by the demand of databases outsourcing and its security concerns, privacy-preserving set operations have been a research hotspot in distributed scenario. By combining Shamir secret sharing scheme and homomorphic encryption, we propose a protocol for privacy-preserving set pattern matching, this protocol constructed in this paper is provably secure against a semi-honest adversary under the...
This paper describes the establishment and estimation of trust relation, and put forward a kind of trust service selection model in pervasive computing environment. Through direct and indirect trust relation evaluation, preference adjustment and trust update, a sound trust service evaluation system is set up which has been tested in smart UPS network system and shows a better performance.
Load-Capacity models are usually used for analyzing the network fault-tolerance and survivability. The node's capacity reflects its redundant resources. We propose an evolutionary algorithm to search an optimized capacity allocation strategy, which makes the network achieve optimal robustness with the same resources. Our algorithm is implemented by the following two steps repeatedly: (1) Construct...
Information techniques give support to the teaching theory, teaching plans, teaching mode, teaching measures and teaching management. However, problems on information security and its management are increasing. It is of great significance to research into those information security plans and management methods which are suitable for military academy. Based on the situation of military academy's information...
The creditability and reliability of Web services is becoming an important factor to SOAs. In this paper, a cloud trust model is proposed to maintain the trustiness of services. Trust cloud transform which can reduce the trust date transferred is presented. Trust cloud operators which use cloud drops as the basic processing units are defined. The combination and update of the trust cloud are proposed...
Proxy ring signature scheme with revocable anonymity allows the original signer to know exactly who the signer is and the original signer doesn't need to publish extra information except his original public key. Based on bilinear pairings, a new ring signature scheme with revocable anonymity was proposed. Through cryptanalysis, this scheme satisfies unforgeability, unconditional anonymity for attackers...
Most ID-based AKA protocols require that all parties are members of the same domain. In this paper, we present a new ID-based AKA protocol between members of distinct domains, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cash, Kiltz and Shoup. It is inspired on a new ID-based two-party authenticated key exchange protocol proposed by Hai Huang and Zhenfu Cao. We...
Extensible Firmware Interface (EFI) is a new interface applied for platform firmware and the operating system. Due to providing extensibility and customization, EFI is also a new technology instead of the conventional Basic Input-Output System (BIOS). However, the issue of building trusted EFI BIOS becomes increasingly important. The key of establishing trusted EFI BIOS is based on the trust transition...
Since the concept of proxy signature was introduced in 1996, many variants of proxy signature schemes have been proposed. Among of them, the requirement of proxy signer's privacy protection and the revocation of proxy signer's anonymous identity are needful in some practical applications. Recently, Hu et.al gave a new type of proxy ring signature scheme with revocable anonymity, it allows the original...
Measuring image similarity is an important task for various multimedia applications. Similarity can be defined at two levels: at the syntactic (lower, context-free) level and at the semantic (higher, contextual) level. As long as one deals with the syntactic level, defining and measuring similarity is a relatively straightforward task, but as soon as one starts dealing with the semantic similarity,...
The spatial relationships between two objects can be characterized by their interval relationship. The difference in spatial relationships can be determined by using an interval neighborhood graph. In this paper, we propose to adapt the weights in an interval neighborhood graph according to the significance of change in spatial relationships. We apply our proposed approach in the application of Chinese...
Detection of meaningful meeting events is very important for cross-modal analysis of planning meetings. Many important events are related to speaker's communication behavior. In visual-audio based speaker detection, mouth positions and movements are needed as visual information. We present our techniques to detect mouth positions and movements of a talking person in meetings. First, we build a skin...
Synthetic aperture radar (SAR) has become one of the most powerful observation tools in the studies of natural environments and Earth resources. However the granular appearance of speckle noise in synthetic aperture radar imagery makes it very difficult to visually and automatically interpret information of SAR data. In this paper, according to the inherent speckle property of SAR image, we proposed...
Dimension reduction is the process of reducing the number of random features under consideration, and can be divided into the feature selection and the feature extraction. A two-stage feature selection method based on the Regularized Least Squares-Multi Angle Regression and Shrinkage (RLS-MARS) model is proposed in this paper: In the first stage, a new weighting method, the Term Frequency Inverse...
This paper describes an approach for lane segmentation in traffic monitoring systems based on road region and lane line information. Firstly, we use Gaussian background modeling algorithm to extract the motion regions and background image, then lane region can be acquired by region growing algorithm based on motion regions. The straight-lines about lane lines can be acquired by using Hough transform...
The image analogy is a classical technique used in the style learning and Multimedia data mining. To regrettable the IA method can not be suitable to any pair of images. This article prime task has four aspects: 1 Proposed one kind of new image similarity measure operator. 2 Take Image difference measure operator as characteristic quantification IA method applicable scope. 3 To proposed one kind of...
An efficient distributed data collecting algorithm called EDDCA is proposed to plan the data collecting path for the mobile robot. EDDCA restricts the hop counts of the sensing data transmission to reduce energy consumption in multi-hop routing, then EDDCA constructs a minimum connected dominating set (MCDS) based on a maximal independent set (MIS). Sensor nodes' data transmission can cooperate with...
Wireless multimedia sensor networks are widely used in the information acquiring and processing. Potential applications of multimedia sensor networks span a wide spectrum from military to industrial, from commercial to environmental monitoring. These applications may demand high bandwidth and are extremely delay-sensitive. Multipath routing is one of appropriate solutions for multimedia data transmitting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.