The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a new method is designed to account price of military software, which is based on option pricing models. Firstly, it is introduced about the basic knowledge of option pricing model. And then the military software pricing model is provided based on Black-Scholes option model and binomial tree model. Several variables in reference to military software price are redefined in the related...
Grid computing system is the one where individual entities share their resources with others in their own domain as well as with other domain. The resources should be shared with out loosing individual's confidentiality and control over their resources. The resources must be selected in such a way to achieve this and at the same time grid security also must be ensured. Various models have been proposed...
An important step in economical operation analysis for transformers is the calculation of power loss curve. In order to find out the curve which best fits the actual conditions, we need to correct the nameplate ratings of the transformer. Taking the type test is the traditional method. But the result of this not-so-flexible method will become inaccurate with the lapse of time. Fitting the real-time...
Proxy blind signature technology integrates the properties of both the blind signature and proxy signature; it can be adopted in applications such as e-cash or e-commerce, etc. In this paper, cryptanalysis of two blind proxy blind signature schemes is made, which show the first scheme doesn't satisfy the property of unlinkability and the second suffers from a kind of forgery attack. And to overcome...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.