2005年软件所被SCI收录的文章

1. 检索条件
地址=(((Inst Sofware) OR (Inst Software) OR (Software Inst)) SAME (Chin* and aca*) SAME
Beijing) AND 出版年=(2005)
入库时间=所有年份. 数据库=SCI-EXPANDED.
2. 检索结果
显示 1 条,共 136 条
作者: Sun, JC (Sun, Jiachang); Tai, XC (Tai, Xue-Cheng)
标题: Scientific Computing in Petroleum Industry (SCPI) - Preface
来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING,
2: - Sp. Iss. SI 2005
语言: English
文献类型: Editorial Material
地址: Chinese Acad Sci, Lab Parallel Comp, Inst Software, Beijing 100080, Peoples R China;
Univ Bergen, Dept Math, N-5007 Bergen, Norway
通讯作者地址: Sun, JC, Chinese Acad Sci, Lab Parallel Comp, Inst Software, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 0
被引频次: 0
出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION
出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA
T6G 2G1, CANADA
ISSN: 1705-5105
29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL
ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model.
来源文献页码计数: 2
学科类别: Mathematics, Applied; Mathematics
ISI 文献传递号: 091ZZ
-------------------------------------------------------------------------------显示 2 条,共 136 条
作者: Cao, JW (Cao, Jianwen); Sun, JC (Sun, Jiachang)
标题: An efficient and effective nonlinear solver in a parallel software for large scale petroleum
reservoir simulation
来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING,
2: 15-27 Sp. Iss. SI 2005
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Scientific Computing in Petroleum Industry (SCPI)
会议日期: AUG 04-07, 2004
会议地点: Beijing, PEOPLES R CHINA
作者关键词: petroleum reservoir simulation; nonlinear solver; preconditioning; inexact Newton;
BFGS; Krylov subspace; parallel performance
KeyWords Plus: QUASI-NEWTON METHODS; NONSYMMETRIC LINEAR-SYSTEMS
摘要: We study a parallel Newton-Krylov-Schwarz (NKS) based algorithm for solving large
sparse systems resulting from a fully implicit discretization of partial differential equations arising
from petroleum reservoir simulations. Our NKS algorithm is designed by combining an inexact
Newton method with a rank-2 updated quasi-Newton method. In order to improve the
computational efficiency, both DDM and SPMD parallelism strategies are adopted. The
effectiveness of the overall algorithm depends heavily on the performance of the linear
preconditioner, which is made of a combination of several preconditioning components including
AMC, relaxed ILU, up scaling, additive Schwarz, CRP-like(constraint residual preconditioning),
Watts correction, Shur complement, among others. In the construction of the CRP-like
preconditioner, a restarted CMRES is used to solve the projected linear systems. We have tested
this algorithm and related parallel software using data from some real applications, and presented
numerical results that show that this solver is robust and scalable for large scale calculations in
petroleum reservoir simulations.
地址: Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080, Peoples R China
通讯作者地址: Cao, JW, Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 27
被引频次: 1
出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION
出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA
T6G 2G1, CANADA
ISSN: 1705-5105
29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL
ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model.
来源文献页码计数: 13
学科类别: Mathematics, Applied; Mathematics
ISI 文献传递号: 091ZZ
-------------------------------------------------------------------------------显示 3 条,共 136 条
作者: Li, HW (Li, Hongwei); Sun, JC (Sun, Jiachang)
标题: Robin transmission conditions for overlapping additive Schwarz method applied to linear
elliptic problems
来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING,
2: 83-99 Sp. Iss. SI 2005
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Scientific Computing in Petroleum Industry (SCPI)
会议日期: AUG 04-07, 2004
会议地点: Beijing, PEOPLES R CHINA
作者关键词: domain decomposition; additive Schwarz methods; Robin transmission conditions
KeyWords Plus: DOMAIN DECOMPOSITION
摘要: We consider overlapping Additive Schwarz Method(ASM) with Robin conditions as the
transmission conditions (interior boundary conditions). The main difficulty left in this field is how
to select the parameters for Robin conditions - these parameters have strong effect on the
convergence rate of ASM. In this paper, we proposed the parameters for linear elliptic problems
which seemed to be near optimal.
地址: Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080, Peoples R China
通讯作者地址: Li, HW, Chinese Acad Sci, Inst Software, Lab Parallel Comp, POB 8718, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 12
被引频次: 0
出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION
出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA
T6G 2G1, CANADA
ISSN: 1705-5105
29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL
ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model.
来源文献页码计数: 17
学科类别: Mathematics, Applied; Mathematics
ISI 文献传递号: 091ZZ
-------------------------------------------------------------------------------显示 4 条,共 136 条
作者: Yao, JF (Yao, Jifeng)
标题: Explorer, a visualization system for reservoir simulations
来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING,
2: 169-176 Sp. Iss. SI 2005
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Scientific Computing in Petroleum Industry (SCPI)
会议日期: AUG 04-07, 2004
会议地点: Beijing, PEOPLES R CHINA
作者关键词: visualization system; post-processing; reservoir simulation
摘要: In this paper, we introduce Explorer, a visualization system for reservoir simulations. It is
designed for large-scale data sets and many technologies have been used during its
implementation, such as a 3-layer Client-Commware-Server (CCS) structure, Object-Oriented
method, VTK based rendering and etc. Compared with current commercial softwares, Explorer
has many features including more data formats support, many user-defined properties and full
support for Chinese characters.
地址: Chinese Acad Sci, Inst Software, Parallel Comp Lab, Beijing 100080, Peoples R China
通讯作者地址: Yao, JF, Chinese Acad Sci, Inst Software, Parallel Comp Lab, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 3
被引频次: 0
出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION
出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA
T6G 2G1, CANADA
ISSN: 1705-5105
29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL
ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model.
来源文献页码计数: 8
学科类别: Mathematics, Applied; Mathematics
ISI 文献传递号: 091ZZ
-------------------------------------------------------------------------------显示 5 条,共 136 条
作者: Liu, W; Wang, Q; Wang, HG; Dai, GZ
标题: Adaptive real-time publish-subscribe messaging for distributed monitoring systems
来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (4): 569-574 OCT 2005
语言: English
文献类型: Article
作者关键词: real-time publish-subscribe; event condition action (ECA) rule; active real-time
database
摘要: Many complex distributed real-time applications, monitoring and controlling the external
environment, require sophisticated processing and sharing of an extensive amount of data under
critical timing constraints. In this paper, we present an adaptive Realtime publish-subscribe (RTPS)
messaging service for distributed real-time applications, and four primitives are defined for
implementing the adaptive RTPS. Furthermore, adaptive RTPS is incorporated into an Active
real-time database (ARTDB) named Agilor by translating RTPS primitives into subscription
objects and ECA rules. We also apply real-time scheduling algorithm to protocol processing for
improving predictability and minimizing priority inversions during message transmission. The
experimental results indicate the idea is feasible, and the current implementation shows better
performance.
地址: Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080, Peoples R China
通讯作者地址: Liu, W, Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080,
Peoples R China.
引用的参考文献数: 14
被引频次: 0
出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG
出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN,
SHATIN, 00000, PEOPLES R CHINA
ISSN: 1022-4653
29 字符的来源出版物名称缩写: CHINESE J ELECTRON
ISO 来源文献出版物名称缩写: Chin. J. Electron.
来源文献页码计数: 6
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 037FU
-------------------------------------------------------------------------------显示 6 条,共 136 条
作者: Hua, C; Wu, CK; Feng, DG
标题: On statistical properties of S-boxes in block ciphers
来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (4): 584-587 OCT 2005
语言: English
文献类型: Article
作者关键词: block cipher; S-box; bias test
摘要: S-boxes being core nonlinear components play a very important role in traditional block
ciphers. Well-designed S-boxes will contribute to the security of a block cipher significantly, and
security measurement of S-boxes has attracted much interest. Besides many measurements for
S-boxes in block ciphers, this paper proposes a new measurement on the statistical property,
namely bias test of S-boxes, and gives analysis of the S-boxes in Rijndael and Crypton using the
new measurement. It shows that the S-box of Rijndael performs better than that of Crypton under
the new measurement. Some relationships between the new measurement and algebraic properties
have also been explored.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Hua, C, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
引用的参考文献数: 12
被引频次: 0
出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG
出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN,
SHATIN, 00000, PEOPLES R CHINA
ISSN: 1022-4653
29 字符的来源出版物名称缩写: CHINESE J ELECTRON
ISO 来源文献出版物名称缩写: Chin. J. Electron.
来源文献页码计数: 4
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 037FU
-------------------------------------------------------------------------------显示 7 条,共 136 条
作者: Li, MS
编者: Li, M; Boehm, B; Osterweil, LJ
标题: Expanding the horizons of software development processes: A 3-D integrated methodology
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 54-67 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
摘要: This paper investigates how to define and improve software development processes. Based
on examining the software development during last two decades, it proposes a breakthrough point
of an updated view of requirements, called Great Requirements, and presents a 3-D integrated
software engineering methodology for improving software development activities. It expands the
horizons of possible future software development processes.
地址: Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100080, Peoples R
China; Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples
R China
通讯作者地址: Li, MS, Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, 4 S 4th St,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 44
被引频次: 5
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 8 条,共 136 条
作者: Huang, M; Yang, LG; Yang, Y
编者: Li, M; Boehm, B; Osterweil, LJ
标题: A development process for building OSS-based applications
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 122-135 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
KeyWords Plus: OPEN SOURCE SOFTWARE
摘要: It has become great prominence that business organizations are considering open source
software (OSS) when looking for software system solutions. However, building applications based
on open source software remains an essential issue for many software developers since the new
development process differs from traditional in-house development. In this paper, we present a
development process based on our experience on using open source software in application
development. The new process emphasizes the early assessment to improve the architecture
stability and project manageability by assessing available OSS. A set of measurable assessment
criteria is established in assessing OSS candidates and making optimal decisions in the
development process. A case study is discussed to show the application of this process.
地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ So Calif, Ctr
Software Engn, Los Angeles, CA 90089 USA
通讯作者地址: Huang, M, Chinese Acad Sci, Lab Internet Software Technol, Inst Software, POB
8718, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 25
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 9 条,共 136 条
作者: Chen, W; Ying, Q; Xue, YZ; Zhao, C
编者: Li, M; Boehm, B; Osterweil, LJ
标题: Software testing process automation based on UTP - A case study
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 222-234 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
KeyWords Plus: TTCN-3
摘要: Automation of software testing process plays an important role in improving software
quality, shortening period of development and reducing development cost. However, most existing
testing automation methods tend to rely on various kinds of limited formal models, and make a
contrived separation between software testing and other phases in software life cycle. This
separation limits wide spread application of these methods. On the other hand, UML, as a unified
modeling language that has been widely employed to describe and model software and software
process, can provide good basis for testing automation to close the separation. In this paper we
introduce an approach that transforms design models represented by UML to testing models
represented by UTP (UML Testing Profile), and further more transforms the testing models to
TTCN-3 (Test and Test Control Notation) test cases that can be executed on a TTCN-3 execution
engine, according to TTCN-3 mapping interface defined in UTP. This approach integrates testing
phase with other phases tightly together, and leads to automation or semi-automation of software
testing process. Finally, the paper demonstrates the effectiveness of the proposed approach by
deriving TTCN-3 test cases for a typical C/S software system.
地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Chen, W, Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing
100080, Peoples R China.
电 子 邮 箱 地 址 :
[email protected];
[email protected];
[email protected]; [email protected]
引用的参考文献数: 11
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 13
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 10 条,共 136 条
作者: Ding, LP; Yang, QS; Sun, L; Tong, J; Wang, YJ
编者: Li, M; Boehm, B; Osterweil, LJ
标题: Evaluation of the capability of Personal Software Process based on data envelopment
analysis
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 235-248 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
摘要: Personal Software Process (PSP) is a defined and measured software process designed to be
used by an individual software engineer. For PSP users, it's important to evaluate the impact of the
PSP upon their own personal capabilities of software development. However, the evaluation of
capability of PSP is a Variable Return to Scale (VRS) and multivariate input and output problem,
which makes traditional evaluation methods useless. In this paper, an evaluation framework for
the capability of PSP based on Data Envelopment Analysis (DEA) is proposed. This framework
has the advantage of dealing with VRS issues with multivariate input and output. In addition, the
input or output variables of the framework can have different measurement units. Therefore, a
quantitative and comprehensive result can be returned by this relative efficiency evaluation
method and it can support the continuous improvement of PSP.
地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R
China; Chinese Acad Sci, Key Lab Comp Sci, Beijing 100080, Peoples R China; Chinese Acad
Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Ding, LP, Chinese Acad Sci, Lab Internet Software Technol, Inst Software,
Beijing 100080, Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected];
[email protected]; [email protected]; [email protected]
引用的参考文献数: 14
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 11 条,共 136 条
作者: Wang, JZ; Meyers, S
编者: Li, M; Boehm, B; Osterweil, LJ
标题: Spiral Pro: A project plan generation framework and support tool
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 262-276 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
摘要: Project planning is a delicate and on-going activity that requires a great deal of experience
and knowledge. Several models and methods are developed which explore the various aspects of
planning a project. In this paper, we propose a framework named Spiral Pro that integrates Spiral
Model, MBASE and COCOMO II to help project managers do their project planning in a
systematic way. In an empirical study, a project plan template, developed following the framework,
was provided for thirteen e-service projects and a survey was used at the end to assess the study.
Based on the survey, some characteristics are summarized, which help point out the effectiveness
of using of Spiral Pro framework. Motivated by the findings in the study, a tool has been
developed to help both experienced and inexperienced project managers make better use of the
framework for project planning.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ So Calif, Ctr
Software Engn, Los Angeles, CA 90089 USA; Software Proc Grp, Los Angeles, CA 90018 USA
通讯作者地址: Wang, JZ, Chinese Acad Sci, Inst Software, Lab Internet Software Technol,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 20
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 15
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 12 条,共 136 条
作者: Wang, Q; Li, MS
编者: Li, M; Boehm, B; Osterweil, LJ
标题: Software process management: Practices in China
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 317-331 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
摘 要 : Software process management has been proven a useful means to help software
organizations improve their development processes and produce high quality products. It focuses
on providing process-related products and services to software developer. Chinese software
industry is developing rapidly. Effective software process methods, technology and tools that help
them produce quality products while reducing the costs are in desperate need. This paper discusses
the current state of project management in Chinese software companies and presents a solution
and practices meeting this need.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R
China; Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100080, Peoples R
China
通讯作者地址: Wang, Q, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, 4
South 4th St,Zhong Guan Cun,POB 8718, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 14
被引频次: 5
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 15
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 13 条,共 136 条
作者: Wu, ZC; Christensen, D; Li, MS; Wang, Q
编者: Li, M; Boehm, B; Osterweil, LJ
标题: Survey of CMM/CMMI implementation in China
来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 507-520 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Software Process Workshop (SPW 2005)
会议日期: MAY 25-27, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad Sci, Inst Software.
摘要: Since 1999, the Chinese software industry has been using CMM/CMMI to improve
software process. By November, 2004, more that 180 appraisals have been conducted. But the
number of CMM/CMMI users is fairly low compared to the whole Chinese software industry. In
addition, the growth rate of appraisal numbers has fallen during 2004. Limited research has been
done to find out the obstacles for the wide-usage of CMM/CMMI in China. In this research, by
investigating most of the organizations who have been appraised, reasons, success factors and
benefits of CMM/CMMI implementation are identified, problems which negatively impact the
CMM/CMMI usage are analyzed. Recommendations are made to the Chinese software industry
and government to solve those problems, which could help those who want to or are using
CMM/CMMI.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; One Market Ltd Co,
Wellington, New Zealand; Chinese Acad Sci, Key Lab Comp Sci, Beijing 100080, Peoples R
China
通讯作者地址: Wu, ZC, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing
100080, Peoples R China.
电 子 邮 箱 地 址 :
[email protected];
[email protected];
[email protected]; [email protected]
引用的参考文献数: 18
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-31112-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDV58
-------------------------------------------------------------------------------显示 14 条,共 136 条
作者: Gu, Y; Zhang, W; Liu, HC; Zhao, BH; Qu, YG
编者: Enokido, T; Yan, L; Xiao, B; Kim, D; Dai, Y; Yang, LT
标题: Energy-efficient target localization based on a prediction model
来源出版物: EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS,
PROCEEDINGS, 3823: 1178-1190 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Embedded and Ubiquitous Computing
会议日期: DEC 06-09, 2005
会议地点: Nagasaki, JAPAN
会议赞助商: Nagasaki Inst Appl Sci.; Int Federat Informat Proc.
作者关键词: wireless sensor networks; energy-efficient; prediction model; TLS
摘要: In this paper, we propose an energy-efficient target localization scheme (TLS) based on a
prediction model that can reveal the most likely zone the target will be in, and also a
corresponding two-step communication protocol between base station (BS) and sensors. BS uses a
query mechanism to determine which sensors should be used for detailed information according to
a limited amount of data received from the sensors. This scheme reduces both energy consumption
and communication bandwidth requirement, prolongs the lifetime of the wireless sensor networks.
Simulation results indicate that it can achieve a high accuracy while saving a large amount of
energy.
地址: Univ Sci & Technol China, Dept Comp Sci, Hefei 230027, Peoples R China; Chinese Acad
Sci, Sci Inst Software, Comp Sci Lab, Beijing 100864, Peoples R China
通讯作者地址: Gu, Y, Univ Sci & Technol China, Dept Comp Sci, Hefei 230027, Peoples R
China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 16
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30803-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 13
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDW22
-------------------------------------------------------------------------------显示 15 条,共 136 条
作者: Wan, WX; Liu, LB; Yuan, H; Ning, BQ; Zhang, SR
标题: The GPS measured SITEC caused by the very intense solar flare on July 14, 2000
来源出版物: SPACE WEATHER, 36 (12): 2465-2469 Sp. Iss. 2005 2005
丛书标题: ADVANCES IN SPACE RESEARCH
语言: English
文献类型: Article
作者关键词: space weather; GPS; total electron content; solar flares; sudden ionospheric
disturbances
KeyWords Plus: GEOMAGNETIC STORM; NETWORK DATA/; RADIO
摘要: This work studies the sudden increases in total electron content of the ionosphere caused by
the very intense solar flare on July 14, 2000. Total electron content (TEC) data observed from a
Global Positioning System (GPS) network are used to calculate the flare-induced TEC increment,
delta TECf, and variation rate, dTEC(f)/dt. It is found that both dTEC(f)/dt and delta TECf are
closely related with the solar zenith angles. To explain the observation results, we derived a simple
relationship between the partial derivative of the flare-induced TEC, partial derivative
TECf/partial derivative t, which is a good approximation for dTECf/dt, and the solar zenith angle
chi as well as the effective flare radiation flux If, according to the well-known Chapman theory of
ionization. The derived formula predicted that OTECf/partial derivative t is proportional to If and
inverse proportional to Chapman function ch(chi). This theoretical prediction not only explains the
correlation of dTEC(f)/dt and delta TECf with chi as shown in our TEC observation, but also gives
a way to deduce I-f from TEC observation of GPS network. Thus, the present work shows that
GPS observation is a powerful tool in the observation and investigation of solar flare effects on the
ionosphere, i.e., the sudden ionospheric disturbances, which is a significant phenomenon of space
weather. (c) 2005 COSPAR. Published by Elsevier Ltd. All rights reserved.
地址: Chinese Acad Sci, Inst Geol & Geophys, Beijing 100029, Peoples R China; Chinese Acad
Sci, Inst Software, Beijing 100080, Peoples R China; MIT, Haystack Observ, Westford, MA 01886
USA
通讯作者地址: Wan, WX, Chinese Acad Sci, Inst Geol & Geophys, Beijing 100029, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 12
被引频次: 4
出版商: ELSEVIER SCIENCE LTD
出版商地址: THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD 0X5 1GB,
OXON, ENGLAND
ISSN: 0273-1177
DOI: 10.1016/j.asr.2004.01.027
29 字符的来源出版物名称缩写: ADV SPACE RES
来源文献页码计数: 5
学科类别: Engineering, Aerospace; Astronomy & Astrophysics; Geosciences, Multidisciplinary;
Meteorology & Atmospheric Sciences
ISI 文献传递号: BDS48
-------------------------------------------------------------------------------显示 16 条,共 136 条
作者: Wang, P; Feng, DG; Wu, WL
编者: Feng, D; Lin, DD
书籍作者: Yung, M
标题: HCTR: A variable-input-length enciphering mode
来 源 出 版 物 : INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 3822:
175-188 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st SKLOIS Conference on Information Security and Cryptology
会议日期: DEC 15-17, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: State Key Lab Informat Secur, Chinese Acad Sci.
作者关键词: blockcipher; tweakable blockcipher; disk sector encryption; modes of operation;
symmetric encryption
KeyWords Plus: BLOCK CIPHERS
摘要: This paper proposes a blockcipher mode of operation, HCTR, which is a length-preserving
encryption mode. HCTR turns an n-bit blockcipher into a tweakable blockcipher that supports
arbitrary variable input length which is no less than n bits. The tweak length of HCTR is fixed and
can be zero. We prove that HCTR is a strong tweakable pseudorandom permutation (sprp), when
the underlying blockcipher is a strong pseudorandom permutation (sprp). HCTR is shown to be a
very efficient mode of operation when some pre-computations are taken into consideration.
Arbitrary variable input length brings much flexibility in various application environments. HCTR
can be used in disk sector encryption, and other length-preserving encryptions, especially for the
message that is not multiple of n bits.
地址: Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R
China; Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Wang, P, Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing
100049, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 27
被引频次: 15
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30855-5
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDQ31
-------------------------------------------------------------------------------显示 17 条,共 136 条
作者: Cao, TJ; Lin, DD
编者: Feng, D; Lin, DD
书籍作者: Yung, M
标题: Security analysis of some threshold signature schemes and multi-signature schemes
来 源 出 版 物 : INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 3822:
233-241 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st SKLOIS Conference on Information Security and Cryptology
会议日期: DEC 15-17, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: State Key Lab Informat Secur, Chinese Acad Sci.
摘要: Digital signature scheme allows a user to sign a message in such a way that anyone can
verify the signature, but no one can forge the signature on any other message. In this paper, we
show that Xie and Yu's threshold signature scheme, Huang and Chang's threshold proxy signature
scheme, Qian, Cao and Xue's pairing-based threshold proxy signature scheme, Xue and Cao's
multi-proxy signature scheme and Zhou et al.'s proxy multi-signature scheme are all insecure
against the forgery attacks.
地址: China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China;
Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Cao, TJ, China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 14
被引频次: 2
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30855-5
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 9
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDQ31
-------------------------------------------------------------------------------显示 18 条,共 136 条
作者: Wen, FT; Wu, WL; Wen, QY
编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC
标题: Error oracle attacks on several modes of operation
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 62-67 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
KeyWords Plus: ENCRYPTION
摘要: In [7] Vaudenay demonstrated side-channel attacks on CBC-mode encryption, exploiting a
"valid padding" oracle. His work showed that several uses of CBC-mode encryption in
well-known products and standards were vulnerable to attack when an adversary was able to
distinguish between valid and invalid ciphertexts. In [2] [5] [6], Black, Paterson, Taekeon et al.
generalized these attacks to various padding schemes of CBC-mode encryption and multiple
modes of operation. In this paper, we study side-channel attacks on the CFB, CBC vertical bar
CBC, CFB vertical bar CFB, CBC vertical bar CBC vertical bar CBC, CFB vertical bar CFB
vertical bar CFB modes under the error oracle models, which enable an adversary to determine the
correct message with knowledge of ciphertext. It is shown that an attacker can exploit an oracle to
efficiently extract the corresponding position plaintext bits of any block if the target plaintext
contains some fixed bits in a known position of one block.
地址: Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China; Chinese
Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China; Jinan
Univ, Sch Sci, Jinan 250022, Peoples R China
通讯作者地址: Wen, FT, Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R
China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 7
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30819-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 6
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 19 条,共 136 条
作者: Zhou, SJ; Lin, DD
编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC
标题: On anonymity of group signatures
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 131-136 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
KeyWords Plus: FOUNDATIONS; ASSUMPTIONS; EFFICIENT; SCHEMES
摘要: A secure group signature is required to be anonymous, that is, given two group signatures
generated by two different members on the same message or two group signatures generated by
the same member on two different messages, they are indistinguishable except for the group
manager. In this paper we prove the equivalence of a group signature's anonymity and its
indistinguishability against chosen ciphertext attacks if we view a group signature as an
encryption of member identity. Particularly, we prove ACJT's group signature is IND-CCA2
secure, so ACJT's scheme is anonymous in the strong sense. The result is an answer to an open
question in literature.
地址: Chinese Acad Sci, SKLOIS Lab, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhou, SJ, Chinese Acad Sci, SKLOIS Lab, Inst Software, 4 S 4th St, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 11
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30819-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 6
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 20 条,共 136 条
作者: Wang, DY; Lin, DD; Wu, WL
标题: A variant of Poly1305 MAC and its security proof
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 375-380 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Article
KeyWords Plus: HASH FUNCTIONS
摘要: We give a variant of Poly1305 MAC and prove its security viewing this MAC as a
Carter-Wegman MAC. The proposed variant not only keeps all the good properties of the
Poly1305, but also makes Poly1305 deterministic.
地址: Chinese Acad Sci, Inst Software, SKLOIS Lab, Beijing 100080, Peoples R China
通讯作者地址: Wang, DY, Chinese Acad Sci, Inst Software, SKLOIS Lab, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 10
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 6
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 21 条,共 136 条
作者: Shen, JJ; Qing, SH; Shen, QN; Li, LP
编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC
标题: Covert channel identification founded on information flow analysis
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 381-387 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
KeyWords Plus: STORAGE
摘要: This paper focuses on covert channel identification in a nondiscretionary secure system. The
properties of covert channels are analyzed by channel types. Information flow characteristics are
utilized to optimize channel identification with the Share Resource Matrix method adopted for
demonstration, and a general framework for channel identification founded on information flow
analysis is presented. At last, timing channels are also discussed.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Grad Univ, Chinese
Acad Sci, Beijing 100080, Peoples R China
通讯作者地址: Shen, JJ, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 9
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30819-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 7
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 22 条,共 136 条
作者: Zheng, QH; Qian, YT
编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC
标题: An event correlation approach based on the combination of IHU and codebook
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 757-763 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
KeyWords Plus: COMMUNICATION-NETWORKS; FAULT IDENTIFICATION
摘要: This paper proposes a new event correlation technique, which integrates the increment
hypothesis updating (IHU) technique with the codebook approach. The technique allows multiple
simultaneous independent faults to be identified when the system's codebook only includes the
codes of the single fault and lacks the information of prior fault probability and the conditional
probability of fault lead to symptoms occur. The method utilizes the refined IHU technique to
create and update fault hypotheses that can explain these events, and ranks these hypotheses by the
codebook approach. The result of event correlation is the hypothesis with maximum hamming
distance to the code of the received events. Simulation shows that this approach can get a high
accuracy and a fast speed of correlation even if the network has event loss and spuriousness.
地址: Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci, Hangzhou, Zjhejiang,
Peoples R China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing,
Peoples R China
通讯作者地址: Zheng, QH, Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci,
Hangzhou, Zjhejiang, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 10
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30819-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 7
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 23 条,共 136 条
作者: Liu, ZQ; Feng, DG
编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC
标题: Incremental fuzzy decision tree-based network forensic system
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 995-1002 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
摘要: Network forensic plays an important role in the modern network environment for computer
security, but it has become a time-consuming and daunting task due to the sheer amount of data
involved. This paper proposes a new method for constructing incremental fuzzy decision trees
based on network service type to reduce the human intervention and time-cost, and to improve the
comprehensibility of the results. At the end of paper, we discuss the performance of the forensic
system and present the result of experiments.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Liu, ZQ, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 13
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30819-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 8
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 24 条,共 136 条
作者: Cao, TJ; Lin, DD; Xue, R
编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC
标题: Universal designated-verifier proxy blind signatures for E-commerce
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,
3802: 1036-1041 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
摘要: To protect the privacy of proxy blind signature holders from dissemination of signatures by
verifiers, this paper introduces universal designated-verifier proxy blind signatures. In a universal
designated-verifier proxy blind signature scheme, any holder of a proxy blind signature can
convert the proxy blind signature into a designated-verifier signature. Given the
designated-signature, only the designated-verifier can verify that the message was signed by the
proxy signer, but is unable to convince anyone else of this fact. This paper also proposes an
ID-based universal designated-verifier proxy blind signature scheme from bilinear group-pairs.
The proposed scheme can be used in E-commerce to protect user privacy.
地址: China Univ Mining & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R
China; Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Cao, TJ, China Univ Mining & Technol, Sch Comp Sci & Technol, Xuzhou
221008, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 9
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30819-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 6
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ20
-------------------------------------------------------------------------------显示 25 条,共 136 条
作者: Luan, SM; Dai, GZ
书籍作者: Hao, Y
标题: A computational approach for belief change
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS,
3801: 355-360 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xian, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
KeyWords Plus: REVISION; LOGIC
摘要: In this paper, we combine the syntax-based belief change approach and model-based
approach, and present a computational approach for belief change. We introduce functions to
revise or contract a belief set, as well as functions to revise or contract a belief base. We also show
properties of the revision functions and the contraction functions. The implementation of the
revision functions and the contraction functions are also considered, and algorithms to revise a
belief set or contract a sentence from a belief set are also given. Compared with related works, the
main characteristic of our approach is that the functions can be implemented by algorithms.
地址: Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China
通讯作者地址: Luan, SM, Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 17
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30818-0
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 6
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ19
-------------------------------------------------------------------------------显示 26 条,共 136 条
作者: Jin, H; Wang, H; Wang, HG; Dai, GZ
书籍作者: Hao, Y
标题: Optimization design of controller periods using evolution strategy
来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS,
3801: 1100-1105 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Intelligence and Security
会议日期: DEC 15-19, 2005
会议地点: Xi'an, PEOPLES R CHINA
会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong
Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol.
摘要: For real-time computer-controlled systems, a control task does not have a fixed period but a
range of periods in which control performance varies. Hence for multiple tasks scheduled on a
single processor, to consider the optimization design of sampling periods in the co-design of
control and scheduling is necessary to improve the control performance and use limited computing
resource efficiently. In this paper, the mathematic description of the optimization problem of
designing periods is presented, and the optimization solution using evolution strategy is proposed.
The performances of proposed solution are revealed via simulation studies. Simulation shows that
the optimization design of sampling periods can be implemented by using the evolution strategy
method.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Jin, H, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 6
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30818-0
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 6
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDQ19
-------------------------------------------------------------------------------显示 27 条,共 136 条
作者: Zhang, ZF; Liu, ML; Xiao, LL
编者: Roy, B
标题: Parallel multi-party computation from linear multi-secret sharing schemes
来源出版物: ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 3788: 156-173 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 11th International Conference on the Theory and Application of Cryptology and
Information Security
会议日期: DEC 04-08, 2005
会议地点: Chennai, INDIA
会议赞助商: Int Assoc Cryptol Res.; Indian Inst Technol.
摘要: As an extension of multi-party computation (MPC), we propose the concept of secure
parallel multi-party computation which is to securely compute multi-functions against an
adversary with multistructures. Precisely, there are m functions f(1), ..., f(m) and m adversary
structures A(1), ..., A(m), where f(i) is required to be securely computed against an A(i)-adversary.
We give a general construction to build a parallel multi-party computation protocol from any
linear multi-secret sharing scheme (LMSSS), provided that the access structures of the LMSSS
allow MPC at all. When computing complicated functions, our protocol has more advantage in
communication complexity than the "direct sum" method which actually executes a MPC protocol
for each function. The paper also provides an efficient and generic construction to obtain from any
LMSSS a multiplicative LMSSS for the same multi-access structure.
地址: Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing 100080,
Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhang, ZF, Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 11
被引频次: 2
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30684-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 18
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDQ24
-------------------------------------------------------------------------------显示 28 条,共 136 条
作者: Zhang, Z; Che, HY; Shi, PF; Sun, Y; Gu, J
标题: Multi-labeled graph matching - An algorithm model for schema matching
来源出版物: ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS, 3818:
90-103 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Article
摘要: Schema matching is the task of finding semantic correspondences between elements of two
schemas, which plays a key role in many database applications. In this paper, we treat the schema
matching problem as a combinatorial problem. First, we propose an internal schema model, i.e.,
the multi-labeled graph, and transform schemas into multi-labeled graphs. Secondly, we discuss a
generic graph similarity measure, and propose an optimization function based on multi-labeled
graph similarity. Then, we cast schema matching problem into a multi-labeled graph matching
problem, which is a classic combinational problem. Finally, we implement a greedy algorithm to
find the feasible matching results.
地址: Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R
China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Univ Hong Kong,
Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
通讯作者地址: Zhang, Z, Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit,
Shanghai 200030, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 17
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDP59
-------------------------------------------------------------------------------显示 29 条,共 136 条
作者: Zhang, Z; Che, HY; Shi, PF; Sun, Y; Gu, J
编者: Grumbach, S; Sui, L; Vianu, V
标题: Schema homomorphism - An algebraic framework for schema matching
来源出版物: ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS - DATA
MANAGEMENT ON THE WEB , 3818: 255-256 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 10th Asian Computing Science Conference
会议日期: DEC 07-09, 2005
会议地点: Kunming, PEOPLES R CHINA
会议赞助商: AIT.; INRIA.; UNU/IIST.
摘要: A formal framework for SMP is important because it facilitates the building of algorithm
model and the evaluation of algorithms. First, we propose a formal definition of schema matching
that is named multivalent matching, i.e., an individual of source schema can be associated with a
set of individuals of target schema. Second, we develop the algebraic framework of multivalent
matching that is called schema homomorphism and propose the algorithm model of SMP. Then,
we discuss the relations between match cardinality and variants of schema homomorphism.
地址: Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R
China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Hong Kong Univ Sci
& Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
通讯作者地址: Zhang, Z, Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit,
Shanghai 200030, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 4
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30767-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 2
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDP59
-------------------------------------------------------------------------------显示 30 条,共 136 条
作者: Zhang, ZF; Feng, DG; Xu, J; Zhou, YB
编者: Qing, S; Mao, W; Lopez, J; Wang, G
标题: Efficient ID-based optimistic fair exchange with provable security
来源出版物: INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 3783:
14-26 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 7th International Conference on Information and Communications Security
会议日期: DEC 10-13, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Chinese Acad SCi.; Int Commun & Informat Secur Assoc.
作者关键词: fair exchange; identity-based signature; provable security
KeyWords Plus: DIGITAL-SIGNATURES; SCHEMES; PROTOCOL
摘要: The notion of identity based cryptosystem was introduced by Shamir in 1984, and has
attracted much interest since it eliminates the need of certificates and simplify the key
management. In this paper, we propose an optimistic fair exchange protocol for identity-based
signatures, A semi-trust third party (TTP) is still involved in our protocol to ensure fairness.
However, there is no need for registrations between users and TTP, and no zero-knowledge proof
is needed to provide verifiability. The proposed optimistic fair exchange protocol is much concise
and efficient, and can be shown to be secure in the random model with a tight security reduction.
地址: Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China;
Chinese Acad Sci, Inst Sofware, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch,
Beijing 100039, Peoples R China
通讯作者地址: Zhang, ZF, Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 22
被引频次: 3
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30934-9
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 13
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDQ16
-------------------------------------------------------------------------------显示 31 条,共 136 条
作者: Xu, G; Ma, JG; Huang, T
编者: Zhuge, H; Fox, GC
标题: A XML-based composition event approach as an integration and cooperation middleware
来源出版物: GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 3795:
436-442 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Symposium on Trustworthy Global Computing
会议日期: APR 07-09, 2005
会议地点: Edinburgh, SCOTLAND
摘要: Content-based Pub/Sub systems are gaining increasing popularity as an integration and
cooperation middleware supporting large-scale distributed applications, especially for Grid.
However, existing content-based Pub/Sub systems mainly focus on the "one-to-one" event
matching, not on the composite event matching. The composite event matching enables
application components to express more interest in the occurrence of event composite patterns. In
this paper, we present a XML-based composite event model that consists of the temporal logical
model and the event composite pattern. Based on the composite event model, a subscription
language (EXML-QL) is introduced by extending XML-QL to support the XML-based composite
event computing. Finally, in terms of the peculiarities of the subscription language, a composite
event matching process is presented and analyzed.
地址: Chinese Acad Sci, Technol Ctr Software Engn, Inst Software, Beijing 100080, Peoples R
China
通讯作者地址: Xu, G, Chinese Acad Sci, Technol Ctr Software Engn, Inst Software, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 8
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30510-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 7
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDQ17
-------------------------------------------------------------------------------显示 32 条,共 136 条
作者: Xu, J; Zhang, ZF; Feng, DG
编者: Desmedt, YG; Wang, H; Mu, Y; Li, Y
标题: ID-based aggregate signatures from bilinear pairings
来源出版物: CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 3810: 110-119
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 4th International Conference on Cryptology and Network Security
会议日期: DEC 14-16, 2005
会议地点: Xiamen, PEOPLES R CHINA
会议赞助商: Fujian Normal Univ.; Fujian Digital Certificate Author Co Ltd.; Int Assoc Cryptol
Res.
作者关键词: ID-based signatures; aggregate signatures; bilinear pairings
KeyWords Plus: CRYPTOSYSTEMS
摘要: Aggregate signature scheme was recently proposed by Boneh, Gentry, Lynn and Shacham,
which presented a method for combining n signatures from n different signers on n different
messages into one signature. In this paper, we propose an identity-based aggregate signature
scheme based on the bilinear pairings. This enhances the efficiency of communication and
signature verification process. We show that the security of our scheme is tightly related to the
computational Diffie-Hellman assumption in the random oracle model.
地址: Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst
Software, Beijing 100080, Peoples R China
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 16
被引频次: 4
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30849-0
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDP94
-------------------------------------------------------------------------------显示 33 条,共 136 条
作者: Zhang, ZF; Xu, J; Feng, DG
编者: Desmedt, YG; Wang, H; Mu, Y; Li, Y
标题: Efficient identity-based protocol for fair certified e-mail delivery
来源出版物: CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 3810: 200-210
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 4th International Conference on Cryptology and Network Security
会议日期: DEC 14-16, 2005
会议地点: Xiamen, PEOPLES R CHINA
会议赞助商: Fujian Normal Univ.; Fujian Digital Certificate Author Co Ltd.; Int Assoc Cryptol
Res.
作者关键词: fair exchange; certified e-mail; security protocol; identity-based signature
KeyWords Plus: SIGNATURES; EXCHANGE
摘要: Certified e-mail delivery has become one of the basic requirement in performing business
transactions over the Internet securely. How to construct efficient fair protocols for certified e-mail
delivery is of great interest. The notion of identity based cryptosystem has attracted much interest
since its introduction by Shamir in 1984, as it eliminates the need of certificates and simplifies the
key management. In this paper, we propose a fair protocol for certified e-mail delivery based on
identity-based signatures. A semi-trust third party (TTP) is involved in our protocol to ensure
fairness, who does not need to store anything except its own private-key. There is no need for an
additional registration between users and TTP. The proposed scheme is the first identity-based
protocol with such a concise frame and is computation- and communication-efficient.
地址: Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China;
Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch,
Beijing 100039, Peoples R China
通讯作者地址: Zhang, ZF, Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 24
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-30849-0
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 11
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDP94
-------------------------------------------------------------------------------显示 34 条,共 136 条
作者: Luan, SM; Dai, GZ; Li, W
标题: A programmable approach to revising knowledge bases
来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (6): 681-692
DEC 2005
语言: English
文献类型: Article
作者关键词: knowledge base; knowledge base revision; rules; predicate logic; propositional logic
KeyWords Plus: BELIEF REVISION; LOGIC; CONTRACTION; OPERATORS
摘要: This paper presents a programmable approach to revising knowledge bases consisting of
clauses. Some theorems and lemmas are shown in order to give procedures for generating
maximally consistent subsets. Then a complete procedure and an incomplete procedure for
generating the maximal consistent subsets are presented, and the correctness of the procedures is
also shown. Furthermore, a way to implement knowledge base revision is presented, and a
prototype system is introduced. Compared with related works, the main characteristic of our
approach is that the approach can be implemented by a computer program.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Beijing Univ Aeronaut
& Astronaut, Dept Comp Sci & Technol, Beijing 100083, Peoples R China
通讯作者地址: Luan, SM, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 28
被引频次: 3
出版商: SCIENCE PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1009-2757
DOI: 10.1360/03yf0327
29 字符的来源出版物名称缩写: SCI CHINA SER F
ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci.
来源文献页码计数: 12
学科类别: Computer Science, Information Systems
ISI 文献传递号: 008AS
-------------------------------------------------------------------------------显示 35 条,共 136 条
作者: Wang, XC; Qin, YY; Tian, F; Dai, GZ
编者: Tao, J; Picard, RW
标题: Scenario-based interactive intention understanding in pen-based user interfaces
来 源 出 版 物 : AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION,
PROCEEDINGS, 3784: 828-835 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Conference on Affective Computing and Intelligent Interaction
会议日期: OCT 22-24, 2005
会议地点: Beijing, PEOPLES R CHINA
会议赞助商: Nokia Ltd.; Siemens Ltd.; Int Speech Commun Assoc.; Natl Nat Sci Fdn China.;
Chinese Assoc Automat.; China Soc Image & Graph.; China Comp Federat.; Natl High-Tech Res
& Dev Program.
摘要: Interactive intention understanding is important for Penbased User Interface (PUI). Many
works on this topic are reported, and focus on handwriting or sketching recognition algorithms at
the lexical layer. But these algorithms cannot totally solve the problem of intention understanding
and can not provide the pen-based softwaxe with high usability. Hence, a scenario-based
interactive intention understanding framework is presented in this paper, and is used to simulate
human cognitive mechanisms and cognitive habits. By providing the understanding environment
supporting the framework, we can apply the framework to the practical PUI system. The
evaluation of the Scientific Training Management System for the Chinese National Diving Team
shows that the framework is effective in improving the usability and enhancing the intention
understanding capacity of this system.
地址: Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China
通讯作者地址: Wang, XC, Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 14
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29621-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 8
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDM83
-------------------------------------------------------------------------------显示 36 条,共 136 条
作者: Bi, WX; Wang, XG; Tang, Z; Tamura, H
标题: Avoiding the local minima problem in backpropagation algorithm with modified error
function
来 源 出 版 物 : IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS
COMMUNICATIONS AND COMPUTER SCIENCES, E88A (12): 3645-3653 DEC 2005
语言: English
文献类型: Article
作者关键词: backpropagation; learning; local minima; modified error function
KeyWords Plus: NEURAL-NETWORKS
摘要: One critical "drawback" of the backpropagation algorithm is the local minima problem. We
have noted that the local minima problem in the backpropagation algorithm is usually caused by
update disharmony between weights connected to the hidden layer and the output layer. To solve
this kind of local minima problem, we propose a modified error function with two terms. By
adding one term to the conventional error function., the modified error function can harmonize the
update of weights connected to the hidden layer and those connected to the output layer. Thus, it
can avoid the local minima problem caused by such disharmony. Simulations on some benchmark
problems and a real classification task have been performed to test the validity of the modified
error function.
地址: Toyama Univ, Fac Engn, Toyama 9308555, Japan; Chinese Acad Sci, Inst Software,
Intelligence Engn Lab, Beijing 100864, Peoples R China
通讯作者地址: Bi, WX, Toyama Univ, Fac Engn, Toyama 9308555, Japan.
电子邮箱地址: [email protected]
引用的参考文献数: 30
被引频次: 0
出版商: IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
出 版 商 地 址 : KIKAI-SHINKO-KAIKAN BLDG MINATO-KU SHIBAKOEN 3 CHOME,
TOKYO, 105, JAPAN
ISSN: 0916-8508
DOI: 10.1093/ietfec/e88-a.12.3645
29 字符的来源出版物名称缩写: IEICE TRANS FUND ELEC COM COM
ISO 来源文献出版物名称缩写: IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
来源文献页码计数: 9
学科类别: Computer Science, Hardware & Architecture; Computer Science, Information Systems;
Engineering, Electrical & Electronic
ISI 文献传递号: 997XD
-------------------------------------------------------------------------------显示 37 条,共 136 条
作者: Wang, L; Wu, CK
标题: Efficient identity-based multicast scheme from bilinear pairing
来源出版物: IEE PROCEEDINGS-COMMUNICATIONS, 152 (6): 877-882 DEC 2005
语言: English
文献类型: Article
KeyWords Plus: ENCRYPTION
摘要: In a multicast communication system, when the membership changes, the group key must
be refreshed securely and efficiently. The efficiency of the group key refreshment is critical,
especially in a dynamic and large group since the size of deleted or added members may be quite
large. An efficient identity-based multicast scheme based on pairings is proposed. It has distinct
advantages in secure service over the existing schemes in the sense of dynamic group key
management. The scheme satisfies forward secrecy and backward secrecy. A solution is also
presented to the source authentication and data integrity services without introducing additional
computation. In this scheme, the member can be a stateless receiver, Who does not need to update
his/her state from session to session.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Wang, L, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 27
被引频次: 3
出版商: IEE-INST ELEC ENG
出版商地址: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD
SG1 2AY, ENGLAND
ISSN: 1350-2425
DOI: 10.1049/ip-com:20045308
29 字符的来源出版物名称缩写: IEE PROC-COMMUN
ISO 来源文献出版物名称缩写: IEE Proc.-Commun.
来源文献页码计数: 6
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 998KX
-------------------------------------------------------------------------------显示 38 条,共 136 条
作者: Cao, T; Lin, D; Xue, R
标题: ID-based designated-verifier proxy signatures
来源出版物: IEE PROCEEDINGS-COMMUNICATIONS, 152 (6): 989-994 DEC 2005
语言: English
文献类型: Article
摘要: Designated-verifier proxy signature (DVPS) is a proxy signature that can only be verified
by a designated verifier. DVPS has three variants: weak DVPS, strong DVPS and universal DVPS.
In a weak DVPS, the designated verifier can further convert a proxy signature into a public
verifiable signature. In a strong DVPS, the designated verifier cannot prove to any third party that
the signature is generated by the proxy signer. In a universal DVPS.. any holder of a proxy
signature can designate the signature to any designated verifier. Based on Cha and Cheon's
identity (ID)-based signatures, an ID-based weak DVPS scheme. an ID-based strong, DVPS
scheme and an ID-based universal DVPS scheme are designed. The proposed schemes satisfy all
the desired security properties.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China; China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China
通讯作者地址: Cao, T, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 14
被引频次: 1
出版商: IEE-INST ELEC ENG
出版商地址: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD
SG1 2AY, ENGLAND
ISSN: 1350-2425
DOI: 10.1049/ip-com:20045270
29 字符的来源出版物名称缩写: IEE PROC-COMMUN
ISO 来源文献出版物名称缩写: IEE Proc.-Commun.
来源文献页码计数: 6
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 998KX
-------------------------------------------------------------------------------显示 39 条,共 136 条
作者: Wu, CK
标题: Hash channels
来源出版物: COMPUTERS & SECURITY, 24 (8): 653-661 NOV 2005
语言: English
文献类型: Article
作者关键词: subliminal channel; hash function; digital signature
KeyWords Plus: SUBLIMINAL CHANNELS; PROTOCOL
摘要: It is believed that in authentication protocols where no random numbers are involved, it is
hard to introduce subliminal channels. In this paper we show that subliminal channels exist in
digital signature schemes where no random numbers are used. The source where the subliminal
channels exist is widely acceptable hash functions with their outputs being of some randomness.
Because the subliminal channels are established by using hash functions, the subliminal channels
are called hash channels in this paper. This indicates that there exist subliminal channels in any
authentication protocols that use hash functions. (C) 2005 Elsevier Ltd. All rights reserved.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China; Australian Natl Univ, Dept Comp Sci, Canberra, ACT 0200, Australia
通讯作者地址: Wu, CK, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 23
被引频次: 1
出版商: ELSEVIER ADVANCED TECHNOLOGY
出版商地址: OXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE,
KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND
ISSN: 0167-4048
DOI: 10.1016/j.cose.2005.04.007
29 字符的来源出版物名称缩写: COMPUT SECURITY
ISO 来源文献出版物名称缩写: Comput. Secur.
来源文献页码计数: 9
学科类别: Computer Science, Information Systems
ISI 文献传递号: 996QP
-------------------------------------------------------------------------------显示 40 条,共 136 条
作者: Hu, CY (Hu, Chenyong); Zhang, BY (Zhang, Benyu); Wang, YJ (Wang, Yongji); Yan, SC
(Yan, Shuicheng); Chen, Z (Chen, Zheng); Wang, Q (Wang, Qing); Yang, Q (Yang, Qiang)
标题: Learning quantifiable associations via principal sparse non-negative matrix factorization
来源出版物: INTELLIGENT DATA ANALYSIS, 9 (6): 603-620 2005
语言: English
文献类型: Article
作者关键词: data mining; association rules; non-negative matrix factorization; principal sparse
non-negative matrix factorization
摘要: Association rules are traditionally designed to capture statistical relationship among itemsets
in a given database. To additionally capture the quantitative association knowledge, Korn et. al.
recently propose a paradigm named Ratio Rules [6] for quantifiable data mining. However, their
approach is mainly based on Principle Component Analysis (PCA), and as a result, it cannot
guarantee that the ratio coefficients are non-negative. This may lead to serious problems in the
rules' application. In this paper, we propose a new method, called Principal Sparse Non-negative
Matrix Factorization (PSNMF), for learning the associations between itemsets in the form of Ratio
Rules. In addition, we provide a support measurement to weigh the importance of each rule for the
entire dataset. Experiments on several datasets illustrate that the proposed method performs well
for discovering latent associations between itemsets in large datasets.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R
China; Microsoft Res Asia, Beijing 100080, Peoples R China; Chinese Univ Hong Kong, Dept
Informat Engn, Hong Kong, Hong Kong, Peoples R China; Hong Kong Univ Sci & Technol, Dept
Comp Sci, Sha Tin, Hong Kong, Peoples R China; Chinese Acad Sci, Inst Software, Key Lab
Comp Sci, Beijing, Peoples R China
通讯作者地址: Hu, CY, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing
100080, Peoples R China.
电 子 邮 箱 地 址 :
[email protected];
[email protected];
[email protected];
[email protected];
[email protected];
[email protected]; [email protected]
引用的参考文献数: 22
被引频次: 1
出版商: IOS PRESS
出版商地址: NIEUWE HEMWEG 6B, 1013 BG AMSTERDAM, NETHERLANDS
ISSN: 1088-467X
29 字符的来源出版物名称缩写: INTELL DATA ANAL
ISO 来源文献出版物名称缩写: Intell. Data Anal.
来源文献页码计数: 18
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: V43YE
-------------------------------------------------------------------------------显示 41 条,共 136 条
作者: Xu, J; Zhang, ZF; Feng, DG
编者: Chen, G; Pan, Y; Guo, M; Lu, J
标题: ID-based proxy signature using bilinear pairings
来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA
2005 WORKSHOPS, 3759: 359-367 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN,
SGCA and WISA
会议日期: NOV 02-05, 2005
会议地点: Nanjing, PEOPLES R CHINA
会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol.
作者关键词: ID-based signatures; proxy signatures; bilinear pairings; provable security
摘 要 : Identity-based (ID-based) public key cryptosystem can be a good alternative for
certificate-based public key setting, especially when efficient key management and moderate
security are required. A proxy signature scheme permits an entity to delegate its signing rights to
another entity. But to date, no ID-based proxy signature scheme with provable security has been
proposed. In this paper, we formalize a notion of security for ID-based proxy signature schemes
and propose a scheme based on the bilinear pairings. We show that the security of our scheme is
tightly related to the computational Diffie-Hellman assumption in the random oracle model.
地址: Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst
Software, Beijing 100080, Peoples R China
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 17
被引频次: 4
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29770-7
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 9
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDJ16
-------------------------------------------------------------------------------显示 42 条,共 136 条
作者: Zhang, ZF; Feng, DG
编者: Chen, G; Pan, Y; Guo, M; Lu, J
标题: Efficient fair certified e-mail delivery based on RSA
来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA
2005 WORKSHOPS, 3759: 368-377 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN,
SGCA and WISA
会议日期: NOV 02-05, 2005
会议地点: Nanjing, PEOPLES R CHINA
会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol.
作者关键词: fair exchange; RSA; e-mail; security protocol
KeyWords Plus: SIGNATURES; EXCHANGE
摘要: Certified e-mail delivery (CEMD) has become one of the basic requirement in performing
business transactions over the Internet securely. How to construct fair protocols for certified
e-mail delivery based on the RSA cryptosystem is of great interest.
Recently, Nenadic etc. proposed a novel RSA-based method for the verifiable and recoverable
encrypted signature (VRES), anti utilized it to construct a security protocol for certified e-mail
delivery, which are claimed to provide strong fairness to ensure that the recipient receives the
e-mail if and only if the sender receives the receipt. However, as a building block, their
RSA-based VRES is totally breakable. This papers shows that an adversary can generate a valid
VRES which cannot be recovered by the designated TTP, and hence the proposed certified e-mail
delivery protocol cannot guarantee the required fairness.
Based on probabilistic signatures, we proposed a novel fair CEMD protocol which works with the
RSA cryptosystem and guarantees strong fairness. Moreover, there is no need for a registration
phase between a party and TTP, and the proposed protocol is more computation and
communication efficient.
地址: Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R
China
通讯作者地址: Zhang, ZF, Chinese Acad Sci, State Key Lab Informat Secur, Inst Software,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 17
被引频次: 3
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29770-7
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDJ16
-------------------------------------------------------------------------------显示 43 条,共 136 条
作者: Zhang, LW; Feng, DG
编者: Chen, G; Pan, Y; Guo, M; Lu, J
标题: Intrusion tolerant CA scheme with cheaters detection ability
来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA
2005 WORKSHOPS, 3759: 378-386 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN,
SGCA and WISA
会议日期: NOV 02-05, 2005
会议地点: Nanjing, PEOPLES R CHINA
会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol.
作者关键词: intrusion tolerance; threshold signature; CA; proactive
摘要: In this paper, we put forward a practical intrusion tolerant CA scheme with the ability of
cheater detection. Compared to the scheme of ITTC's project[1], the scheme has built-in ability of
detecting cheaters, and has ability to generate signature without specifying one group of servers in
the serial mode. We also present shares proactive refresh protocol to prevent key shares from
gradually exposed or corrupted. Our scheme can be changed from (t, n) scheme to (t, n + 1)
scheme.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Zhang, LW, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 10
被引频次: 2
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29770-7
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 9
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDJ16
-------------------------------------------------------------------------------显示 44 条,共 136 条
作者: Cong, LL; Jin, BH; Cao, DL; Cao, JN
编者: Pan, Y; Chen, D; Guo, M; Cao, JN; Dongarra, J
标题: GCPM: A model for efficient call admission control in wireless cellular networks
来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 3758:
945-954 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 3rd International Conference on Parallel and Distributed Processing and Applications
会议日期: NOV 02-05, 2005
会议地点: Nanjing, PEOPLES R CHINA
会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol.
作者关键词: call admission control; guard channel; guard channel prediction model (GCPM);
quality of service (QoS); wireless/mobile cellular networks
摘要: Call Admission Control (CAC) is crucial for assuring the quality of service (QoS) of
communication in wireless cellular networks. In this paper, we propose a model, called Guard
Channel Prediction Model (GCPM), for efficient call admission control satisfying the QoS
requirements. A predictive value of the appropriate number of guard channels can be calculated
based on this model by using statistical properties of new and handoff call arrival rates and mean
call residency time, as well as the total capacity of a specific cell. Simulation studies are carried
out to evaluate the performance in comparison with an existing adaptive algorithm under variable
traffic loads and mobility patterns. Simulation results show that our proposed GCPM, using the
static and fractional Guard Channel policy to process both types of incoming calls based on the
predictive values, has gained better QoS with less blocking probabilities of both types of calls and
meanwhile, larger network utilizations.
地址: Chinese Acad Sci, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch,
Beijing, Peoples R China; Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong,
Peoples R China
通讯作者地址: Cong, LL, Chinese Acad Sci, Inst Software, Beijing, Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 14
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29769-3
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDJ13
-------------------------------------------------------------------------------显示 45 条,共 136 条
作者: Wang, JF; Zhou, HX; Xu, FJ; Li, L
编者: Pan, Y; Chen, D; Guo, M; Cao, JN; Dongarra, J
标题: Hyper-Erlang based model for network traffic approximation
来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 3758:
1012-1023 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 3rd International Conference on Parallel and Distributed Processing and Applications
会议日期: NOV 02-05, 2005
会议地点: Nanjing, PEOPLES R CHINA
会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol.
KeyWords Plus: TAIL DISTRIBUTIONS
摘要: The long-tailed distribution characterizes many properties of Internet traffic. The property is
often modeled by Lognormal distribution, Weibull or Pareto distribution theoretically. However, it
hinders us in traffic analysis and evaluation studies directly from these models due to their
complex representations and theoretical properties. This paper proposes a Hyper-Erlang Model
(Mixed Erlang distribution) for such long-tailed network traffic approximation. It fits network
traffic with long-tailed characteristic into a mixed Erlang distribution directly to facilitate our
further analysis. Compared with the well-known hyperexponential based method, the mixed
Erlang model is more accurate in fitting the tail behavior and also computationally efficient.
地址: Chinese Acad Sci, Natl Key Lab Integrated Informat Syst Technol, Inst Software, Beijing
100080, Peoples R China; Chongqing Commun Inst, Chongqing 400035, Peoples R China
通讯作者地址: Wang, JF, Chinese Acad Sci, Natl Key Lab Integrated Informat Syst Technol, Inst
Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 19
被引频次: 2
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29769-3
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDJ13
-------------------------------------------------------------------------------显示 46 条,共 136 条
作者: Ding, XN; Zhang, X; Jin, BH; Huang, T
编者: Meersman, R; Tari, Z; Hacid, MS; Mylopoulos, J; Pernici, B; Babaoglu, O; Jacobsen, HA;
Loyall, J; Kifer, M; Spaccapietra, S
标题: A task-type aware transaction scheduling algorithm in J2EE
来源出版物: ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: COOPIS,
DOA, AND ODBASE, PT 2, PROCEEDINGS, 3761: 1034-1045 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: OTM Confederated International Conference and Workshop
会议日期: OCT 31-NOV 04, 2005
会议地点: Agia Napa, CYPRUS
会议赞助商: RMIT Univ.; Vrije Univ Brussels, Dept Comp Sci.; Interop.
摘要: A large number of J2EE applications use entity beans as their application persistence
mechanism, while current J2EE scheduling to entity beans is still a simple First-Come
First-Served (FCFS) policy, Due to this simple policy, the scheduling does not distinguish the key
transactions from the trivial ones. A task-type aware scheduling algorithm should be adopted to
provide better service for key transactions. However, some characteristics of ME middleware
transaction processing, such as the absence of necessary scheduling information and the
interactive executing model, made it impossible to apply the traditional priority-driven scheduling
algorithms. This paper puts forward a scheduling algorithm named TMPBP, which offers a new
dynamic priority assignment algorithm HRS that can recognize the key tasks at runtime
heuristically. Additionally, TMPBP add some extra techniques to the traditional concurrency
control policies according to the features of ME The algorithm is proven to be safe and will not
produce starvation or priority inversion, The experimental evaluations indicated that TMPBP
improves the Quality of Service (QoS) of key tasks effectively, especially when the server is under
a heavy load.
地址: Chinese Acad Sci, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch,
Beijing, Peoples R China
通讯作者地址: Ding, XN, Chinese Acad Sci, Inst Software, Beijing, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 17
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29738-3
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDJ18
-------------------------------------------------------------------------------显示 47 条,共 136 条
作者: Wang, P; Feng, DG; Wu, WL
编者: Zhou, J; Lopez, J; Deng, RH; Bao, F
标题: On the security of tweakable modes of operation: TBC and TAE
来源出版物: INFORMATION SECURITY, PROCEEDINGS, 3650: 274-287 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 8th International Conference on Information Security
会议日期: SEP 20-23, 2005
会议地点: Singapore, SINGAPORE
会议赞助商: Inst Infocomm Res.; Singapore Management Univ.
作者关键词: blockcipher; tweakable blockcipher; modes of operation; symmetric encryption;
authenticated encryption
KeyWords Plus: BLOCK-CIPHER
摘要: We investigate the security of two tweakable-blockcipher-based modes TBC and TAE
proposed in [13]. Our results show that: (1) The TBC encryption mode, whether randomized or
stateful, is secure in the sense of indistinguishability from random bits; (2) Theorem 3 in [13] is
wrong. A simple counterexample against the authenticity of TAE is presented, which shows that
the secure tweakable blockcipher against chosen plaintext attack is not sufficient for the security
of the TAE mode.
地址: Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100049, Peoples R
China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R
China
通讯作者地址: Wang, P, Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing
100049, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 21
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29001-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDI50
-------------------------------------------------------------------------------显示 48 条,共 136 条
作者: Zhan, NJ; Majster-Cederbaum, M
编者: Wang, F
标题: Deriving non-determinism from conjunction and disjunction
来源出版物: FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS FORTE 2005, 3731: 351-365 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 25th International Conference on Formal Techniques for Networked and Distributed
Systems
会议日期: OCT 02-05, 2005
会议地点: Taipei, TAIWAN
会议赞助商: IFIP Working Grp 6 1.
作者关键词: non-determinism; synchronization tree logic; mu-calculus; process algebra
KeyWords Plus: PROPOSITIONAL MU-CALCULUS
摘要: In this paper, we show that the non-deterministic choice "+", which was proposed as a
primitive operator in Synchronization Tree Logic (STL for short) can be defined essentially by
conjunction and disjunction in the mu-calculus (mu M for short). This is obtained by extending the
mu-calculus with the non-deterministic choice "+" (denoted by mu M+) and then showing that mu
M+ can be translated into mu M. Furthermore, we also prove that STL can be encoded into mu
M+ and therefore into mu M.
地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China; Univ
Mannheim, Fak Math & Informat, Lehrstuhl Prakt Informat 2, D-68163 Mannheim, Germany
通讯作者地址: Zhan, NJ, Chinese Acad Sci, Inst Software, Comp Sci Lab, S 4th St 4, Beijing
100080, Peoples R China.
引用的参考文献数: 11
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29189-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 15
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDI24
-------------------------------------------------------------------------------显示 49 条,共 136 条
作者: Li, YJ
编者: Wang, F
标题: The inductive approach to strand space
来源出版物: FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS FORTE 2005, 3731: 547-552 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 25th International Conference on Formal Techniques for Networked and Distributed
Systems
会议日期: OCT 02-05, 2005
会议地点: Taipei, TAIWAN
会议赞助商: IFIP Working Grp 6 1.
摘要: Strand space is a promising technique developed by Guttman et al. from MITRE company,
and it provides us an intuitive and clear framework to analyze security protocols, but its mechanics
of the proof tend to be quite intricate and not necessarily easy to be formalized. In this paper, we
combine the inductive approach with strand space. We introduce an inductive definition for
bundles, and it not only provides us a constructive illustration for a bundle, but also introduces an
effective and rigorous technique of rule induction to prove properties of bundles. Using this
induction principle, we not only prove that a bundle is a casually well-founded graph, but also
give a rigorous proof for results of authentication tests. Our result of authentication test extends
Guttman's result to a more general case, and its proof is also much easier and clearer. As a trivial
case study, we prove authentication properties of Needham-Schroeder-Lowe protocol. Our
approach has been mechanized using Isabelle/HOL.
地址: Chinese Acad Sci, Key Lab Comp Sci, Beijing, Peoples R China; Chinese Acad Sci, Inst
Software, State Key Lab Informat Secur, Beijing, Peoples R China
通讯作者地址: Li, YJ, Chinese Acad Sci, Key Lab Comp Sci, POB 8718, Beijing, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 3
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29189-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDI24
-------------------------------------------------------------------------------显示 50 条,共 136 条
作者: Wu, P; Zhang, DM
编者: Wang, F
标题: Compositional modelling and verification of IPv6 mobility
来源出版物: FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS FORTE 2005, 3731: 553-556 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 25th International Conference on Formal Techniques for Networked and Distributed
Systems
会议日期: OCT 02-05, 2005
会议地点: Taipei, TAIWAN
会议赞助商: IFIP Working Grp 6 1.
摘要: An enhanced compositional framework is presented for modelling network protocols with
symbolic transition graphs. In the context of the modelling framework, a sufficient condition for
deadlock freedom of network protocols, namely interoperability, is reconstructed in a more
concise way with an advantage that it allows for symbolic verification without referring to
protocol states. Furthermore, a case study with Mobile IPv6 illustrates the effectiveness of the
improved modelling framework and also discloses some infrangibilities of Mobile IPv6 in the
sense that it can not maintain the binding coherency all the time, which may result in unreachable
or unstable routes.
地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Grad Sch, Beijing 100080, Peoples R
China; Beijing Univ Posts & Telecommun, Sch Comp Sci & Technol, Beijing 100876, Peoples R
China
通讯作者地址: Wu, P, Chinese Acad Sci, Inst Software, Comp Sci Lab, Grad Sch, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 5
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29189-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 4
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDI24
-------------------------------------------------------------------------------显示 51 条,共 136 条
作者: Zhou, ZY; Liang, B; Jiang, L; Shi, WC; He, YP
标题: A formal description of SECIMOS operating system
来源出版物: COMPUTER NETWORK SECURITY, PROCEEDINGS, 3685: 286-297 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Article
摘要: The application of formal methods in secure operating system experiences a procedure of
development and maturity with the eminence and development of secure operating system itself.
According to Common Criteria and United States Department of Defenses Trusted Computer
System Evaluation Criteria (TCSEC), high security level secure operating system should introduce
formal methods in the process development and evaluation. Security in Mind Operating System
(SEC-IMOS) is a customizable secure operating system developed by Institute of Software,
Chinese Academy of Science. In this work, we formally model the security policies using Z
specification language and informally proved the correspondence between policies and top level
functionalities. As a result, we summarize the gist to choose a formal description language for
modeling a secure operating system and possibility of use Isabelle/HOL as a formal tool.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad
Sch, Beijing 100049, Peoples R China; Hunan Univ, Coll Comp & Commun, Changsha 410082,
Peoples R China; Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China;
Beijing Venus Info Tech Inc, Beijing 100081, Peoples R China
通讯作者地址: Zhou, ZY, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]; [email protected]
引用的参考文献数: 15
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDI14
-------------------------------------------------------------------------------显示 52 条,共 136 条
作者: Sun, JQ; Ma, ZQ; Tian, YM; Qin, MZ
标题: Symplectic structure of poisson system
来源出版物: APPLIED MATHEMATICS AND MECHANICS-ENGLISH EDITION, 26 (11):
1484-1490 NOV 2005
语言: English
文献类型: Article
作者关键词: Poisson system; nonlinear transformation; symplectic method; rigid body problem
KeyWords Plus: INTEGRATION; EQUATIONS; SCHEMES
摘要: When the Poisson matrix of Poisson system is non-constant, classical symplectic methods,
such as symplectic Runge-Kutta method, generating function method, cannot preserve the Poisson
structure. The non-constant Poisson structure was transformed into the symplectic structure by the
nonlinear transform. Arbitrary order symplectic method was applied to the transformed Poisson
system. The Euler equation of the free rigid body problem was transformed into the symplectic
structure and computed by the mid-point scheme. Numerical results show the effectiveness of the
nonlinear transform.
地址: Chinese Acad Sci, Inst High Energy Phys, Beijing 100039, Peoples R China; Inst Appl Phys
& Computat Math, Beijing 100088, Peoples R China; Chinese Acad Sci, Inst Software, Beijing
100080, Peoples R China; Chinese Acad Sci, Inst Computat Math, Beijing 100080, Peoples R
China
通讯作者地址: Sun, JQ, Chinese Acad Sci, Inst High Energy Phys, Beijing 100039, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 7
被引频次: 0
出版商: SHANGHAI UNIV
出版商地址: 149 YANCHANG RD, SHANGHAI 200072, PEOPLES R CHINA
ISSN: 0253-4827
29 字符的来源出版物名称缩写: APPL MATH MECH-ENGL ED
ISO 来源文献出版物名称缩写: Appl. Math. Mech.-Engl. Ed.
来源文献页码计数: 7
学科类别: Mathematics, Applied; Mechanics
ISI 文献传递号: 990YP
-------------------------------------------------------------------------------显示 53 条,共 136 条
作者: Zhan, NJ; Wu, JZ
编者: VanHung, D; Wirsing, M
标题: Compositionality of fixpoint logic with chop
来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2005, 3722: 136-150 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Colloquium on Theoretical Aspects of Computing
会议日期: OCT 17-21, 2005
会议地点: Hanoi, VIETNAM
会议赞助商: United Nations Univ, Int Inst Software Technol.; Vietnam Natl Univ.; Vietnam Acad
Sci & Technol.
作者关键词: FLC; compositionality; verification; bisimulation; characteristic formula; basic
process algebra
KeyWords Plus: DIVERGENCE
摘要: Compositionality plays an important role in designing reactive systems as it allows one to
compose/decompose a complex system from/to several simpler components. Generally speaking,
it is hard to design a complex system in a logical frame in a compositional way because it is
difficult to find a connection between the structure of a system to be developed and that of its
specification given by the logic. In this paper, we investigate the compositionality of the Fixpoint
Logic with Chop (FLC for short). To this end, we extend FLC with the nondeterministic choice
"+" (FLC+ for the extension) and then establish a correspondence between the logic and the basic
process algebra with deadlock and termination (abbreviated BPA(delta)(epsilon)). Subsequently,
we show that the choice is definable in FLC.
As an application of the compositionality of FLC, an algorithm is given to construct characteristic
formulae of BPA(delta)(epsilon) up to strong bisimulation directly from the syntax of processes in
a compositional manner.
地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China; Univ
Mannheim, Lehrstuhl Prakt Informat 2, Fak Math & Informat, D-68163 Mannheim, Germany
通讯作者地址: Zhan, NJ, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080,
Peoples R China.
引用的参考文献数: 28
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29107-5
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 15
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDG72
-------------------------------------------------------------------------------显示 54 条,共 136 条
作者: Yan, RJ; Li, GY; Tang, ZS
编者: VanHung, D; Wirsing, M
标题: Symbolic model checking of finite precision timed automata
来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2005, 3722: 272-287 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Colloquium on Theoretical Aspects of Computing
会议日期: OCT 17-21, 2005
会议地点: Hanoi, VIETNAM
会议赞助商: United Nations Univ, Int Inst Software Technol.; Vietnam Natl Univ.; Vietnam Acad
Sci & Technol.
作者关键词: finite precision timed automata; model checking; symbolic methods
KeyWords Plus: VERIFICATION; ALGORITHMS
摘要: This paper introduces the notion of finite precision timed automata (FPTAs) and proposes a
data structure to represent its symbolic states. To reduce the state space, FPTAs only record the
integer values of clock variables together with the order of their most recent resets. We provide
constraints under which the reachability checking of a timed automaton can be reduced to that of
the corresponding FPTA, and then present an algorithm for reachability analysis. Finally, the paper
reports some preliminary experimental results, and analyzes the advantages and disadvantages of
the new data structure.
地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China; Chinese
Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Yan, RJ, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 25
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29107-5
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 16
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDG72
-------------------------------------------------------------------------------显示 55 条,共 136 条
作者: Sun, JC
编者: Hobbs, M; Goscinski, AM; Zhou, W
标题: Multi-color difference schemes of Helmholtz equation and its parallel fast solver over 3-D
dodecahedron partitions
来源出版物: DISTRIBUTED AND PARALLEL COMPUTING, 3719: 301-308 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 6th International Conference on Algorithms and Architectures for Parallel Processing
会议日期: OCT 02-03, 2005
会议地点: Melbourne, AUSTRALIA
会议赞助商: Deakin Univ, Sch IT.; Martin Lack & Associates.; Deakin Univ, Fac Sci & Technol.;
Natl ICT Australia.; Alexander Technol.
摘要: In this paper, the problem of partitioning parallel dodecahedrons in 3D is examined. Two
schemes are introduced and their convergence rate discussed. A parallel fast solver was
implemented and tested experimentally, with the performance results presented.
地址: Chinese Acad Sci, Inst Software, R&D Ctr Parallel Software, Beijing 100080, Peoples R
China
通讯作者地址: Sun, JC, Chinese Acad Sci, Inst Software, R&D Ctr Parallel Software, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 7
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29235-7
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 8
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDG70
-------------------------------------------------------------------------------显示 56 条,共 136 条
作者: Zhang, Z; Che, HY; Shi, PF; Sun, Y; Gu, J
编者: Fan, W; Wu, Z; Yang, J
标题: An algebraic framework for schema matching
来源出版物: ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS,
3739: 694-699 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 6th International Conference on Web -Age Informational Management
会议日期: OCT 11-13, 2005
会议地点: Hangzhou, PEOPLES R CHINA
会议赞助商: DatabaseSoc China Comp Federat.; Natl Sci Fdn China.; Zhejiang Univ, Y C Tang
Disciplinary Dev & Fund.; Oracle China.
摘要: It is well known that a formal framework for the schema matching problem (SMP) is
important because it facilitates the building of algorithm model and the evaluation of algorithms.
First, based on universal algebra, we propose a meta-meta structure for schema. This definition
has a distinctive feature: it is able to describe any particular style of schemas, and transforms a
schema and other matching information into a finite structure over specific signature. Then, we
formulize SMP as a schema homomorphism problem, and prove that SMP is equivalent to finding
a semantic homomorphism from one schema to another. These results lead to the main
contribution of this paper: an algebraic framework for SMP. Thirdly, we show a classification of
schema matching based on the algebraic framework.
地址: Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R
China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Hong Kong Univ Sci
& Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
通讯作者地址: Zhang, Z, Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit,
Shanghai 200030, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 13
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29227-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDG49
-------------------------------------------------------------------------------显示 57 条,共 136 条
作者: Li, SJ; Ou, WJ; Yu, JQ
编者: Fan, W; Wu, Z; Yang, J
标题: Ontology-based HTML to XML conversion
来源出版物: ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS,
3739: 888-893 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 6th International Conference on Web -Age Informational Management
会议日期: OCT 11-13, 2005
会议地点: Hangzhou, PEOPLES R CHINA
会议赞助商: DatabaseSoc China Comp Federat.; Natl Sci Fdn China.; Zhejiang Univ, Y C Tang
Disciplinary Dev & Fund.; Oracle China.
KeyWords Plus: EXTRACTION
摘要: Current wrapper approaches break down in extracting data from differently structured and
frequently changing Web pages. To tackle this challenge, this paper defines domain-specific
ontology, captures the semantic hierarchy in Web pages automatically by exploiting both structural
information and common formatting information, and recognizes and extracts data by using
ontology-based semantic matching without relying on page-specific formatting. It is adaptive to
differently structured and frequently changing Web pages for a domain of interest.
地址: Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China; Chinese Acad Sci, Lab Comp
Sci, Inst Software, Beijing 100080, Peoples R China; Huazhong Univ Sci & Technol, Coll Comp
Sci & Technol, Wuhan 430074, Peoples R China
通讯作者地址: Li, SJ, Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 10
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-29227-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDG49
-------------------------------------------------------------------------------显示 58 条,共 136 条
作者: Zhang, ZF
标题: An additive problem with primes in arithmetic progressions
来源出版物: ACTA MATHEMATICA SINICA-ENGLISH SERIES, 21 (1): 155-168 JAN 2005
语言: English
文献类型: Article
作者关键词: additive problem; prime; arithmetic progression; circle method
摘要: In this paper, we extend a classical result of Hua to arithmetic progressions with large
moduli. The result implies the Linnik Theorem on the least prime in an arithmetic progression.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Zhang, ZF, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 17
被引频次: 1
出版商: SPRINGER HEIDELBERG
出版商地址: TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY
ISSN: 1439-8516
DOI: 10.1007/s10114-004-0322-6
29 字符的来源出版物名称缩写: ACTA MATH SIN-ENGLISH SERIES
ISO 来源文献出版物名称缩写: Acta. Math. Sin.-English Ser.
来源文献页码计数: 14
学科类别: Mathematics, Applied; Mathematics
ISI 文献传递号: 906MB
-------------------------------------------------------------------------------显示 59 条,共 136 条
作者: Wang, XY; Feng, DG; Yu, XY
标题: An attack on hash function HAVAL-128
来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (5): 545-556
OCT 2005
语言: English
文献类型: Article
作者关键词: hash function; collision; differential attack; differential characteristic
KeyWords Plus: COLLISIONS; SHA-0
摘要: In this paper, we give a fast attack against hash function - HAVAL-128. HAVAL was
presented by Y. L. Zheng et al. at Auscrypto'92. It can be processed in 3, 4 or 5 passes, and
produces 128, 160, 192, or 224-bit fingerprint. We break the HAVAL with 128-bit fingerprint. The
conclusion is that, given any 1024-bit message m, we just make some modifications about m, and
the modified message m can collide with another message m' only with probability 1/2(7), where
m' = m + Delta m, in which Delta m is a fixed difference selected in advance. In addition, two
collision examples for HAVAL-128 are given in this paper.
地址: Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci,
Inst Software, Beijing 100080, Peoples R China; Hangzhou Teachers Coll, Dept Math, Hangzhou
310012, Peoples R China
通讯作者地址: Wang, XY, Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 22
被引频次: 5
出版商: SCIENCE PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1009-2757
DOI: 10.1360/122004-107
29 字符的来源出版物名称缩写: SCI CHINA SER F
ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci.
来源文献页码计数: 12
学科类别: Computer Science, Information Systems
ISI 文献传递号: 984YR
-------------------------------------------------------------------------------显示 60 条,共 136 条
作者: Wang, YJ; Cartmell, M; Tao, QM; Liu, H
标题: A generalized real-time obstacle avoidance method without the cspace calculation
来源出版物: JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 20 (6): 774-787
NOV 2005
语言: English
文献类型: Article
作者关键词: path planning; obstacle avoidance; autonomous underwater vehicle; non-linear
programming; robotics; semi-infinite constrained optimization
KeyWords Plus: MOBILE ROBOTS; CONSTRAINED OPTIMIZATION; CONFIGURATION
SPACE; VEHICLE; ALGORITHM; MOTION; SONAR; GENERATION; SEQUENCES;
GEOMETRY
摘要: An important concept proposed in the early stage of robot path planning field is the
shrinking of a robot to a point and meanwhile the expanding of obstacles in the workspace as a set
of new obstacles. The resulting grown obstacles are called the Configuration Space (Cspace)
obstacles. The find-path problem is then transformed into that of finding a collision-free path for a
point robot among the Cspace obstacles. However, the research experiences have shown that the
Cspace transformation is very hard when the following situations occur: 1) both the robot and
obstacles are not polygons, and 2) the robot is allowed to rotate. This situation gets even worse
when the robot and obstacles are three dimensional (3D) objects with various shapes. For this
reason, direct path planning approaches without the Cspace transformation is quite useful and
expected. Motivated by the practical requirements of robot path planning, a generalized
constrained optimization problem (GCOP) with not only logic AND but also logic OR
relationships was proposed and a mathematical solution developed previously. This paper inherits
the fundamental ideas of inequality and optimization techniques from the previous work, converts
the obstacle avoidance problem into a semi-infinite constrained optimization problem with the
help of the mathematical transformation, and proposes a direct path planning approach without
Cspace calculation, which is quite different from traditional methods. To show its merits,
simulation results in 3D space have been presented.
地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R
China; Univ Glasgow, Ctr Syst & Control, Glasgow G12 8QQ, Lanark, Scotland
通讯作者地址: Wang, YJ, Chinese Acad Sci, Lab Internet Software Technol, Inst Software,
Beijing 100080, Peoples R China.
电 子 邮 箱 地 址 :
[email protected];
[email protected];
[email protected]
引用的参考文献数: 56
被引频次: 0
出版商: SCIENCE PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1000-9000
29 字符的来源出版物名称缩写: J COMPUT SCI TECHNOL
ISO 来源文献出版物名称缩写: J. Comput. Sci. Technol.
来源文献页码计数: 14
学 科 类 别 : Computer Science, Hardware & Architecture; Computer Science, Software
Engineering
ISI 文献传递号: 984YM
-------------------------------------------------------------------------------显示 61 条,共 136 条
作者: Shen, YD; Yang, Q
编者: Kramer, S; Pfahringer, B
标题: Deriving a stationary dynamic Bayesian network from a logic program with recursive loops
来源出版物: INDUCTIVE LOGIC PROGRAMMING, PROCEEDINGS, 3625: 330-347 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: 15th International Conference on Inductive Logic Programming (ILP 2005)
会议日期: AUG 10-13, 2005
会议地点: Bonn, GERMANY
会议赞助商: Gesell Informat.; Bioinformat Initiat Munich.; TU Munich.; PASCAL European
Network Excellence.; Machine Learning Journal.
作者关键词: probabilistic logic programming (PLP); the well-founded semantics; SLG-resolution;
stationary dynamic Bayesian networks
KeyWords Plus: WELL-FOUNDED SEMANTICS; QUERIES
摘要: Recursive loops in a logic program present a challenging problem to the PLP framework.
On the one hand, they loop forever so that the PLP backward-chaining inferences would never
stop. On the other hand, they generate cyclic influences, which are disallowed in Bayesian
networks. Therefore, in existing PLP approaches logic programs with recursive loops are
considered to be problematic and thus are excluded. In this paper, we propose an approach that
makes use of recursive loops to build a stationary dynamic Bayesian network. Our work stems
from an observation that recursive loops in a logic program imply a time sequence and thus can be
used to model a stationary dynamic Bayesian network without using explicit time parameters. We
introduce a Bayesian knowledge base with logic clauses of the form A <- A(1),....A(l), true,
Context, Types, which naturally represents the knowledge that the A(i)s have direct influences on
A in the context Context under the type constraints Types. We then use the well-founded model of
a logic program to define the direct influence relation and apply SLG-resolution to compute the
space of random variables together with their parental connections. We introduce a novel notion of
influence clauses, based on which a declarative semantics for a Bayesian knowledge base is
established and algorithms for building a two-slice dynamic Bayesian network from a logic
program are developed.
地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China; Hong
Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
通讯作者地址: Shen, YD, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 30
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28177-0
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 18
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDF31
-------------------------------------------------------------------------------显示 62 条,共 136 条
作者: Liao, Y; Li, MS
编者: Wu, ZH; Chen, C; Guo, MY; Bu, JJ
标题: A QoS-aware component-based middleware for pervasive computing
来源出版物: EMBEDDED SOFTWARE AND SYSTEMS, 3605: 229-235 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Conference on Embedded Software and Systems
会议日期: DEC 09-10, 2004
会议地点: Hangzhou, PEOPLES R CHINA
会议赞助商: Zhejiang Univ.; Intel Corp.; China Putian Corp.; Hopen Software Engn Co Ltdq.;
ZTE Corp.; Huawei Technologies Co Ltd.; CoreTekl Syst Inc.; China Mobile Software League.
摘要: In this paper, a QoS-aware component-based middleware for pervasive computing is given.
The design rationale is to cope with many constraints of pervasive computing application
including resource awareness, diversity, QoS-sensitive. To introduce how we achieve those system
goals, we describe the details of this middleware including system architecture, service model,
QoS model, algorithms of service setup, implementation, and experimentation.
地址: Chinese Acad Sci, Inst Software, Internet Software Technol Lab, Beijing 100080, Peoples R
China
通讯作者地址: Liao, Y, Chinese Acad Sci, Inst Software, Internet Software Technol Lab, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 12
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28128-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 7
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDE41
-------------------------------------------------------------------------------显示 63 条,共 136 条
作者: Jia, ZP; Li, X
编者: Wu, ZH; Chen, C; Guo, MY; Bu, JJ
标题: OPC-based architecture of Embedded Web Server
来源出版物: EMBEDDED SOFTWARE AND SYSTEMS, 3605: 362-367 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Conference on Embedded Software and Systems
会议日期: DEC 09-10, 2004
会议地点: Hangzhou, PEOPLES R CHINA
会议赞助商: Zhejiang Univ.; Intel Corp.; China Putian Corp.; Hopen Software Engn Co Ltdq.;
ZTE Corp.; Huawei Technologies Co Ltd.; CoreTekl Syst Inc.; China Mobile Software League.
摘要: This paper combines OPC (OLE for Process Control) standard to EWS (Embedded Web
Server) in order to distribute an integrated service for accessing real-time and history data from
control networks. A layer of OPC XML-DA (Data Access) service is added between web services
interfaces and embedded operation system in OPC-EWS. Architecture of DCS (Distributed
Control System) with OPC-EWS is described too. This OPC-EWS applies such technologies as
OPC, Java and XML and links to Internet through TCP/IP. Therefore, accesses to all kinds of
embedded devices and data share in the heterogeneous Internet/Intranet environment are
implemented. At last real-time performance and security of OPC-EWS are analyzed. The
experiments and application have demonstrated that the architecture has good performance and is
feasible for real-time operation in DCS.
地址: Shandong Univ, Sch Comp Sci & Technol, Shandong 250061, Peoples R China; Chinese
Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080, Peoples R China
通讯作者地址: Jia, ZP, Shandong Univ, Sch Comp Sci & Technol, Shandong 250061, Peoples R
China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 4
被引频次: 3
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28128-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDE41
-------------------------------------------------------------------------------显示 64 条,共 136 条
作者: Ma, B; Zhang, Y; Shi, XG
编者: Wu, ZH; Chen, C; Guo, MY; Bu, JJ
标 题 : Applying component-based meta-service in liquid operating system for pervasive
computing
来源出版物: EMBEDDED SOFTWARE AND SYSTEMS, 3605: 406-411 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Conference on Embedded Software and Systems
会议日期: DEC 09-10, 2004
会议地点: Hangzhou, PEOPLES R CHINA
会议赞助商: Zhejiang Univ.; Intel Corp.; China Putian Corp.; Hopen Software Engn Co Ltdq.;
ZTE Corp.; Huawei Technologies Co Ltd.; CoreTekl Syst Inc.; China Mobile Software League.
摘要: Liquid meta-service, a component-based operating system layer, is intended to enable
embedded operating system to support pervasive computing by meeting the requirements of being
spontaneous and adaptive. This is accomplished through two key features: (1) configurable,
component-based infrastructure services called meta-service, and (2) a meta-service components
trading service, which provides selecting and configuring mechanism for meta-service
components. In this paper, we discuss the design principle, component model, implementations of
some meta-service, and analyze the performance impact of using meta-service in embedded
operating system.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing, Peoples R China
通讯作者地址: Ma, B, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, 4 S 4th
St, Beijing, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 12
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28128-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDE41
-------------------------------------------------------------------------------显示 65 条,共 136 条
作者: Jiao, L; Cheung, TY; Lu, WM
标题: Handling synchronization problem in Petri net-based system design by property-preserving
transition-reduction
来源出版物: COMPUTER JOURNAL, 48 (6): 692-701 NOV 2005
语言: English
文献类型: Article
摘要: Synchronizations frequently occur in the modeling and design of distributed and concurrent
systems. Designing a correct system from subsystems by considering the synchronizations of
events is a difficult and complex task because it often destroys some desirable properties of
subsystems and induces the whole system deadlocks. This paper formulates a property-preserving
transition-reduction transformation to handle the synchronization problem in Petri net-based
system design. It starts by designing correct subsystems without taking transition-reduction
consideration. Synchronizations are then introduced by merging transitions of subsystems.
Depending on the structure of transitions, two classes of transition-reductions are investigated. For
each class, this paper shows that many structural and behavior properties can be preserved.
地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing, Peoples R China; Chinese Acad
Sci, Acad Math & Syst Sci, Beijing, Peoples R China; City Univ Hong Kong, Dept Comp Sci,
Hong Kong, Hong Kong, Peoples R China
通讯作者地址: Jiao, L, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 25
被引频次: 0
出版商: OXFORD UNIV PRESS
出版商地址: GREAT CLARENDON ST, OXFORD OX2 6DP, ENGLAND
ISSN: 0010-4620
DOI: 10.1093/comjnl/bxh125
29 字符的来源出版物名称缩写: COMPUT J
ISO 来源文献出版物名称缩写: Comput. J.
来源文献页码计数: 10
学科类别: Computer Science, Hardware & Architecture; Computer Science, Information Systems;
Computer Science, Software Engineering
ISI 文献传递号: 983FN
-------------------------------------------------------------------------------显示 66 条,共 136 条
作者: Cheng, W; Lin, HS; Sun, YF
编者: Khosla, R; Howlett, RJ; Jain, LC
标题: An efficient schema matcing algorithm
来源出版物: KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING
SYSTEMS, PT 2, PROCEEDINGS, 3682: 972-978 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会 议 标 题 : 9th International Conference on Knowledge-Based Intelligent Information and
Engineering Systems
会议日期: SEP 14-16, 2005
会议地点: Melbourne, AUSTRALIA
会议主办方: La Trobe Univ
摘要: Schema matching, the problem of finding semantic correspondences between elements of
source and warehouse schemas, plays a key role in data warehousing. Currently, the mappings are
largely determined manually by domain experts, thus a time-consuming process. In this paper,
based on a multistrategy schema matching framework, we develop a linguistic matching algorithm
using semantic distances between words to compute their semantic similarity, and propose a
structural matching algorithm based on semantic similarity propagation. After describe our
approach, we present experimental results on several real-world domains, and show that the
algorithm discovers semantic mappings with a high degree of accuracy.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Cheng, W, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 14
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28895-3
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 7
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDC78
-------------------------------------------------------------------------------显示 67 条,共 136 条
作者: Zhang, ZF; Feng, DG
标题: Cryptanalysis of some signature schemes with message recovery
来源出版物: APPLIED MATHEMATICS AND COMPUTATION, 170 (1): 103-114 NOV 1 2005
语言: English
文献类型: Article
作者关键词: digital signature; cryptanalysis; message recovery
KeyWords Plus: DIGITAL SIGNATURE
摘要: The notion of a self-certified public key was introduced by Girault in 1991. Recently, Tseng,
Jan and Chien proposed a digital signature scheme with message recovery and some variants
extended from the self-certified public key system proposed by Girault. A trusted system authority
is assumed in their schemes. Chang et al. propose digital signature schemes that provide the same
properties as Tseng et al.'s method without the assumption that the system authority is trustworthy.
In this paper, we show that Tseng et al.'s signature schemes are existential forgable after getting a
valid message-signature pair, and Chang et al.'s improved signature schemes are still not secure
against an un-trusted system authority. (c) 2004 Elsevier Inc. All rights reserved.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Zhang, ZF, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 12
被引频次: 2
出版商: ELSEVIER SCIENCE INC
出版商地址: 360 PARK AVE SOUTH, NEW YORK, NY 10010-1710 USA
ISSN: 0096-3003
DOI: 10.1016/j.amc.2004.10.084
29 字符的来源出版物名称缩写: APPL MATH COMPUT
ISO 来源文献出版物名称缩写: Appl. Math. Comput.
来源文献页码计数: 12
学科类别: Mathematics, Applied
ISI 文献传递号: 979TR
-------------------------------------------------------------------------------显示 68 条,共 136 条
作者: Cheng, W; Sun, YF
编者: Wang, L; Jin, Y
标题: GSMA: A structural matching algorithm for schema matching in data warehousing
来源出版物: FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS,
3614: 408-411 Part 2 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Conference on Fuzzy Systems and Knowledge Discovery
会议日期: AUG 27-29, 2005
会议地点: Changsha, PEOPLES R CHINA
会议赞助商: Xiangtan Univ.; IEEE Circuits & Syst Soc.; IEEE Computat IntelligenceSoc.; IEEE
Control Syst Soc.; Int Neural Network Soc.; European Neural Network Soc.; Chinese Assoc
Artifiical Intelligence.; Japanese Neural Network Soc.; Int Fuzzy Syst Assoc.; Asia-Pacific Neural
Network Assembly.; Fuzzy Math & Syst Assoc Chine.; Hunan Comp Federat.
摘要: Schema matching, the problem of finding semantic correspondences between elements of
source and warehouse schemas, plays a key role in data warehousing. Currently, schema mapping
is largely determined manually by domain experts, thus a labor-intensive process. In this paper, we
propose a structural matching algorithm based on semantic similarity propagation. Experimental
results on several real-world domains are presented, and show that the algorithm discovers
semantic mappings with a high degree of accuracy.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Cheng, W, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 8
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28331-5
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 4
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDA17
-------------------------------------------------------------------------------显示 69 条,共 136 条
作者: Zheng, QH; Qian, YT; Yao, M
编者: Wang, L; Jin, Y
标题: Non-deterministic event correlation based on C-F model
来源出版物: FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS,
3614: 1107-1117 Part 2 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Conference on Fuzzy Systems and Knowledge Discovery
会议日期: AUG 27-29, 2005
会议地点: Changsha, PEOPLES R CHINA
会议赞助商: Xiangtan Univ.; IEEE Circuits & Syst Soc.; IEEE Computat IntelligenceSoc.; IEEE
Control Syst Soc.; Int Neural Network Soc.; European Neural Network Soc.; Chinese Assoc
Artifiical Intelligence.; Japanese Neural Network Soc.; Int Fuzzy Syst Assoc.; Asia-Pacific Neural
Network Assembly.; Fuzzy Math & Syst Assoc Chine.; Hunan Comp Federat.
KeyWords Plus: FAULT IDENTIFICATION; COMMUNICATION-NETWORKS
摘要: This paper proposes a non-deterministic event correlation technique for diagnosis problem
of end-to-end service in network, which uses an event - fault model based on path domain of
events. The technique utilizes a refined heuristic approach to create and update fault hypotheses
that can explain these events received by system, and computes these hypotheses' belief by C-F
model method. The result of event correlation is the hypothesis with maximum belief. Simulation
shows this approach can get a high accuracy even in the case of low observability events ratio.
地址: Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci, Hangzhou, Zhejiang,
Peoples R China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100864,
Peoples R China
通讯作者地址: Zheng, QH, Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci,
Hangzhou, Zhejiang, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 11
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28331-5
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 11
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDA17
-------------------------------------------------------------------------------显示 70 条,共 136 条
作者: Jin, H; Wang, HG; Wang, H; Wang, DL
编者: Wang, L; Jin, Y
标题: Scheduling design of controllers with fuzzy deadline
来源出版物: FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 1, PROCEEDINGS,
3613: 861-864 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Conference on Fuzzy Systems and Knowledge Discovery
会议日期: AUG 27-29, 2005
会议地点: Changsha, PEOPLES R CHINA
会议赞助商: Xiangtan Univ.; IEEE Circuits & Syst Soc.; IEEE Computat IntelligenceSoc.; IEEE
Control Syst Soc.; Int Neural Network Soc.; European Neural Network Soc.; Chinese Assoc
Artifiical Intelligence.; Japanese Neural Network Soc.; Int Fuzzy Syst Assoc.; Asia-Pacific Neural
Network Assembly.; Fuzzy Math & Syst Assoc Chine.; Hunan Comp Federat.
摘要: Because some timing-constraints of a controller task may be not determined as a real-time
system engineer thinks of, its scheduling with uncertain attributes can not be usually and simply
dealt with according to classic manners used in real-time systems. The model of a controller task
with fuzzy deadline and its scheduling are studied. The dedication concept and the scheduling
policy of largest dedication first are proposed first. Simulation shows that the scheduling of
controller tasks with fuzzy deadline can be implemented by using the proposed method, whilst the
control performance coat gets guaranteed.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Jin, H, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 6
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28312-9
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 4
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BDA15
-------------------------------------------------------------------------------显示 71 条,共 136 条
作者: Sun, LM; Yan, TX; Bi, YZ; Zhu, HS
编者: Huang, DS; Zhang, XP; Huang, GB
标题: A self-adaptive energy-aware data gathering mechanism for wireless sensor networks
来源出版物: ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 3645:
588-597 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Intelligent Computing
会议日期: AUG 23-26, 2005
会议地点: Hefei, PEOPLES R CHINA
会议赞助商: Inst Intelligent Machines.; Univ Sci Technol.; IEEE Computat Intelligence Soc.;
Hong Kong Computat Intelligence Chapter.
摘要: Sensor networks are composed of a large number of densely deployed sensors. The sensor
nodes are self-organized and form an ad hoc network. As the energy supply to sensor nodes is
limited and cannot be replenished, energy efficiency is an important design consideration for
sensor networks. We design and evaluate an energy efficient routing algorithm for data querying
sensor networks that propagates routing instructions and build data paths by considering both the
hop count to the sink node and the minimum residual energy of that path. The proposed Dynamic
Energy Aware Routing (DEAR) algorithm can effectively choose a data path with low energy
consumption and high residual energy. The simulation results show that DEAR can prolong the
lifetime of networks compared with Directed Diffusion, Minimum Transmission Energy routing
and Energy Aware Routing.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Sun, LM, Chinese Acad Sci, Inst Software, POB 8718, Beijing 100080, Peoples R
China.
电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected]
引用的参考文献数: 12
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28227-0
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BDC10
-------------------------------------------------------------------------------显示 72 条,共 136 条
作者: Wang, MS; Kwong, CP
标题: On multivariate polynomial matrix factorization problems
来源出版物: MATHEMATICS OF CONTROL SIGNALS AND SYSTEMS, 17 (4): 297-311
OCT 2005
语言: English
文献类型: Article
作者关键词: multidimensional systems; multivariate polynomial matrices; zero left prime; minor
left prime; reduced minors; matrix factorizations
KeyWords Plus: 2-D SYSTEMS-THEORY; PRIMENESS
摘要: This paper studies the multivariate polynomial matrix factorization problems which have
applications to multidimensional systems theory and signal processing. We first extract an
algorithm from Pommaret's proof of the Lin-Bose conjecture. Then we simplify our algorithm,
and prove a theorem which gives a sufficient and necessary condition for a multivariate
polynomial matrix to have an minor left prime (MLP) factorization. Examples are given to
illustrate the effectiveness of this algorithm. Our results hold for any coefficient field and thus
have a wide range of applications.
地址: Chinese Acad Sci, Inst Software, Informat Secur Lab, Beijing 100080, Peoples R China;
Chinese Univ Hong Kong, Dept Automat & Comp Aided Engn, Shatin, Hong Kong, Peoples R
China
通讯作者地址: Wang, MS, Chinese Acad Sci, Inst Software, Informat Secur Lab, POB 8718,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 18
被引频次: 3
出版商: SPRINGER LONDON LTD
出 版 商 地 址 : SWEETAPPLE HOUSE CATTESHALL ROAD, GODALMING GU7 3DJ,
SURREY, ENGLAND
ISSN: 0932-4194
DOI: 10.1007/s00498-005-0155-6
29 字符的来源出版物名称缩写: MATH CONTROL SIGNAL SYST
ISO 来源文献出版物名称缩写: Math. Control Signal Syst.
来源文献页码计数: 15
学科类别: Automation & Control Systems; Engineering, Electrical & Electronic; Mathematics,
Interdisciplinary Applications
ISI 文献传递号: 976GV
--------------------------------------------------------------------------------
显示 73 条,共 136 条
作者: Jiao, L; Huang, HJ; Cheung, TY
标题: Property-preserving composition by place merging
来源出版物: JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 14 (4): 793-812 AUG
2005
语言: English
文献类型: Article
作者关键词: composition; Petri nets; place merging; property preservation; verification
KeyWords Plus: PETRI NETS; LIVENESS
摘 要 : Place merging is an important technique of Petri nets to composite different
components/subsystems into a large system. However, it is a difficult and complex task to
guarantee that the composite large system can preserve desired properties. This paper avoids the
verification process by a property-preservation place-merging approach. The strategy used in this
paper is to require such a composition to preserve these desirable properties (including liveness
and boundedness) of the components in the resulting system. Meanwhile, this paper also
investigates one kind of decompositions in terms of places, some conditions are presented under
which if the large system possesses some properties, then the resulting components also preserve
the desirable properties without the need of further verification. An application example is given
to illustrate our method and some main results.
地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China; Harbin Inst
Technol, Shenzhen Grad Sch, Dept Comp Sci & Informat Technol, Shenzhen, Peoples R China;
City Polytech Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
通讯作者地址: Jiao, L, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 25
被引频次: 3
出版商: WORLD SCIENTIFIC PUBL CO PTE LTD
出版商地址: 5 TOH TUCK LINK, SINGAPORE 596224, SINGAPORE
ISSN: 0218-1266
29 字符的来源出版物名称缩写: J CIRCUITS SYSTEMS COMP
ISO 来源文献出版物名称缩写: J. Circuits Syst. Comput.
来源文献页码计数: 20
学科类别: Computer Science, Hardware & Architecture; Engineering, Electrical & Electronic
ISI 文献传递号: 975ZJ
-------------------------------------------------------------------------------显示 74 条,共 136 条
作者: Zhang, GQ; Jiang, Y
标题: On an open problem of Amadio and Curien: The finite antichain condition
来源出版物: INFORMATION AND COMPUTATION, 202 (1): 87-103 OCT 10 2005
语言: English
文献类型: Article
KeyWords Plus: CARTESIAN CLOSED CATEGORY; STABLE DOMAINS
摘要: More than a dozen years ago, Amadio [Bifinite domains: stable case, in: Lecture Notes in
Computer Science, vol. 530,1991, pp. 16-33] (see Amadio and Curien, Domains and
Lambda-Calculi, Cambridge Tracts in Theoretical Computer Science, vol. 46, Cambridge
University Press, 1998 as well) raised the question of whether the category of stable bifinite
domains of Amadio-Droste [R.M. Amadio, Bifinite domains: stable case, in: Lecture Notes
in-Computer Science, vol. 530,1991, pp. 16-33; M. Droste, On stable domains, Theor. Comput.
Sci. 111 (1993) 89-101; M. Droste, Cartesian closed categories of stable domains for
polymorphism, Preprint, Universitat GHS Essen] is the largest cartesian closed full sub-category
of the category of omega-algebraic meet-cpos with stable functions. An affirmative solution to this
problem has two major steps: (1) Show that for any omega-algebraic meet-cpo D, if all
higher-order stable function spaces built from D are omega-algebraic, then D is finitary (i.e., it
satisfies the so-called axiom I); (2) Show that for any omega-algebraic meet-cpo D, if D violates
MIinfinity, then [D -> D] violates either M or I. We solve the first part of the problem in this paper,
i.e., for any omega-algebraic meet-cpo D, if the stable function space [D -> D] satisfies M., then D
is finitary. Our notion of (mub, meet)-closed set, which is introduced for step 1, will also be used
for treating some example cases in step 2. (c) 2005 Elsevier Inc. All rights reserved.
地址: Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA;
Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhang, GQ, Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland,
OH 44106 USA.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 22
被引频次: 2
出版商: ACADEMIC PRESS INC ELSEVIER SCIENCE
出版商地址: 525 B ST, STE 1900, SAN DIEGO, CA 92101-4495 USA
ISSN: 0890-5401
DOI: 10.1016/j.ic.2005.06.001
29 字符的来源出版物名称缩写: INFORM COMPUT
ISO 来源文献出版物名称缩写: Inf. Comput.
来源文献页码计数: 17
学科类别: Computer Science, Theory & Methods; Mathematics, Applied
ISI 文献传递号: 970CB
-------------------------------------------------------------------------------显示 75 条,共 136 条
作者: Liu, YQ; Zhu, HB; Liu, XH; Wu, EH
标题: Real-time simulation of physically based on-surface flow
来源出版物: VISUAL COMPUTER, 21 (8-10): 727-734 Sp. Iss. SI SEP 2005
语言: English
文献类型: Proceedings Paper
会议标题: 13th Pacific Conference on Computer Graphics and Applications
会议日期: OCT 12-14, 2005
会议地点: Macao, PEOPLES R CHINA
作者关键词: on-surface flow; Navier-Stokes equations; wetting; real time
摘要: Although many papers have been published in the field of fluid simulation, little attention
has been paid to on-surface flow involving wetting and stain transportation as well as erosion and
deposition phenomena. In this paper, we introduce nonzero divergence in the mass equation of
Navier-Stokes equations to simulate water penetration from on-surface flow into substrate material.
Also, the volume of fluid method is adopted to track the free surface. With a computation of the
actual amount of absorbed water we render the wetting effects with fully dry and fully wet texture
images simultaneously. Using our model, the on-surface flow that accompanies water absorption
can be simulated realistically in real time with OpenGL preview rendering. Experimental results
illustrate that our model can be widely applied to solve various problems related to on-surface
flow.
地址: Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, Macao, Peoples R China;
Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China; Chinese Acad Sci,
Grad Sch, Beijing 100864, Peoples R China
通讯作者地址: Liu, YQ, Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, Macao,
Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected]
引用的参考文献数: 16
被引频次: 8
出版商: SPRINGER
出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA
ISSN: 0178-2789
DOI: 10.1007/s00371-005-0314-2
29 字符的来源出版物名称缩写: VISUAL COMPUT
ISO 来源文献出版物名称缩写: Visual Comput.
来源文献页码计数: 8
学科类别: Computer Science, Software Engineering
ISI 文献传递号: 964CX
-------------------------------------------------------------------------------显示 76 条,共 136 条
作者: Qing, SH; Li, GC
标题: A formal model of fair exchange protocols
来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (4): 499-512
AUG 2005
语言: English
文献类型: Article
作者关键词: events; local causal relation; local temporal relation; global relation; exchanged item;
security goals
摘要: Based on the study of existing fair exchange protocols, this paper sets up an accurate formal
model by stepwise refinement. In the process of refinement an unreliable channel is employed to
simulate an attack behavior. The model provides a novel formal definition of exchanged items,
and presents the formal goals for fairness, accountability, etc., reflecting the inherent requirements
for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange
protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness
which applies to all fair exchange protocols, gives a formal definition for trust strand of the third
party, and presents general criteria of designing a secure and effective fair exchange protocol.
Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair
exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals
the process of a complete attack, discovering deeper reasons for causing an attack. Finally, we
modify the flawed protocol and the revised protocol ensures the desirable properties.
地址: Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol, Beijing 100080,
Peoples R China; Beijing Zhongke Ansheng Corp Informat Technol, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Qing, SH, Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 10
被引频次: 2
出版商: SCIENCE PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1009-2757
DOI: 10.1360/122004-30
29 字符的来源出版物名称缩写: SCI CHINA SER F
ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci.
来源文献页码计数: 14
学科类别: Computer Science, Information Systems
ISI 文献传递号: 964FW
-------------------------------------------------------------------------------显示 77 条,共 136 条
作者: Lo, SH; Wang, WX
标题: Generation of tetrahedral mesh of variable element size by sphere packing over an
unbounded 3D domain
来源出版物: COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 194
(48-49): 5002-5018 2005
语言: English
文献类型: Article
作者关键词: unbounded 3D domain; tetrahedral mesh; Delaunay triangulation; frontal surface;
sphere packing; descend by rotation
KeyWords Plus: ADVANCING-FRONT APPROACH; DELAUNAY TRIANGULATION;
NONOBTUSE TRIANGULATION; QUADRILATERAL MESH; GRID GENERATION;
PLANAR DOMAINS; CIRCLE PACKING; OPTIMIZATION; ALGORITHM; BOUNDARY
摘要: This paper describes an algorithm for the generation of tetrahedral mesh of specified
element size over an unbounded three-dimensional domain. Starting from an arbitrary point in
space (defined as the origin) and guided by the concept of advancing front, spheres of size
compatible with the specified element size are packed tightly together one by one to form a cluster
of spheres of different sizes. The compactness of the cluster of spheres is achieved by packing
spheres at a site closest to the origin in a densest manner with tangent but no overlapping with as
many other spheres as possible. In view of these criteria, a rotational mechanism between spheres
is innovated, which allows the newly inserted sphere to follow the path by rotation between
existing spheres until the lowest point is reached. The centres of the packing spheres provide ideal
locations for Delaunay point insertion to form a triangulation of tetrahedral elements of size
compatible with the specified value. Spheres of random size distribution or of size specified by a
node spacing function are packed by the proposed algorithm. In all test examples, high-quality
tetrahedral elements of size consistent with the specified node spacing are generated. The process
is fast and robust, and the time complexity for mesh generation is expected to be almost linear;
however, in the present implementation, a quasi-linear time relationship is observed as a search for
the nearest node on the front is proposed in the sphere packing process. The memory requirement
has been kept to a minimum as no additional data structure other than the adjacency relationship
of the tetrahedral elements as required by the Delaunay triangulation is stored. The structure of the
advancing frontal surface needs not be explicitly constructed nor updated as it is simply not
required in the sphere packing process. (c) 2005 Elsevier B.V. All rights reserved.
地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese
Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China
通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 46
被引频次: 4
出版商: ELSEVIER SCIENCE SA
出版商地址: PO BOX 564, 1001 LAUSANNE, SWITZERLAND
ISSN: 0045-7825
DOI: 10.1016/j.cma.2004.11.022
29 字符的来源出版物名称缩写: COMPUT METHOD APPL MECH ENG
ISO 来源文献出版物名称缩写: Comput. Meth. Appl. Mech. Eng.
来源文献页码计数: 17
学 科 类 别 : Engineering, Multidisciplinary; Mathematics, Interdisciplinary Applications;
Mechanics
ISI 文献传递号: 964EE
-------------------------------------------------------------------------------显示 78 条,共 136 条
作者: He, Y; Zhang, Y; Guo, J
编者: Lu, X; Zhao, W
标题: On mitigating network partitioning in peer-to-peer massively multiplayer games
来源出版物: NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 3619: 481-490
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会 议 标 题 : 3rd International Conference on Computer Networks and Mobile Computing
(ICCNMC 2005)
会议日期: AUG 02-04, 2005
会议地点: Zhangjiajie, PEOPLES R CHINA
会议赞助商: China Comp Federat.; IEEE Comp Soc Beijing Chapter.; Hunan Comp Soc.; IEEE
TC Distributed Proc.
摘要: Recently, peer-to-peer infrastructure has been proposed to support massively multiplayer
games in the literature. However, when underlying network partitions due to network outages, the
game world will partition into several parallel game worlds and it is difficult and costly to merge
them when the network partitions disappear. Existing approaches resort to a centralized server to
arbitrate. Aiming at mitigating the effects brought by network partitions, we propose a fully
distributed algorithm based on state-stack matching. Our theoretical analysis and numerical results
show that our approach can resolve the merging issue at the least loss of game states with high
probability.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ Toronto, Dept Elect
& Comp Engn, Toronto, ON, Canada
通讯作者地址: He, Y, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 5
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28102-9
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCT45
-------------------------------------------------------------------------------显示 79 条,共 136 条
作者: Yan, TX; Bi, YZ; Sun, LM; Zhu, HS
编者: Lu, X; Zhao, W
标题: Probability based dynamic load-balancing tree algorithm for wireless sensor networks
来源出版物: NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 3619: 682-691
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会 议 标 题 : 3rd International Conference on Computer Networks and Mobile Computing
(ICCNMC 2005)
会议日期: AUG 02-04, 2005
会议地点: Zhangjiajie, PEOPLES R CHINA
会议赞助商: China Comp Federat.; IEEE Comp Soc Beijing Chapter.; Hunan Comp Soc.; IEEE
TC Distributed Proc.
摘要: Load balance can reduce hot spots, maintain network connectivity and prolong lifetime of
wireless sensor networks. In large scale and randomly deployed wireless sensor networks, the
energy consumption is sharply uneven among sensor nodes. We propose a new routing mechanism
to achieve load balance through constructing a dynamic load-balancing tree (DLBT) in wireless
sensor networks. The DLBT structure is a tree-like topology with a critical character that one node
may have more than one candidates of parent node. DLBT achieves load balance by adjusting the
forwarding probability to each parent candidate according to its traffic burden. We also provide a
distributed algorithm to construct and maintain the DLBT structure. Simulation results show that
our DLBT routing provides much higher load balance than the shortest path tree mechanism.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Yan, TX, Chinese Acad Sci, Inst Software, POB 8718, Beijing 100080, Peoples R
China.
电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected]
引用的参考文献数: 13
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28102-9
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCT45
-------------------------------------------------------------------------------显示 80 条,共 136 条
作者: Zhou, H; Wang, YJ; Wang, Q
编者: Lu, X; Zhao, W
标题: Measuring Internet bottlenecks: Location, capacity, and available bandwidth
来 源 出 版 物 : NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 3619:
1052-1062 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会 议 标 题 : 3rd International Conference on Computer Networks and Mobile Computing
(ICCNMC 2005)
会议日期: AUG 02-04, 2005
会议地点: Zhangjiajie, PEOPLES R CHINA
会议赞助商: China Comp Federat.; IEEE Comp Soc Beijing Chapter.; Hunan Comp Soc.; IEEE
TC Distributed Proc.
KeyWords Plus: DYNAMICS
摘要: The ability to measure the location, capacity and available bandwidth of bottleneck in
end-to-end network path is of major importance in congestion control, streaming applications,
quality-of-service, overlay network and traffic engineering. Existing algorithms either fail to
measure 0 the three bottleneck properties, or generate a large amount of probing packets. In
addition, they often require deployment in both end hosts. A novel technique, called BNeck, is
presented in this paper. It allows end users to efficiently and accurately measure the three
bottleneck properties. The key idea of BNeck is that the per-link dispersion of probing packet train
can be applied to measure the properties of congested links. The accuracy and efficiency of BNeck
have been verified with elaborately designed simulation. The simulation result indicates that
various applications can adopt BNeck to probe for the three bottleneck properties without loss of
performance.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R
China; Chinese Acad Sci, Inst Software, Key Lab Comp Sci, Beijing 100080, Peoples R China;
Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Zhou, H, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 10
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28102-9
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 11
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCT45
-------------------------------------------------------------------------------显示 81 条,共 136 条
作者: Wu, FG; Sun, FC; Sun, ZQ; Zheng, CW
标题: A neuro-fuzzy controller for networked control systems via a discrete-time jump fuzzy
system approach
来 源 出 版 物 : DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE
SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 1: 417-421 Sp. Iss. SI 2005
语言: English
文献类型: Proceedings Paper
会 议 标 题 : 4th International Conference on Engineering Applications and Computational
Algorithms
会议日期: JUL 27-29, 2005
会议地点: Guelph, CANADA
会议赞助商: DCDIS.
会议主办方: Univ Guelph
KeyWords
Plus:
OUTPUT-FEEDBACK
CONTROL;
H-INFINITY-CONTROL;
LINEAR-SYSTEMS; NONLINEAR-SYSTEMS; CONTROL DESIGN; LMI APPROACH;
STABILITY; STABILIZABILITY; PARAMETERS
摘要: The network delay and packets dropout in the networked control systems (NCSs) can
degrade the system performance or stability. Aiming at the stochastic but bounded delay and
packets dropout in the NCSs, the discrete-time jump fuzzy system is proposed, which implements
the modeling of the networked control system with stochastic but bounded delay and packets
dropout. Based on this model, a neuro-fuzzy controller is designed with three parts: a guaranteed
cost state-feedback controller, an adaptive neuro-fuzzy inference system (ANFIS) predictor and a
fuzzy controller. Simulation example is carried out to the correctness and the validity of the
proposed theory.
地址: Tsing Hua Univ, Dept Comp Sci & Technol, Natl Key Lab Intelligent Technol & Syst,
Beijing 100084, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R
China
通讯作者地址: Wu, FG, Tsing Hua Univ, Dept Comp Sci & Technol, Natl Key Lab Intelligent
Technol & Syst, Beijing 100084, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 24
被引频次: 0
出版商: WATAM PRESS
出版商地址: C/O DCDIS JOURNAL, 317 KAREN PLACE, WATERLOO, ONTARIO N2L 6K8,
CANADA
ISSN: 1492-8760
29 字符的来源出版物名称缩写: DYN CONT DISCR IMP SYST SER B
ISO 来源文献出版物名称缩写: Dyn. Contin. Discret. Impuls. Syst. Ser. B-Appl. Algorithms
来源文献页码计数: 5
学科类别: Mathematics, Applied
ISI 文献传递号: 962FM
-------------------------------------------------------------------------------显示 82 条,共 136 条
作者: Lo, SH; Wang, WX
标题: Generation of finite element mesh with variable size over an unbounded 2D domain
来源出版物: COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 194
(45-47): 4668-4684 2005
语言: English
文献类型: Article
作者关键词: unbounded domain; triangular mesh generation; advancing front; circle packing;
neighbour tracing; boundary recovery
KeyWords Plus: ADVANCING-FRONT APPROACH; BUBBLE PACKING METHOD;
DELAUNAY TRIANGULATION; NONOBTUSE TRIANGULATION; QUADRILATERAL
MESH; GRID GENERATION; CIRCLE PACKING; PLANAR DOMAINS; SURFACES;
ALGORITHM
摘要: With the advance of the finite element, general fluid dynamic and traffic flow problems with
arbitrary boundary definition over an unbounded domain are tackled. This paper describes an
algorithm for the generation of finite element mesh of variable element size over an unbounded
2D domain by using the advancing front circle packing technique. Unlike the conventional frontal
method, the procedure does not start from the object boundary but starts from a convenient point
within an open domain. The sequence of construction of the packing circles is determined by the
shortest distance from the fictitious centre in such a way that the generation front is more or less a
circular loop with occasional minor concave parts due to element size variation. As soon as a
circle is added to the generation front, finite elements are directly generated by properly
connecting frontal segments with the centre of the new circle. In contrast to other mesh generation
schemes, the domain boundary is not considered in the process of circle packing, this reduces a lot
of geometrical checks for intersection with frontal segments, and a linear time complexity for
mesh generation can be achieved. In case the boundary of the domain is needed, simply generate
an unbounded mesh to cover the entire object. As the element adjacency relationship of the mesh
has already been established in the circle packing process, insertion of boundary segments by
neighbour tracing is fast and robust. Details of such a boundary recovery procedure are described,
and practical meshing problems are given to demonstrate how physical objects are meshed by the
unbounded meshing scheme followed by the insertion of domain boundaries. (c) 2005 Elsevier
B.V. All rights reserved.
地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese
Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China
通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 34
被引频次: 3
出版商: ELSEVIER SCIENCE SA
出版商地址: PO BOX 564, 1001 LAUSANNE, SWITZERLAND
ISSN: 0045-7825
DOI: 10.1016/j.cma.2004.12.011
29 字符的来源出版物名称缩写: COMPUT METHOD APPL MECH ENG
ISO 来源文献出版物名称缩写: Comput. Meth. Appl. Mech. Eng.
来源文献页码计数: 17
学 科 类 别 : Engineering, Multidisciplinary; Mathematics, Interdisciplinary Applications;
Mechanics
ISI 文献传递号: 959QP
-------------------------------------------------------------------------------显示 83 条,共 136 条
作者: Zhang, J
编者: Nieuwenhuis, R
标题: Computer search for counterexamples to Wilkie's identity
来源出版物: AUTOMATED DEDUCTION - CADE-20, PROCEEDINGS, 3632: 441-451 2005
丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
语言: English
文献类型: Proceedings Paper
会议标题: 20th International Conference on Automated Deduction (CADE-20)
会议日期: JUL 22-27, 2005
会议地点: Tallinn, ESTONIA
KeyWords Plus: ALGEBRAS
摘要: Tarski raised the High School Problem, i.e., whether a set of 11 identities (denoted by HSI)
serves as a basis for all the identities which hold for the natural numbers. It was answered by
Wilkie in the negative, who gave an identity which holds for the natural numbers but cannot be
derived from HSI. This paper describes some computer searching efforts which try to find a small
model of HSI rejecting Wilkie's identity. The experimental results show that such a model has at
least 11 elements. Some experiences are reported, and some issues are discussed.
地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100864, Peoples R China
通讯作者地址: Zhang, J, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100864,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 14
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-28005-7
29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL
来源文献页码计数: 11
学科类别: Computer Science, Artificial Intelligence
ISI 文献传递号: BCS47
-------------------------------------------------------------------------------显示 84 条,共 136 条
作者: Cooper, SB; Li, AS; Sorbi, A; Yang, Y
标题: Bounding and nonbounding minimal pairs in the enumeration degrees
来源出版物: JOURNAL OF SYMBOLIC LOGIC, 70 (3): 741-766 SEP 2005
语言: English
文献类型: Article
摘要: We show that every nonzero Delta(2)(0) e-degree bounds a minimal pair. On the other hand.
there exist Sigma(2)(0) e-degrees which bound no minimal pair.
地址: Univ Leeds, Sch Math, Dept Pure Math, Leeds LS2 9JT, W Yorkshire, England; Acad
Sinica, Inst Software, Beijing 100080, Peoples R China; Dipartimento Sci Matemat & Informaz
Roberto Magar, I-53100 Siena, Italy; Natl Univ Singapore, Fac Sci, Dept Math, Singapore 119260,
Singapore
通讯作者地址: Cooper, SB, Univ Leeds, Sch Math, Dept Pure Math, Leeds LS2 9JT, W Yorkshire,
England.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 10
被引频次: 4
出版商: ASSOC SYMBOLIC LOGIC, INC
出版商地址: 124 RAYMOND AVENUE, POUGHKEEPSIE, NY 12604-0001 USA
ISSN: 0022-4812
29 字符的来源出版物名称缩写: J SYMB LOGIC
ISO 来源文献出版物名称缩写: J. Symb. Log.
来源文献页码计数: 26
学科类别: Mathematics
ISI 文献传递号: 957WB
-------------------------------------------------------------------------------显示 85 条,共 136 条
作者: Wang, ST; Zhu, JG; Chung, FL; Lin, Q; Hu, DW
标题: Theoretically optimal parameter choices for support vector regression machines with noisy
input
来源出版物: SOFT COMPUTING, 9 (10): 732-741 OCT 2005
语言: English
文献类型: Article
作者关键词: regularized linear regression; support vectors; Huber loss functions; norm-r loss
functions
摘要: With the evidence framework, the regularized linear regression model can be explained as
the corresponding MAP problem in this paper, and the general dependency relationships that the
optimal parameters in this model with noisy input should follow is then derived. The support
vector regression machines Huber-SVR and Norm-r r-SVR are two typical examples of this model
and their optimal parameter choices are paid particular attention. It turns out that with the
existence of the typical Gaussian noisy input, the parameter mu in Huber-SVR has the linear
dependency with the input noise, and the parameter r in the r-SVR has the inversely proportional
to the input noise. The theoretical results here will be helpful for us to apply kernel-based
regression techniques effectively in practical applications.
地址: So Yangtze Univ, Sch Informat Engn, Wuxi, Peoples R China; Nanjing Univ Sci & Tech,
Dept Comp Sci & Engn, Nanjing, Peoples R China; HongKong Polytech Univ, Dept Comp, Hong
Kong, Hong Kong, Peoples R China; Natl Def Univ Sci & Tech, Sch Automat, Changsha, Peoples
R China; Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China
通讯作者地址: Wang, ST, So Yangtze Univ, Sch Informat Engn, Wuxi, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 15
被引频次: 4
出版商: SPRINGER
出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA
ISSN: 1432-7643
DOI: 10.1007/s00500-004-406-3
29 字符的来源出版物名称缩写: SOFT COMPUT
ISO 来源文献出版物名称缩写: Soft Comput.
来源文献页码计数: 10
学 科 类 别 : Computer Science, Artificial Intelligence; Computer Science, Interdisciplinary
Applications
ISI 文献传递号: 954LZ
-------------------------------------------------------------------------------显示 86 条,共 136 条
作者: Zheng, CW; Li, L; Xu, FJ; Sun, FH; Ding, MY
标题: Evolutionary route planner for unmanned air vehicles
来源出版物: IEEE TRANSACTIONS ON ROBOTICS, 21 (4): 609-620 AUG 2005
语言: English
文献类型: Article
作者关键词: evolutionary computation; route planning; unmanned air vehicles (UAVs)
KeyWords Plus: NAVIGATION; ALGORITHM
摘要: Based on evolutionary computation, a novel real-timeroute planner for unmanned air
vehicles is presented. In the evolutionary route planner, the individual candidates are evaluated
with respect to the workspace so that the computation of the configuration space is not required.
The planner incorporates domain-specific knowledge, can handle unforeseeable changes of the
environment, and take into account different kinds of mission constraints such as minimum route
leg length and flying altitude, maximum turning angle, and fixed approach vector to goal position.
Furthermore, the novel planner can be used to plan routes both for a singled vehicle and for
multiple ones. With Digital Terrain Elevation Data, the resultant routes can increase the surviving
probability of the vehicles using the terrain masking effect.
地址: Chinese Acad Sci, Inst Software, Gen Software Lab, Beijing 100080, Peoples R China;
Tsinghua Univ, Dept Comp Sci & Engn, State Key Lab Intelligent Technol & Syst, Beijing
100084, Peoples R China; Huazhong Univ Sci & Technol, Pattern Recognit & Artificial
Intelligence, Wuhan 430074, Peoples R China
通讯作者地址: Zheng, CW, Chinese Acad Sci, Inst Software, Gen Software Lab, Beijing 100080,
Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]; [email protected]
引用的参考文献数: 26
被引频次: 14
出版商: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
出版商地址: 445 HOES LANE, PISCATAWAY, NJ 08855 USA
ISSN: 1552-3098
DOI: 10.1109/TRO.2005.844684
29 字符的来源出版物名称缩写: IEEE TRANS ROBOT
ISO 来源文献出版物名称缩写: IEEE Trans. Robot.
来源文献页码计数: 12
学科类别: Robotics
ISI 文献传递号: 954LU
-------------------------------------------------------------------------------显示 87 条,共 136 条
作者: Li, GH; Xu, Y; Chen, CP; Liu, ZH
标题: On connected [g, f+1]-factors in graphs
来源出版物: COMBINATORICA, 25 (4): 393-405 2005
语言: English
文献类型: Article
KeyWords Plus: K-FACTORS; EXISTENCE
摘要: Let G = (V(G),E(G)) be a graph with vertex set V(G) and edge set E(G), and g and f two
positive integral functions from V(G) to Z(+) - {1} such that g(v) <= f (v) <= d(G)(v) for all v G
V(G), where dG (V) is the degree of the vertex v. It is shown that every graph G, including both a
[g, f]-factor and a hamiltonian path, contains a connected [g, f + 1]-factor. This result also extends
Kano's conjecture concerning the existence of connected [k, k + 1]-factors in graphs.
地址: Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci,
Inst Software, Beijing 100080, Peoples R China; Univ Georgia, CSBL, Dept Biochem & Mol Biol,
Athens, GA 30605 USA; Chinese Acad Sci, Inst Math & Syst Sci, Beijing 100080, Peoples R
China
通讯作者地址: Li, GH, Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 7
被引频次: 3
出版商: SPRINGER
出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA
ISSN: 0209-9683
29 字符的来源出版物名称缩写: COMBINATORICA
ISO 来源文献出版物名称缩写: Combinatorica
来源文献页码计数: 13
学科类别: Mathematics
ISI 文献传递号: 955TG
-------------------------------------------------------------------------------显示 88 条,共 136 条
作者: Li, AS
编者: Cooper, SB; Lowe, B; Torenvliet, L
标题: The low splitting theorem in the difference hierarchy
来源出版物: NEW COMPUTATIONAL PARADIGMS, 3526: 287-296 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st Conference on Computability in Europe (CiE 2005)
会议日期: JUN 08-12, 2005
会议地点: Amsterdam, NETHERLANDS
KeyWords Plus: RECURSIVELY ENUMERABLE DEGREES; MINIMAL DEGREES;
DEGREES LESS; DRE DEGREES; RE DEGREES; DENSE
摘要: It is shown that for any 2-computably enumerable Turing degrees a, l, if l' = 0', and l < a,
then there are 2-computably enumerable Turing degrees x(0), x(1) such that both l < x(0), x(1) < a
and x(0) boolean OR x(1) = a hold, extending the Robinson low splitting theorem for the
computably enumerable degrees to the difference hierarchy.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Li, AS, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 20
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-26179-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCP14
-------------------------------------------------------------------------------显示 89 条,共 136 条
作者: Yin, XL; Zhao, XX
标题: The computations of Einstein-Kahler metric of Cartan-Hartogs domain
来源出版物: SCIENCE IN CHINA SERIES A-MATHEMATICS, 48: 365-376 Suppl. S MAY
2005
语言: English
文献类型: Article
作者关键词: Cartan-Hartogs domain; Einstein-Kdhier; holomorphic sectional curvature
摘要: In this paper, we compute the complete Einstein-Kahler metric with explicit formula for the
Cartan-Hartogs domain of the fourth type in some cases. Under this metric the holomorphic
sectional curvature is given, which intervenes between -2k and -1. This is the sharp estimate.
地址: Beijing Language & Culture Univ, Dept Comp Sci, Beijing 100083, Peoples R China;
Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhao, XX, Beijing Language & Culture Univ, Dept Comp Sci, Beijing 100083,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 5
被引频次: 3
出版商: SCIENCE PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1006-9283
DOI: 10.1360/05za0030
29 字符的来源出版物名称缩写: SCI CHINA SER A
ISO 来源文献出版物名称缩写: Sci. China Ser. A-Math.
来源文献页码计数: 12
学科类别: Mathematics, Applied; Mathematics
ISI 文献传递号: 951DE
-------------------------------------------------------------------------------显示 90 条,共 136 条
作者: Lo, SH; Wang, WX
标题: Generation of anisotropic mesh by ellipse packing over an unbounded domain
来源出版物: ENGINEERING WITH COMPUTERS, 20 (4): 372-383 AUG 2005
语言: English
文献类型: Article
作者关键词: unbounded domain; anisotropy; mesh generation; advancing front; ellipse packing;
parametric surface
KeyWords Plus: DELAUNAY TRIANGULATION; METRIC SPECIFICATIONS; PLANAR
DOMAINS; SURFACES; INTERSECTION; ALGORITHM
摘要: With the advance of the finite element method, general fluid dynamic and traffic flow
problems with arbitrary boundary definition over an unbounded domain are tackled. This paper
describes an algorithm for the generation of anisotropic mesh of variable element size over an
unbounded 2D domain by using the advancing front ellipse packing technique. Unlike the
conventional frontal method, the procedure does not start from the object boundary but starts from
a convenient point within an open domain. The sequence of construction of the packing ellipses is
determined by the shortest distance from the fictitious centre in such a way that the generation
front is more or less a circular loop with occasional minor concave parts due to element size
variation. As soon as an ellipse is added to the generation front, finite elements are directly
generated by properly connecting frontal segments with the centre of the new ellipse. Ellipses are
packed closely and in contact with the existing ellipses by an iterative procedure according to the
specified anisotropic metric tensor. The anisotropic meshes generated by ellipse packing can also
be used through a mapping process to produce parametric surface meshes of various
characteristics. The size and the orientation of the ellipses in the pack are controlled by the metric
tensor as derived from the principal surface curvatures. In contrast to other mesh generation
schemes, the domain boundary is not considered in the process of ellipse packing, this reduces a
lot of geometrical checks for intersection between frontal segments. Five examples are given to
show the effectiveness and robustness of anisotropic mesh generation and the application of
ellipse packing to mesh generation over various curved surfaces.
地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese
Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China
通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 25
被引频次: 0
出版商: SPRINGER
出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA
ISSN: 0177-0667
DOI: 10.1007/s00366-005-0317-7
29 字符的来源出版物名称缩写: ENG COMPUT
ISO 来源文献出版物名称缩写: Eng. Comput.
来源文献页码计数: 12
学科类别: Computer Science, Interdisciplinary Applications; Engineering, Mechanical
ISI 文献传递号: 951BE
-------------------------------------------------------------------------------显示 91 条,共 136 条
作者: Wei, H; Luan, SM
标题: Ganglion-based balance design of multi-layer model and its watchfulness-keeping
来源出版物: JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 20 (4): 567-573
JUL 2005
语言: English
文献类型: Article
作者关键词: computer vision; receptive field; hierarchical neural network
KeyWords Plus: VISION; SYSTEMS
摘要: An important problem of machine vision is the balance among the efficiency, accuracy and
computation cost. The visual system of man can keep watchfulness to the perimeter of a visual
field and subtly process information emerging in the center of the visual field at the same time.
This kind of requirement assignment of computation can virtually case the demand of hardware
both in quantity and complexity. Therefore designing an artificial model based on biological
mechanism is an effective approach. In this paper a multi-layer neural model is designed based on
the multi-scale receptive fields of ganglions in retina. The model can keep watch on the periphery
part of a scene while processing the center information of the scene. And why it can-balance the
hardware complexity, processing precision and computational intensity is analyzed. An
experiment is done to test the model's sensitivity in watchfulness keeping and its efficiency and
veracity in environment sampling. This model may provide valuable inspiration in the
implementation of real-time processing and the avoidance of expensive computation cost in
machine vision.
地址: Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Brain Sci Res Ctr, Dept Comp
Sci,Lab Algorithm Cognit Model, Shanghai 200433, Peoples R China; Chinese Acad Sci, Inst
Software, Intelligence Engn Lab, Beijing 100080, Peoples R China
通讯作者地址: Wei, H, Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Brain Sci Res
Ctr, Dept Comp Sci,Lab Algorithm Cognit Model, Shanghai 200433, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 18
被引频次: 0
出版商: SCIENCE PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1000-9000
29 字符的来源出版物名称缩写: J COMPUT SCI TECHNOL
ISO 来源文献出版物名称缩写: J. Comput. Sci. Technol.
来源文献页码计数: 7
学 科 类 别 : Computer Science, Hardware & Architecture; Computer Science, Software
Engineering
ISI 文献传递号: 948JP
-------------------------------------------------------------------------------显示 92 条,共 136 条
作者: Dai, ZD; Imamura, K; Yang, JH
编者: Helleseth, T; Sarwate, D; Song, HY; Yang, K
标题: Asymptotic behavior of normalized linear complexity of multi-sequences
来源出版物: SEQUENCES AND THEIR APPLICATIONS - SETA 2004, 3486: 129-142 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 3rd International Conference Sequences and Their Applications (SETA 2004)
会议日期: OCT 24-28, 2004
会议地点: Seoul, SOUTH KOREA
KeyWords Plus: CONTINUED FRACTIONS
摘要: Asymptotic behavior of the normalized linear complexity Ls(n)/n of a multi-sequence s is
studied in terms of its multidimensional continued fraction expansion, where Ls(n) is the linear
complexity of the length n prefix of s and defined to be the length of the shortest multituple linear
feedback shift register which generates the length n prefix of s. A formula for lim sup(n ->infinity)
Ls(n)/n together with a lower bound, and a formula for lim inf(n ->infinity) Ls(n)/n together with
an upper bound are given. A necessary and sufficient condition for the existence of lim(n
->infinity) Ls(n)/n is also given.
地址: Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R
China; Kyushu Inst Technol, Dept Comp Sci & Elect, Fukuoka 8208502, Japan; Chinese Acad Sci,
Software Inst, Beijing 100080, Peoples R China
通讯作者地址: Dai, ZD, Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing
100039, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 9
被引频次: 8
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-26084-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 14
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCN33
-------------------------------------------------------------------------------显示 93 条,共 136 条
作者: Dai, ZD; Feng, XT; Yang, JH
编者: Helleseth, T; Sarwate, D; Song, HY; Yang, K
标题: Multi-continued fraction algorithm and generalized B-M algorithm over F-2*
来源出版物: SEQUENCES AND THEIR APPLICATIONS - SETA 2004, 3486: 339-354 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 3rd International Conference Sequences and Their Applications (SETA 2004)
会议日期: OCT 24-28, 2004
会议地点: Seoul, SOUTH KOREA
KeyWords Plus: BERLEKAMP-MASSEY ALGORITHM; SHIFT-REGISTER SYNTHESIS
摘要: It is shown that the generalized Berlekamp-Massey algorithm (GBMA, in short) for solving
the linear synthesis problem of a multi-sequence (r) under bar over F-2 can be obtained naturally
from a special form of the multi-continued fraction algorithm, called the multi-strict continued
fraction algorithm (m-SCFA, in short). Moreover, the discrepancy sequence in acting GBMA on (r)
under bar is expressed explicitly by the data associated to the multi-strict continued fraction
expansion C((r) under bar) which is obtained by applying m-SCFA on (r) under bar. As a
consequence, a 1-1 correspondence between multi-sequences of any given length and certain
multi-strict continued fractions is established.
地址: Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R
China; Chinese Acad Sci, Software Inst, Beijing 100049, Peoples R China
通讯作者地址: Dai, ZD, Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing
100049, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 14
被引频次: 7
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-26084-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 16
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCN33
-------------------------------------------------------------------------------显示 94 条,共 136 条
作者: Yang, L; Zuo, C; Wang, YG
编者: Wang, J; Liao, X; Yi, Z
标题: An effective two-stage neural network model and its application on flood loss prediction
来源出版物: ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS,
3498: 1010-1016 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Symposium on Neural Networks
会议日期: MAY 30-JUN 01, 2005
会议地点: Chongqing, PEOPLES R CHINA
会议赞助商: Chongqing Univ.; SW Normal Univ.; Chongqing Univ, Posts& Telecommun.; SW
Agr Univ.; Chongqing Educ Coll.; Chinese Univ Hong Kong.; Asia Pacific Neural Network
Assembly.; European Neural Network Soc.; IEEE Circuits & Syst Soc.; IEEE Computat
Intelligence Soc.; Natl Nat Sci Fdn China.; K C Wong Educ Fdn Hong Kong.
摘要: In this study, a two-stage radial basis function neural network based model is employed to
develop flood loss prediction model for insurance company. In the first stage, self-organizing map
clustering is used to measuring the similarity of the input data, unlike k-means approach, number
and centers of clusters can be determined dynamically and automatically. The Value-related Self
Organizing Map (VSOM) is proposed to improve predicting accuracy for high loss subject.
During the second stage, the weights from the hidden layer to output layer are determined by
multivariate linear regression method. Simulation results show that the proposed approach can be
applied successfully to build flood loss prediction models and provide higher accuracy and more
direct decision support compared to current approaches.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Yang, L, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 6
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25914-7
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 7
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCN43
-------------------------------------------------------------------------------显示 95 条,共 136 条
作者: Xing, F; Guo, P
编者: Wang, J; Liao, X; Yi, Z
标题: Support vector regression for software reliability growth modeling and prediction
来源出版物: ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 1, PROCEEDINGS,
3496: 925-930 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 2nd International Symposium on Neural Networks
会议日期: MAY 30-JUN 01, 2005
会议地点: Chongqing, PEOPLES R CHINA
会议赞助商: Chongqing Univ.; SW Normal Univ.; Chongqing Univ, Posts& Telecommun.; SW
Agr Univ.; Chongqing Educ Coll.; Chinese Univ Hong Kong.; Asia Pacific Neural Network
Assembly.; European Neural Network Soc.; IEEE Circuits & Syst Soc.; IEEE Computat
Intelligence Soc.; Natl Nat Sci Fdn China.; K C Wong Educ Fdn Hong Kong.
KeyWords Plus: NETWORKS
摘要: In this work, we propose to apply support vector regression (SVR) to build software
reliability growth model (SRCM). SRGM is an important aspect in software reliability
engineering. Software reliability is the probability that a given software will be functioning
without failure during a specified period of time in a specified environment. In order to obtain the
better performance of SRGM, practical selection of parameter C for SVR is discussed in the
experiments. Experimental results with the classical Sys1 and Sys3 SRGM data set show that the
performance of the proposed SVR-based SRCM is better than conventional SRGMs and relative
good prediction and generalization ability are achieved.
地址: Beijing Normal Univ, Dept Comp Sci, Beijing 100875, Peoples R China; Chinese Acad Sci,
Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China
通讯作者地址: Xing, F, Beijing Normal Univ, Dept Comp Sci, Beijing 100875, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 8
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25912-0
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCN38
-------------------------------------------------------------------------------显示 96 条,共 136 条
作者: Wu, P
标题: Analyzing interoperability of protocols using model checking
来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (3): 453-457 JUL 2005
语言: English
文献类型: Article
作者关键词: interoperability analysis and testing; model checking; conformance testing; protocol
摘要: In practical terms, protocol interoperability testing is still laborious and error-prone with
little effect, even for those products that have passed conformance testing. Deadlock and
unsymmetrical data communication are familiar in interoperability testing, and it is always very
hard to trace their causes. The previous work has not provided a coherent way to analyze why the
interoperability was broken among protocol implementations under test. In this paper, an
alternative approach is presented to analyzing these problems from a viewpoint of implementation
structures. Sequential and concurrent structures are both representative implementation structures,
especially in event-driven development model. Our research mainly discusses the influence of
sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a
sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical
data communication. Therefore, implementation structures carry weight on interoperability, which
may not gain much attention before. To some extent, they are decisive on the result of
interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy
may contribute to the interoperability of a protocol implementation. Herein model checking
technique is introduced into interoperability analysis for the first time. As the paper shows, it is an
effective way to validate developers' selections on implementation structures or strategies.
地址: Chinese Acad Sci, Grad Sch, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R
China
通讯作者地址: Wu, P, Chinese Acad Sci, Grad Sch, Comp Sci Lab, Inst Software, Beijing 100080,
Peoples R China.
引用的参考文献数: 12
被引频次: 0
出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG
出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN,
SHATIN, 00000, PEOPLES R CHINA
ISSN: 1022-4653
29 字符的来源出版物名称缩写: CHINESE J ELECTRON
ISO 来源文献出版物名称缩写: Chin. J. Electron.
来源文献页码计数: 5
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 945NP
-------------------------------------------------------------------------------显示 97 条,共 136 条
作者: Zhang, M; Feng, DG
标题: A concurrency control algorithm in multi-version multilevel DBMS
来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (3): 467-471 JUL 2005
语言: English
文献类型: Article
作 者 关 键 词 : multilevel DBMS (data base management system); concurrency control;
multi-version (MV); 1 copy serializable (1SR)
摘要: The conventional transaction concurrency control theory and mechanisms are challenged in
the context of a multilevel DBMS (Data base management system). Not only the correctness of
transaction processing, namely the serializability of the transaction histories, but also the security
properties should be followed. These requirements include diminishing the timing covert channels
and preventing the starving problem in high-level transactions' unlimited waiting. In this paper we
present a timestamp order based concurrency control algorithm that produce serializable histories
by correctly combining all the 1SR histories generated by different level schedulers. We also
provide an implementation scheduler algorithm based on snapshots. This approach is free from
timing covert channels and transactions of different security levels have the same privilege to
execute. In addition, this approach does not require the existence of a global trusted scheduler.
Instead, it can be built on enhanced untrusted traditional multi-version schedulers, with the
supplement of appropriate process towards read-down operations.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Securt, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100080, Peoples R China
通讯作者地址: Zhang, M, Chinese Acad Sci, Inst Software, State Key Lab Informat Securt,
Beijing 100080, Peoples R China.
引用的参考文献数: 15
被引频次: 0
出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG
出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN,
SHATIN, 00000, PEOPLES R CHINA
ISSN: 1022-4653
29 字符的来源出版物名称缩写: CHINESE J ELECTRON
ISO 来源文献出版物名称缩写: Chin. J. Electron.
来源文献页码计数: 5
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 945NP
-------------------------------------------------------------------------------显示 98 条,共 136 条
作者: Qing, SH; Wen, WP
标题: A survey and trends on Internet worms
来源出版物: COMPUTERS & SECURITY, 24 (4): 334-346 JUN 2005
语言: English
文献类型: Article
作者关键词: network security; Internet worms; scanning strategies; propagation model
摘要: With the explosive growth and increasing complexity of network applications, the threats of
Internet worms against network security are more and more serious. This paper presents the
concepts and research situations of Internet worms, their function component, and their execution
mechanism. It also addresses the scanning strategies, propagation models, and the critical
techniques of Internet worm prevention. Finally, the remaining problems and emerging trends in
this area are also outlined. (C) 2004 Elsevier Ltd. All rights reserved.
地址: Chinese Acad Sci, Engn Res Ctr Informat Secur Technol, Inst Software, Beijing 100080,
Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100080, Peoples R China
通讯作者地址: Wen, WP, Chinese Acad Sci, Engn Res Ctr Informat Secur Technol, Inst Software,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 60
被引频次: 3
出版商: ELSEVIER ADVANCED TECHNOLOGY
出版商地址: OXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE,
KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND
ISSN: 0167-4048
DOI: 10.1016/j.cose.2004.10.001
29 字符的来源出版物名称缩写: COMPUT SECURITY
ISO 来源文献出版物名称缩写: Comput. Secur.
来源文献页码计数: 13
学科类别: Computer Science, Information Systems
ISI 文献传递号: 940RE
-------------------------------------------------------------------------------显示 99 条,共 136 条
作者: Wang, WC; Li, J; Wu, EH
标题: 2D point-in-polygon test by classifying edges into layers
来源出版物: COMPUTERS & GRAPHICS-UK, 29 (3): 427-439 JUN 2005
语言: English
文献类型: Article
作者关键词: point containment; layered edges; polygon; computational geometry
KeyWords Plus: GENERAL POLYHEDRA; PLANAR POLYGONS; INCLUSION TEST;
COMPLEXITY; ALGORITHM
摘要: The 2D point-in-polygon test is a fundamental problem in geometry, and of importance in
various applications in computer graphics and other areas. In taking advantage of the basic idea of
the polygon scan conversion algorithm, a novel method for the point-in-polygon test is proposed
in this paper, capable of handling simple polygons in arbitrary shapes, possibly with holes. In the
preprocess of the method. the edges of the polygon are classified into layers according to the
occlusion relations between the edges viewed orthogonally in a direction, called the test direction,
which guarantees that the edges of a layer can be occluded by only the edges of its preceding
layers. At the same time, the edges at each layer are queued up respectively along the direction
vertical to the test direction because there is no occlusion relation between the edges of the same
layer. As a result, based on the layers, the calculation of the segments by the line through the
tested point to intersect the polygon along the test direction, and then the inclusion test of the point
against the segments could be feasibly made. The method has a low storage requirement in O(n),
here, n is the number of the edges of the polygon. The time complexity of its preprocess ranges
from O(n) to O(n(2)), depending on the polygon shape and the test direction. And its inclusion test
has a time complexity between O(log(n)) and O(n), but less than O((log(n))(2)) in most cases,
depending on the construction of the layers. In the case of convex polygons and monotone
polygons, the time complexity for the preprocess and the inclusion test could be O(n) and
O(log(n)), respectively. On the other hand, the method is also easy to integrate with a variety of
existing methods such as ray crossing methods and grid-based methods for improving the
inclusion test further. Experimental results show that the method is robust and efficient in
computation. (c) 2005 Elsevier Ltd, All rights reserved.
地址: Chinese Acad Sci, Key Lab Comp Sci, Inst Software, Beijing 100080, Peoples R China;
Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ Macau, Fac Sci & Technol,
Macao, Peoples R China
通讯作者地址: Wang, WC, Chinese Acad Sci, Key Lab Comp Sci, Inst Software, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 16
被引频次: 7
出版商: PERGAMON-ELSEVIER SCIENCE LTD
出版商地址: THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB,
ENGLAND
ISSN: 0097-8493
DOI: 10.1016/j.cag.2005.03.001
29 字符的来源出版物名称缩写: COMPUT GRAPH-UK
ISO 来源文献出版物名称缩写: Comput. Graph.-UK
来源文献页码计数: 13
学科类别: Computer Science, Software Engineering
ISI 文献传递号: 940QY
-------------------------------------------------------------------------------显示 100 条,共 136 条
作者: Deng, XT; Guo, GJ; Zang, WN
标题: Corrigendum to proof of Chvatal's conjecture on maximal stable sets and maximal cliques
in graphs (vol 91, pg 301, 2004)
来源出版物: JOURNAL OF COMBINATORIAL THEORY SERIES B, 94 (2): 352-353 JUL
2005
语言: English
文献类型: Correction
地址: Univ Hong Kong, Dept Math, Hong Kong, Hong Kong, Peoples R China; City Univ Hong
Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China; Shandong Univ, Sch Math &
Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080,
Peoples R China
通讯作者地址: Zang, WN, Univ Hong Kong, Dept Math, Hong Kong, Hong Kong, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 2
被引频次: 3
出版商: ACADEMIC PRESS INC ELSEVIER SCIENCE
出版商地址: 525 B ST, STE 1900, SAN DIEGO, CA 92101-4495 USA
ISSN: 0095-8956
DOI: 10.1016/j.jctb.2005.02.003
29 字符的来源出版物名称缩写: J COMB THEOR B
ISO 来源文献出版物名称缩写: J. Comb. Theory Ser. B
来源文献页码计数: 2
学科类别: Mathematics
ISI 文献传递号: 937TB
-------------------------------------------------------------------------------显示 101 条,共 136 条
作者: Wang, GL; Qing, SH
编者: Gervasi, O; Gavrilova, ML; Kumar, V; Lagana, A; Lee, HP; Mun, Y; Taniar, D; Tan, CJK
标题: Security flaws in several group signatures proposed by Popescu
来源出版物: COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3,
3482: 711-718 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Science and Its Applications (ICCSA
2005)
会议日期: MAY 09-12, 2005
会议地点: Singapore, SINGAPORE
会议赞助商: Inst High Performance Comp.; Univ Perugia.; Univ Calgary.; Univ Minnesota.;
Queens Univ Belfast.; Soc Ind & Appl Math.; IEE.; OptimaNumerics Ltd.; MASTER UP.
作者关键词: group signature; digital signature; information security
KeyWords Plus: SCHEME
摘要: In resent years, Popescu et al. proposed several group signature schemes in [8, 9, 10, 11]
that based on the Okamoto-Shiraishi assumption. Their schemes are claimed to be secure.
However, we identify several security flaws in their schemes and then show that these schemes are
all insecure. By exploiting those flaws, anybody (not necessarily a group member) can forge valid
group signatures on arbitrary messages of his/her choice. In other words, these schemes are
universally forgeable.
地址: Inst Infocomm Res, Singapore 119613, Singapore; Chinese Acad Sci, Inst Software,
ERCIST, Beijing 100080, Peoples R China
通讯作者地址: Wang, GL, Inst Infocomm Res, 21 Heng Mui Keng Terrace, Singapore 119613,
Singapore.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 13
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25862-0
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 8
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCK21
-------------------------------------------------------------------------------显示 102 条,共 136 条
作者: Ji, JF; Li, S; Wu, EH; Liu, XH
编者: Gervasi, O; Gavrilova, ML; Kumar, V; Lagana, A; Lee, HP; Mun, Y; Taniar, D; Tan, CJK
标题: Interactive transmission of highly detailed surfaces
来源出版物: COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3,
3482: 1167-1176 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: International Conference on Computational Science and Its Applications (ICCSA
2005)
会议日期: MAY 09-12, 2005
会议地点: Singapore, SINGAPORE
会议赞助商: Inst High Performance Comp.; Univ Perugia.; Univ Calgary.; Univ Minnesota.;
Queens Univ Belfast.; Soc Ind & Appl Math.; IEE.; OptimaNumerics Ltd.; MASTER UP.
摘要: It is a challenging work for transmitting the highly detailed surfaces interactively to meet
real time requirement of the large-scale model visualization from clients. In this paper, we propose
a novel approach to interactive transmission of highly detailed surfaces according to the viewpoint.
We firstly map the 3D surfaces onto the parameter space through surface parametrization, and the
geometry images (GIM) and normal map atlas are obtained by regular re-sampling. Then the
quadtree-based hierarchical representation can be constructed based on GIM. Since the
hierarchical structure is regular, an efficient compression scheme can be applied to encode the
structure and vertices of its nodes. The encoded nodes can be transmitted in arbitrary order, so the
extreme flexibility in transmission could be achieved. By taking advantage of normal texture atlas,
the rendering result of the partial transmitted model is improved greatly, and then only the
geometry on the silhouette to the current viewpoint need be refined and transmitted, and so the
amount of data needed to transfer each frame is greatly reduced,
地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China; Univ Macao,
Dept Comp & Informat Sci, Macao, Peoples R China; Peking Univ, Sch Elect Engn & Comp Sci,
Beijing, Peoples R China
通讯作者地址: Ji, JF, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected]
引用的参考文献数: 16
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25862-0
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCK21
-------------------------------------------------------------------------------显示 103 条,共 136 条
作者: Chen, YR; Sun, JC
标题: An irregular grid for the numerical solution of linear elliptic partial differential equations
来源出版物: APPLIED MATHEMATICS AND COMPUTATION, 166 (1): 84-94 JUL 6 2005
语言: English
文献类型: Article
作者关键词: irregular grid; elliptic PDEs; condition number; CG
摘要: This paper first presents a symmetrically geometric proportion grid with respect to the
boundary for linear elliptic partial differential equations with the homogeneous Dirichlet
conditions. Then a symmetric scaling technique is proposed for the coefficient matrix derived
from the second-order centered difference discretization on the irregular grid. It is proved that the
condition number of the symmetrically scaled system is bounded by a constant independent of the
matrix order for one-dimensional problem. The numerical results also indicate that the same
conclusion holds for a two-dimensional problem. (c) 2004 Elsevier Inc. All rights reserved.
地址: Intel China Res Ctr, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software,
Lab Parallel Comp, Beijing 100080, Peoples R China
通讯作者地址: Chen, YR, Intel China Res Ctr, 8F,Raycom Infotech Pk A,2 Kexueyuan S Rd,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 6
被引频次: 1
出版商: ELSEVIER SCIENCE INC
出版商地址: 360 PARK AVE SOUTH, NEW YORK, NY 10010-1710 USA
ISSN: 0096-3003
DOI: 10.1016/j.amc.2004.04.055
29 字符的来源出版物名称缩写: APPL MATH COMPUT
ISO 来源文献出版物名称缩写: Appl. Math. Comput.
来源文献页码计数: 11
学科类别: Mathematics, Applied
ISI 文献传递号: 937UE
-------------------------------------------------------------------------------显示 104 条,共 136 条
作者: Sun, H; Lin, DD
标题: Dynamic security analysis of group key agreement protocol
来源出版物: IEE PROCEEDINGS-COMMUNICATIONS, 152 (2): 134-137 APR 2005
语言: English
文献类型: Article
摘 要 : Group key agreement is a fundamental building block for increasing collaborative
applications. The protocol is more complicated than peer-to-peer communication owing to its
dynamic characteristics, but the research to date on group key agreement protocols (GKAP)
mainly focuses on the static security and the most distinctively dynamic characteristic of GKAP is
difficult to analyse by existing methods. The paper attempts to extend the strand space theory to
analyse the dynamic security of GKAP. With the aid of the theory, the AT-GDH protocol is taken
as an example to discuss the general conditions of the security retention in dynamic cases. A new
scheme is proposed of updating the session key when some member leaves the group based on
SA-GDH.2 protocol to avoid the single-point weakness.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Sun, H, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 11
被引频次: 0
出版商: IEE-INST ELEC ENG
出版商地址: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD
SG1 2AY, ENGLAND
ISSN: 1350-2425
DOI: 10.1049/ip-com:20045193
29 字符的来源出版物名称缩写: IEE PROC-COMMUN
ISO 来源文献出版物名称缩写: IEE Proc.-Commun.
来源文献页码计数: 4
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 934ZR
-------------------------------------------------------------------------------显示 105 条,共 136 条
作者: Gan, QQ; Song, GF; Xu, Y; Gao, JX; Cao, Q; Pan, XJ; Zhong, Y; Yang, GH; Zhu, XP; Chen,
LH
标题: Performance analysis of very-small-aperture lasers
来源出版物: OPTICS LETTERS, 30 (12): 1470-1472 JUN 15 2005
语言: English
文献类型: Article
KeyWords Plus: DATA-STORAGE
摘要: The fabrication of very-small-aperture lasers is demonstrated, and their performance is
analyzed. Because of strong optical feedback caused by a gold film on the front facet of the laser,
its behavior changes: The threshold current decreases, the density of light inside the laser diode
and the redshift effect of the spectra are enhanced, and the laser diode's lifetime is shorter than that
of common laser diodes with large driving current. (c) 2005 Optical Society of America
地址: Chinese Acad Sci, Inst Semicond, Beijing 100083, Peoples R China; Chinese Acad Sci,
Grad Sch, Beijing 100039, Peoples R China; EO Natl Co Ltd, Guangdong 516023, Peoples R
China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Gan, QQ, Chinese Acad Sci, Inst Semicond, POB 912, Beijing 100083, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 6
被引频次: 14
出版商: OPTICAL SOC AMER
出版商地址: 2010 MASSACHUSETTS AVE NW, WASHINGTON, DC 20036 USA
ISSN: 0146-9592
29 字符的来源出版物名称缩写: OPTICS LETTERS
ISO 来源文献出版物名称缩写: Opt. Lett.
来源文献页码计数: 3
学科类别: Optics
ISI 文献传递号: 934EJ
-------------------------------------------------------------------------------显示 106 条,共 136 条
作者: Qu, HP; Su, PR; Lin, DD; Feng, DG
编者: Lorenz, P; Dini, P
标题: A packet marking scheme for IP traceback
来源出版物: NETWORKING - ICN 2005, PT 2, 3421: 964-971 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 4th International Conference on Networking (ICN 2005)
会议日期: APR 17-21, 2005
会议地点: Reunion Isl, FRANCE
摘要: DDoS attack is a big problem to the Internet community due to its high-profile, severe
damage, and the difficulty in defending against it. Several countermeasures are proposed for it in
the literature, among which, Probabilistic Packet Marking (PPM) first developed by Savage et al.
is promising. However, the PPM marking schemes have the limitations in two main aspects: high
computation overhead and large number of false positives. In this paper, a new packet marking
scheme is proposed, which is more practical because of higher precision, and computationally
more efficient compared with the PPM scheme proposed by Savage. Furthermore, this scheme can
achieve a more higher precision than Advanced Marking Schemes in case of the victim knowing
the map of its upstream routers.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Qu, HP, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, POB
8718, Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 9
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25338-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 8
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCF68
-------------------------------------------------------------------------------显示 107 条,共 136 条
作者: Su, PR; Li, DQ; Qu, HP; Feng, DG
编者: Lorenz, P; Dini, P
标题: Detecting the deviations of privileged process execution
来源出版物: NETWORKING - ICN 2005, PT 2, 3421: 980-988 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 4th International Conference on Networking (ICN 2005)
会议日期: APR 17-21, 2005
会议地点: Reunion Isl, FRANCE
摘要: Most intruders access system unauthorizedly by exploiting vulnerabilities of privileged
processes. Respectively monitoring privileged processes via system call sequences is one of
effective methods to detect intrusions. Based on the analysis of popular attacks, we bring forward
a new intrusion detection model monitoring the system call sequences, which use locally fuzzy
matching to improve the detection accuracy. And the model adopts a novel profile generation
method, which could easily generate better profile. The experimental results show that both the
accuracy and the efficiency have been improved.
地址: Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R
China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
通讯作者地址: Su, PR, Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing
100080, Peoples R China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 14
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25338-6
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 9
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCF68
-------------------------------------------------------------------------------显示 108 条,共 136 条
作者: Liang, B; Liu, H; Shi, WC; Wu, YJ
编者: Deng, RH; Bao, F; Pang, HH; Zhou, JY
标题: Enforcing the principle of least privilege with a state-based privilege control model
来源出版物: INFORMATION SECURITY PRACTICE AND EXPERIENCE, 3439: 109-120
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st Information Security Practice and Experience Conference
会议日期: APR 11-14, 2005
会议地点: Singapore, SINGAPORE
会议赞助商: Inst Infocomm Res.; Singapore Management UNiv.; Sch Informat Syst.; Singapore
Management Univ.
摘要: In order to provide effective support to the principle of least privilege, considering the
limitation of traditional privilege mechanisms, this paper proposes a new privilege control model
called State-Based Privilege Control (SBPC) and presents the design and implementation of a
prototype system for SBPC called Controlled Privilege Framework (CPF) on the Linux operating
system platform. SBPC decomposes the time space of a process' lifetime into a series of privilege
states according to activities of the process and its need for special permissions. The privilege state
is closely related to the application logic of a process. It is the privilege state transfer event that
stimulates a process to transfer from one privilege state into another one. For a specified process,
there is a specific set of privileges corresponding to every privilege state of the process. With the
implementation of CPF, experiment results show that fine-grain and automatic privilege control
can be exercised transparently to traditional applications, threats of intrusion to a system can be
reduced greatly, and support to the principle of least privilege can therefore be achieved
effectively.
地址: Tsing Hua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China; Venus Info
Tech Inc, Beijing 100081, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080,
Peoples R China
通讯作者地址: Liang, B, Tsing Hua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R
China.
电子邮箱地址: [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 10
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25584-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCG09
-------------------------------------------------------------------------------显示 109 条,共 136 条
作者: Wu, YJ; Shi, WC; Liang, HL; Shang, QH; Yuan, CY; Liang, B
编者: Deng, RH; Bao, F; Pang, HH; Zhou, JY
标题: Security on-demand architecture with multiple modules support
来源出版物: INFORMATION SECURITY PRACTICE AND EXPERIENCE, 3439: 121-131
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st Information Security Practice and Experience Conference
会议日期: APR 11-14, 2005
会议地点: Singapore, SINGAPORE
会议赞助商: Inst Infocomm Res.; Singapore Management UNiv.; Sch Informat Syst.; Singapore
Management Univ.
摘要: It's very important for a general-purpose operating system to have a security-tunable feature
to meet different security requirements. This can be achieved by supporting diverse security
modules, invoking them on demand. However, the security architectures of existing projects on
Linux kernels do not support this feature or have some drawbacks in their supporting. Thus we
introduce a layered architecture which consists of original kernel layer, module coordination layer
and module decision layer. The architecture supports multiple modules register, resolves
policy-conflicts of modules by changing their invoking order, and allow user to customize the
security by enabling or disabling modules during runtime. The detailed structure and
implementation in Linux based system, SECIMOS is described. The caching issue and
performance are also discussed. Our practice showed the architecture helps us achieve flexible
adaptation in different environments.
地址: Chinese Acad Sci, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch,
Beijing, Peoples R China
通讯作者地址: Wu, YJ, Chinese Acad Sci, Inst Software, 712,POB 1871, Beijing, Peoples R
China.
电子邮箱地址: [email protected]
引用的参考文献数: 9
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25584-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 11
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCG09
-------------------------------------------------------------------------------显示 110 条,共 136 条
作者: Tan, ZW; Liu, ZJ; Wang, MS
编者: Deng, RH; Bao, F; Pang, HH; Zhou, JY
标题: On the security of some nonrepudiable threshold proxy signature schemes
来源出版物: INFORMATION SECURITY PRACTICE AND EXPERIENCE, 3439: 374-385
2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st Information Security Practice and Experience Conference
会议日期: APR 11-14, 2005
会议地点: Singapore, SINGAPORE
会议赞助商: Inst Infocomm Res.; Singapore Management UNiv.; Sch Informat Syst.; Singapore
Management Univ.
KeyWords Plus: SIGNERS
摘要: A (t, n) threshold proxy signature scheme enables an original signer or a group of original
signers to delegate the signature authority to a proxy group of n members such that not less than t
proxy signers can cooperatively sign messages on behalf of the original signer or the original
signer group. In the paper, we show that Sun's and Yang et al.'s threshold proxy signature schemes
are insecure against the original signer's forgery, and that Tzeng et al.'s threshold multi-proxy
multi-signature scheme is vulnerable against the actual original signer group's forgery. We also
show that Hsu et al.'s threshold proxy signature scheme suffers from the conspiracy of the original
signer and the secret share dealer SA, and that Hwang et al.'s threshold proxy signature scheme is
universally forgeable. In other words, none of the above-mentioned schemes holds the
unforgeability and provides non-repudiation.
地址: CAS, AMSS, Key Lab Math Mechanizat, Beijing 100080, Peoples R China; CAS, State
Key Lab Informat Secur, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst
Software, Beijing 100080, Peoples R China
通讯作者地址: Tan, ZW, CAS, AMSS, Key Lab Math Mechanizat, Beijing 100080, Peoples R
China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 22
被引频次: 2
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25584-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCG09
-------------------------------------------------------------------------------显示 111 条,共 136 条
作者: Lin, HM
编者: Liu, Z; Araki, K
标题: A predicate spatial logic and model checking for mobile processes
来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2004, 3407: 36-36 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004)
会议日期: SEP 20-24, 2004
会议地点: Guiyang, PEOPLES R CHINA
会议赞助商: UN Univ, Int Inst Software Technol.; Guizhou Acad Sci.
地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100864, Peoples R China
通讯作者地址: Lin, HM, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100864,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 0
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25304-1
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 1
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCF19
-------------------------------------------------------------------------------显示 112 条,共 136 条
作者: Ma, YL; Wei, J; Jin, BH; Liu, SH
编者: Liu, Z; Araki, K
标题: A formal framework for ontology integration based on a default extension to DDL
来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2004, 3407: 154-169 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004)
会议日期: SEP 20-24, 2004
会议地点: Guiyang, PEOPLES R CHINA
会议赞助商: UN Univ, Int Inst Software Technol.; Guizhou Acad Sci.
作者关键词: ontology integration; distributed description logics; default extension; Tableau
algorithm; semantic query
KeyWords Plus: SEMANTIC WEB
摘要: The information society demands complete information from multiple sources, where
available information is often heterogeneous and distributed. Because of semantic heterogeneities
among ontologies of different information sources, it is rather difficult to integrate these local
ontologies and get completely available information. In this paper, we propose a formal
framework for integration of multiple ontologies from distributed information sources. To achieve
this goal, implicit default information is extensively considered. We make a default extension to
distributed description logics (DDL) for ontology integration and complete information query. A
complete information query based on the integrated ontologies can boil down to checking default
satisfiability of complex concept in accord with the query. Default satisfiability can be detected
through an adapted tableau algorithm. Based on the proposed formal framework, a prototype
system is developed, which can integrate strict as well as default information from multiple
distributed information sources and global semantic information query can be performed.
地址: Chinese Acad Sci, Inst Software, Technol Ctr Software Engn, Beijing 100080, Peoples R
China
通讯作者地址: Ma, YL, Chinese Acad Sci, Inst Software, Technol Ctr Software Engn, POB 8718,
Beijing 100080, Peoples R China.
电 子 邮 箱地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 24
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25304-1
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 16
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCF19
-------------------------------------------------------------------------------显示 113 条,共 136 条
作者: Zhou, CX; Zheng, H; Yu, W; Yao, JF; Li, YC
标题: Digital analysis technology for morphology of polymer chain coils in flow fields
来源出版物: CHINESE JOURNAL OF POLYMER SCIENCE, 23 (2): 155-158 MAR 2005
语言: English
文献类型: Proceedings Paper
会议标题: 6th International Symposium on Polymer Physics
会议日期: JUN 01-05, 2004
会议地点: Dali, PEOPLES R CHINA
会议赞助商: State Key Lab Polymer Phys & Chem.; Univ Akron.; Tohohy Univ.; Inst Charles
Sadron.; Natl Nat Sci Fdn China.; Chinese Acad Sci.; Inst Chem.; CAS, Changchum Inst Appl
Chem.; CAS, Polymer Div Chinese Chem Soc.
作者关键词: morphology of polymer chain; complex flows; conformation tensor; finite element
method (FEM); software DAMPC
KeyWords Plus: MELTS
摘要: Polymer chain coils with entanglement is a crucial scale of structures in polymer materials
since their relaxation times are matching practical processing times. Based on the
phenomenological model of polymer chain coils and a new finite element approach, we have
designed a computer software including solver, pre- and post-processing modules, and developed
a digital analysis technology for the morphology of polymer chain coils in flow fields (DAMPC).
Using this technology we may simulate the morphology development of chain coils in various
flow fields, such as simple shear flow, elongational flow, and any complex flow at transient or
steady state. The applications made up to now show that the software predictions are comparable
with experimental results.
地址: Shanghai Jiao Tong Univ, Dept Polymer Sci & Engn, Shanghai 200240, Peoples R China;
Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhou, CX, Shanghai Jiao Tong Univ, Dept Polymer Sci & Engn, Shanghai 200240,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 5
被引频次: 0
出版商: SPRINGER HEIDELBERG
出版商地址: TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY
ISSN: 0256-7679
29 字符的来源出版物名称缩写: CHINESE J POLYM SCI
ISO 来源文献出版物名称缩写: Chin. J. Polym. Sci.
来源文献页码计数: 4
学科类别: Polymer Science
ISI 文献传递号: 932MG
-------------------------------------------------------------------------------显示 114 条,共 136 条
作者: Liu, N; Yan, J; Bai, F; Zhang, BY; Xi, WS; Fan, WG; Chen, Z; Ji, L; Hu, CY; Ma, WY
编者: Zhang, Y; Tanaka, K; Yu, JX; Wang, S; Li, M
标题: A similarity reinforcement algorithm for heterogeneous Web pages
来源出版物: WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005,
3399: 121-132 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 7th Asia-Pacific Web Conference
会议日期: MAR 29-APR 01, 2005
会议地点: Shanghai, PEOPLES R CHINA
会议赞助商: Natl Inst Informat & Commun Technol.; Shanghai Jiao Tong Univ.; Victoria Univ.;
Natl Nat Sci Fdn China.; ARC Res Netwp=ork Enterprise Informat Infrastructure.; Microsoft Res
Asia.; WISE Soc.; Database Soc China Comp Federat.
摘要: Many machine learning and data mining algorithms crucially rely on the similarity metrics.
However, most early research works such as Vector Space Model or Latent Semantic Index only
used single relationship to measure the similarity of data objects. In this paper, we first use an
Intra- and Inter- Type Relationship Matrix (IITRM) to represent a set of heterogeneous data
objects and their inter-relationships. Then, we propose a novel similarity-calculating algorithm
over the Inter- and Intra- Type Relationship Matrix. It tries to integrate information from
heterogeneous sources to serve their purposes by iteratively computing. This algorithm can help
detect latent relationships among heterogeneous data objects. Our new algorithm is based on the
intuition that the intrarelationship should affect the inter-relationship, and vice versa. Experimental
results on the MSN logs dataset show that our algorithm outperforms the traditional Cosine
similarity.
地址: Tsing Hua Univ, Dept Math Sci, Beijing 100084, Peoples R China; Peking Univ, Sch Math
Sci, Dept Informat Sci, LMAM, Beijing, Peoples R China; Microsoft Res Asia, Beijing, Peoples R
China; Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA; Chinese Acad Sci, Inst
Software, Lab Internet Software Technol, Beijing, Peoples R China
通讯作者地址: Liu, N, Tsing Hua Univ, Dept Math Sci, Beijing 100084, Peoples R China.
电 子 邮 箱 地 址 :
[email protected];
[email protected];
[email protected]
引用的参考文献数: 30
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25207-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCD84
-------------------------------------------------------------------------------显示 115 条,共 136 条
作者: Che, HY; Zhang, JC; Yu, SQ; Gu, J
编者: Zhang, Y; Tanaka, K; Yu, JX; Wang, S; Li, M
标题: IWWS: A reliability-based WWW collaborative recommender system
来源出版物: WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005,
3399: 375-380 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 7th Asia-Pacific Web Conference
会议日期: MAR 29-APR 01, 2005
会议地点: Shanghai, PEOPLES R CHINA
会议赞助商: Natl Inst Informat & Commun Technol.; Shanghai Jiao Tong Univ.; Victoria Univ.;
Natl Nat Sci Fdn China.; ARC Res Netwp=ork Enterprise Informat Infrastructure.; Microsoft Res
Asia.; WISE Soc.; Database Soc China Comp Federat.
摘要: Recommender systems using collaborative filtering are a popular technique for reducing
information overload and finding products. In this paper, we present a reliability-based WWW
collaborative recommender system IWWS (Intelligent Web Wizard System), mainly aiming to
attack so-called "Matchmaker" problem in collaborative filtering. The "Matchmaker" problem
steins from false assumptions that users are counted only by their similarity and high similarity
means good advisers. In order to find good advisers for every user, we construct a matchmaker's
reliability mode based on the algorithm deriving from Hits, and apply it in IWWS. Comparative
experimental results also show that IWWS contrastively improves performance.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Beijing Normal Univ,
Coll Informat Sci, Beijing 100875, Peoples R China; Sci & Technol Univ, Dept Comp Sci, Hong
Kong, Hong Kong, Peoples R China
通讯作者地址: Che, HY, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
引用的参考文献数: 10
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25207-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCD84
-------------------------------------------------------------------------------显示 116 条,共 136 条
作者: Hui, CY; Wang, YJ; Zhang, BY; Yang, Q; Wang, Q; Zhou, JH; He, R; Yan, Y
编者: Zhang, Y; Tanaka, K; Yu, JX; Wang, S; Li, M
标题: Mining quantitative associations in large database
来源出版物: WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005,
3399: 405-416 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 7th Asia-Pacific Web Conference
会议日期: MAR 29-APR 01, 2005
会议地点: Shanghai, PEOPLES R CHINA
会议赞助商: Natl Inst Informat & Commun Technol.; Shanghai Jiao Tong Univ.; Victoria Univ.;
Natl Nat Sci Fdn China.; ARC Res Netwp=ork Enterprise Informat Infrastructure.; Microsoft Res
Asia.; WISE Soc.; Database Soc China Comp Federat.
摘要: Association Rule Mining algorithms operate on a data matrix to derive association rule,
discarding the quantities of the items, which contains valuable information. In order to make full
use of the knowledge inherent in the quantities of the items, an extension named Ratio Rules [6] is
proposed to capture the quantitative association. However, the approach, which is addressed in [6],
is mainly based on Principle Component Analysis (PCA) and as a result, it cannot guarantee that
the ratio coefficient is non-negative. This may lead to serious problems in the association rules'
application. In this paper, a new method, called Principal Non-negative Sparse Coding (PNSC), is
provided for learning the associations between itemsets in the form of Ratio Rules. Experiments
on several datasets illustrate that the proposed method performs well for the purpose of
discovering latent associations between itemsets in large datasets.
地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing, Peoples R China;
Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China;
Peking Univ, Sch Math Sci, Dept Informat Sci, Beijing, Peoples R China
通讯作者地址: Hui, CY, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing,
Peoples R China.
电 子 邮 箱 地 址 :
[email protected];
[email protected];
[email protected]; [email protected]; [email protected]; [email protected];
[email protected]; [email protected]
引用的参考文献数: 19
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-25207-X
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCD84
-------------------------------------------------------------------------------显示 117 条,共 136 条
作者: Wu, WL; Feng, DG; Chen, H
编者: Handschuh, H; Hasan, MA
标题: Collision attack and pseudorandomness of reduced-round Camellia
来源出版物: SELECTED AREAS IN CRYPTOGRAPHY, 3357: 252-266 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 11th Annual International Workshop on Selected Areas in Cryptography
会议日期: AUG 09-10, 2004
会议地点: Waterloo, CANADA
会议赞助商: Mitsubishi Elect Corp.; Res Mot Ltd.; Queens Univ Kingston.
会议主办方: Univ Waterloo
作者关键词: block cipher; Camellia; data complexity; time complexity; pseudorandomness
KeyWords Plus: PERMUTATIONS
摘要: Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct
some efficient distinguishers between 4-round Camellia and random permutation of the blocks
space. By using collision-searching techniques, the distinguishers are used to attack 6,7,8 and 9
rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The
attack on 6-round of 128-bit key Camellia is more efficient than known attacks. The complexities
of the attack on 7(8,9,10)-round Camellia without FL/FL-1 functions are less than that of previous
attacks. Furthermore, we prove that the 4-round primitive-wise idealized Camellia is not
pseudorandom permutation and the 5-round primitive-wise idealized Camellia is
super-pseudorandom permutation for non-adaptive adversaries.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Wu, WL, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 15
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-24327-5
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 15
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BCB96
-------------------------------------------------------------------------------显示 118 条,共 136 条
作者: Wang, JF; Li, L; Sun, FC; Zhou, MT
标题: A probability-guaranteed adaptive timeout algorithm for high-speed network flow detection
来源出版物: COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER
AND TELECOMMUNICATIONS NETWORKING, 48 (2): 215-233 JUN 6 2005
语言: English
文献类型: Article
作者关键词: passive network measurement; flow termination decision; flow compression
摘要: Collecting network traffic is becoming a more challenging task in passive network
measurement due to the rapid growth of link speed. Flow-based network traffic capture and
storage provides an efficient way for high-speed network measurement. The paper concentrates on
the flow detection issue which is also the premise for further flow-based traffic analysis and
modeling in such challenging environment. Based on the statistical investigation of the
correlations between flow size and the maximum packet interarrival time within a flow, we obtain
the empirical conditional distribution functions for some popular TCP protocol-based application
flows, and then propose a Probability-Guaranteed Adaptive Timeout algorithm (PGAT) for flow
termination decision. The assessment criteria for flow termination decision algorithm is
systematically developed. Comparisons onflow generation ratio,flow intact ratio, and meanflow
extra retaining time metrics indicate that the PGAT algorithm can obtain more attractive
performance than other related works. (c) 2004 Elsevier B.V. All rights reserved.
地址: Chinese Acad Sci, Inst Software, Lab Gen Software, Beijing 100080, Peoples R China;
Tsing Hua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China; Univ Elect Sci &
Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China
通讯作者地址: Wang, JF, Chinese Acad Sci, Inst Software, Lab Gen Software, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 21
被引频次: 1
出版商: ELSEVIER SCIENCE BV
出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
ISSN: 1389-1286
DOI: 10.1016/j.comnet.2004.11.005
29 字符的来源出版物名称缩写: COMPUT NETW
ISO 来源文献出版物名称缩写: Comput. Netw.
来源文献页码计数: 19
学科类别: Computer Science, Hardware & Architecture; Computer Science, Information Systems;
Engineering, Electrical & Electronic; Telecommunications
ISI 文献传递号: 921ON
-------------------------------------------------------------------------------显示 119 条,共 136 条
作者: Zhang, JL; Sun, L; Qu, WM; Du, L; Sun, YF
编者: Su, KY; Tsujii, J; Lee, JH; Kwong, OY
标题: A three level cache-based adaptive Chinese language model
来源出版物: NATURAL LANGUAGE PROCESSING - IJCNLP 2004, 3248: 487-492 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 1st International Joint Conference on Natural Language Processing (IJCNLP 2004)
会议日期: MAR 22-24, 2004
会议地点: Hainan Isl, PEOPLES R CHINA
摘要: Even if n-grams were proved to be very powerful and robust in various tasks involving
language models, they have a certain handicap that the dependency is limited to very short local
context because of the Markov assumption. This article presents an improved cache based
approach to Chinese statistical language modeling. We extend this model by introducing the
Chinese concept lexicon into it. The cache of the extended language model contains not only the
words occurred recently but also the semantically related words. Experiments have shown that the
performance of the adaptive model has been improved greatly.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhang, JL, Chinese Acad Sci, Inst Software, POB 8717, Beijing 100080, Peoples
R China.
电子邮箱地址: [email protected]
引用的参考文献数: 9
被引频次: 0
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-24475-1
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 6
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BBZ57
-------------------------------------------------------------------------------显示 120 条,共 136 条
作者: Li, SG; Li, GJ; Zhang, SQ
标题: Minimizing makespan with release times on identical parallel batching machines
来源出版物: DISCRETE APPLIED MATHEMATICS, 148 (1): 127-134 APR 30 2005
语言: English
文献类型: Article
作者关键词: polynomial time approximation scheme; identical parallel hatching machines;
scheduling; makespan
摘要: We consider the problem of scheduling n jobs on m identical parallel batching machines.
Each job is characterized by a release time and a processing time. Each machine can process up to
B (B < n) jobs as a batch simultaneously. The processing time of a batch is equal to the largest
processing time among all jobs in the batch. The objective is to minimize the maximum
completion time (makespan). We present a polynomial time approximation scheme (PTAS) for
this problem. (c) 2004 Elsevier B.V. All rights reserved.
地址: Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China; Chinese Acad Sci,
Inst Software, Beijing 100080, Peoples R China; Shandong Univ, Sch Math & Syst Sci, Jinan
250100, Peoples R China; Tianjin Normal Univ, Sch Comp & Informat Engn, Tianjin 300074,
Peoples R China
通讯作者地址: Li, SG, Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 9
被引频次: 6
出版商: ELSEVIER SCIENCE BV
出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
ISSN: 0166-218X
DOI: 10.1016/j.dam.2004.11.004
29 字符的来源出版物名称缩写: DISCRETE APPL MATH
ISO 来源文献出版物名称缩写: Discret Appl. Math.
来源文献页码计数: 8
学科类别: Mathematics, Applied
ISI 文献传递号: 916HT
-------------------------------------------------------------------------------显示 121 条,共 136 条
作者: Ji, QG; Qing, SH; He, YP
标题: A new formal model for privilege control with supporting POSIX capability mechanism
来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (1): 46-66 FEB
2005
语言: English
文献类型: Article
作者关键词: formal model; least privilege; role; domain; capability
摘要: In order to enforce the least privilege principle in the operating system, it is necessary for
the process privilege to be effectively controlled; but this is very difficult because a process
always changes as time changes. In this paper, based on the analysis on how the process privilege
is generated and how it works, a hierarchy implementing the least privilege principle with three
layers, i.e. administration layer, functionality control layer and performance layer, is posed. It is
clearly demonstrated that to bound privilege's working scope is a critical part for controlling
privilege, but this is only mentioned implicitly while not supported in POSIX capability
mechanism. Based on analysis of existing control mechanism for privilege, not only an improved
capability inheritance formula but also a new complete formal model for controlling process based
on integrating RBAC, DTE, and POSIX capability mechanism is introduced. The new invariants
in the model show that this novel privilege control mechanism is different from RBAC ' s, IDTE '
s, and POSIX ' s, and it generalizes subdomain control mechanism and makes this mechanism
dynamic.
地址: Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol, Beijing 100080,
Peoples R China
通讯作者地址: Ji, QG, Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol,
Beijing 100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 25
被引频次: 1
出版商: SCIENCE CHINA PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1009-2757
DOI: 10.1360/03yf0244
29 字符的来源出版物名称缩写: SCI CHINA SER F
ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci.
来源文献页码计数: 21
学科类别: Computer Science, Information Systems
ISI 文献传递号: 914JL
-------------------------------------------------------------------------------显示 122 条,共 136 条
作者: Wu, WL; Feng, DG
标题: Collision attack on reduced-round Camellia
来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (1): 78-90 FEB
2005
语言: English
文献类型: Article
作者关键词: block cipher; collision attack; key; data complexity; time complexity
摘要: Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct
some efficient distinguishers between 4-round Camellia and a random permutation of the blocks
space. By using collision-searching techniques, the distinguishers; are used to attack on 6, 7, 8 and
9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of Camellia with 192/256-bit key.
The 128-bit key of 6 rounds Camellia can be recovered with 2(10) chosen plaintexts and 2(15)
encryptions. The 128-bit key of 7 rounds Camellia can be recovered with 2(12) chosen plaintexts
and 2(54.5) encryptions. The 128-bit key of 8 rounds Camellia can be recovered with 2(13)
chosen plaintexts and 2(112.1) encryptions. The 128-bit key of 9 rounds Camellia can be
recovered with 2(113.6) chosen plaintexts and 2(121) encryptions. The 192/256-bit key of 8
rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(111.1) encryptions. The
192/256-bit key of 9 rounds Camellia can be recovered with 2 13 chosen plaintexts and 2 175,6
encryptions. The 256-bit key of 10 rounds Camellia can be recovered with 2(14) chosen plaintexts
and 2(239.9) encryptions.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Wu, WL, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 8
被引频次: 3
出版商: SCIENCE CHINA PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1009-2757
DOI: 10.1360/03yf0293
29 字符的来源出版物名称缩写: SCI CHINA SER F
ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci.
来源文献页码计数: 13
学科类别: Computer Science, Information Systems
ISI 文献传递号: 914JL
-------------------------------------------------------------------------------显示 123 条,共 136 条
作者: Zhou, YB; Zhang, ZF; Feng, DG
标题: Cryptanalysis of the end-to-end security protocol for mobile communications with end-user
identification/authentication
来源出版物: IEEE COMMUNICATIONS LETTERS, 9 (4): 372-374 APR 2005
语言: English
文献类型: Article
作者关键词: authenticated key agreement; user authentication; mobile communication
摘要: This letter shows that the end-to-end security protocol for mobile communications with
end-user identification/authentication due to Chang et al. [1] has a serious security flaw. We
demonstrate this by presenting a simple but powerful impersonation attack against the protocol so
that the protocol is insecure against impersonation attack. Hence, the protocol cannot achieve the
claimed security. To overcome such a security flaw, a modification is presented.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China
通讯作者地址: Zhou, YB, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur,
Beijing, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 3
被引频次: 1
出版商: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
出版商地址: 445 HOES LANE, PISCATAWAY, NJ 08855 USA
ISSN: 1089-7798
DOI: 10.1109/LCOMM.2005.04015
29 字符的来源出版物名称缩写: IEEE COMMUN LETT
ISO 来源文献出版物名称缩写: IEEE Commun. Lett.
来源文献页码计数: 3
学科类别: Telecommunications
ISI 文献传递号: 912AW
-------------------------------------------------------------------------------显示 124 条,共 136 条
作者: Xu, J; Zhang, ZF; Feng, DG
编者: Lim, CH; Yung, M
标题: A ring signature scheme using bilinear pairings
来源出版物: INFORMATION SECURITY APPLICATIONS, 3325: 160-169 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 5th International Workshop on Information Security Applications
会议日期: AUG 23-25, 2004
会议地点: Jeju Isl, SOUTH KOREA
会议赞助商: Korea Inst Informat Security & Cryptol.; Elect & Telecommun Res Inst.; Minist
Informat & Commun.
KeyWords Plus: AD-HOC GROUPS; CRYPTOSYSTEMS
摘要: The bilinear pairings such as Weil pairing or Tate pairing over elliptic curves and
hyperelliptic curves have been found various applications in cryptography very recently. Ring
signature is a very useful tool to provide the user's anonymity and the signer's privacy. In this
paper, we propose a ring signature scheme based on the bilinear pairings, which is secure against
chosen message attacks without random oracles. Moreover, we use this ring signature scheme to
construct a concurrent signature scheme for fair exchange of signatures.
地址: Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst
Software, Beijing 100080, Peoples R China
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 16
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-24015-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 10
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BBR79
-------------------------------------------------------------------------------显示 125 条,共 136 条
作者: Yao, G; Feng, DG
编者: Lim, CH; Yung, M
标题: A new k-anonymous message transmission protocol
来源出版物: INFORMATION SECURITY APPLICATIONS, 3325: 388-399 2005
丛书标题: LECTURE NOTES IN COMPUTER SCIENCE
语言: English
文献类型: Proceedings Paper
会议标题: 5th International Workshop on Information Security Applications
会议日期: AUG 23-25, 2004
会议地点: Jeju Isl, SOUTH KOREA
会议赞助商: Korea Inst Informat Security & Cryptol.; Elect & Telecommun Res Inst.; Minist
Informat & Commun.
作者关键词: anonymous transmission; cryptographic protocol; security
KeyWords Plus: PRIVACY
摘要: Public and private communication networks have a growing importance for our daily life.
The globally networked society places great demand on the dissemination and sharing of
person-specific data. In order to protect the anonymity of individuals to whom released the data
refer, data holders often remove or encrypt explicit identifiers such as names, addresses and phone
numbers. But these cannot solve the problem well. Anonymous communication protocols address
the problem of concealing who communicates with whom, as in the case of letters from a secret
admirer. To gain efficiency, k-anonymous message transmission is presented.
Informally, a communication protocol is sender k-anonymous if it can guarantee that an adversary,
trying to determine the sender of a particular message, can only narrow down its search to a set of
k suspects. Receiver k-anonymity places a similar guarantee on the receiver: an adversary, at best,
can only narrow down the possible receivers to a set of size k. In this paper, a k-anonymous
transmission protocol is presented. The protocol is based on asymmetric encryption algorithm. All
the members in the protocol is divided into smaller groups, and if all the members in the group
perform the protocol correctly, the protocol is sender k-anonymous and receiver k-anonymous.
Furthermore, as long as the asymmetric encryption algorithm is secure, our protocol is secure, too.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China
通讯作者地址: Yao, G, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 18
被引频次: 1
出版商: SPRINGER-VERLAG BERLIN
出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 3-540-24015-2
29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI
来源文献页码计数: 12
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: BBR79
-------------------------------------------------------------------------------显示 126 条,共 136 条
作者: Huang, HJ; Jiao, L; Cheung, TY
标题: Property-preserving subnet reductions for designing manufacturing systems with shared
resources
来源出版物: THEORETICAL COMPUTER SCIENCE, 332 (1-3): 461-485 FEB 28 2005
语言: English
文献类型: Article
作者关键词: manufacturing system; petri net; property-preserving; reduction; system design;
transformation; verification
KeyWords Plus: PETRI NETS; TRANSFORMATIONS; VERIFICATION; REFINEMENTS
摘要: This paper handles two problems in manufacturing system design: resource sharing and
system abstraction. In a manufacturing system, resources such as robots, machines, etc. are shared
by several processes. When the resources are switched from one process to another, they may need
some modifications such as cleaning oil, adding equipments and so on. Previous designing
methods assume that the resources have no intermediate modifications. Hence, they need to be
extended to handle such kinds of resource-sharing problems. As for abstraction, modeling
operations with single places in manufacturing system design is very popular. From the viewpoint
of verification, the objective is to verify whether the reduced model has the same desirable
properties as the original one. This paper presents three kinds of property-preserving subnet
reduction methods. For each reduction method, conditions are presented for ensuring that the
properties liveness, boundedness and reversibility are preserved. Applications of these reduction
methods to handling the above resource sharing and system abstraction problems are illustrated
with an example from the manufacturing system. (c) 2005 Elsevier B.V. All rights reserved.
地址: Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci & Informat Technol, Shenzhen
518055, Peoples R China; Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R
China
通讯作者地址: Huang, HJ, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci & Informat
Technol, Shenzhen 518055, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 35
被引频次: 6
出版商: ELSEVIER SCIENCE BV
出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
ISSN: 0304-3975
DOI: 10.1016/j.tcs.2004.12.010
29 字符的来源出版物名称缩写: THEOR COMPUT SCI
ISO 来源文献出版物名称缩写: Theor. Comput. Sci.
来源文献页码计数: 25
学科类别: Computer Science, Theory & Methods
ISI 文献传递号: 905OQ
-------------------------------------------------------------------------------显示 127 条,共 136 条
作者: Deng, XT; Feng, HD; Li, GJ; Shi, BY
标题: A PTAS for semiconductor burn-in scheduling
来源出版物: JOURNAL OF COMBINATORIAL OPTIMIZATION, 9 (1): 1-13 FEB 2005
语言: English
文献类型: Article
作者关键词: approximation algorithm; batch processing; release date; geometric rounding; time
stretching
KeyWords Plus: BATCH PROCESSING SYSTEM; COMPLETION-TIME
摘要: In this paper a polynomial time approximation scheme, PTAS for short, is presented for the
problem of scheduling jobs in a batch processing system. Each job has a pre-defined release date,
which indicates when the job is available, and a pre-defined burn-in time, which is the least time
needed for processing the job. At one time, at most B jobs can be processed together, where B is a
pre-given number. No preemption is permitted.
地址: Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci,
Inst Software, Beijing 100080, Peoples R China; Shandong Univ, Sch Comp Sci & Technol, Jinan
250100, Peoples R China; City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong,
Peoples R China
通讯作者地址: Li, GJ, Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 9
被引频次: 0
出版商: SPRINGER
出版商地址: VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS
ISSN: 1382-6905
DOI: 10.1007/s10878-005-5480-7
29 字符的来源出版物名称缩写: J COMB OPTIM
ISO 来源文献出版物名称缩写: J. Comb. Optim.
来源文献页码计数: 13
学科类别: Computer Science, Interdisciplinary Applications; Mathematics, Applied
ISI 文献传递号: 899QG
-------------------------------------------------------------------------------显示 128 条,共 136 条
作者: Lin, HM
标题: Predicate mu-calculus for mobile ambients
来源出版物: JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 20 (1): 95-104 JAN
2005
语言: English
文献类型: Article
作者关键词: model checking; mobile ambients; spatial logic; mu-calculus; fixpoints
摘要: Ambient logics have been proposed to describe properties for mobile agents which may
evolve over time as well as space. This paper takes a predicate-based approach to extending an
ambient logic with recursion, yielding a predicate mu-calculus in which fixpoint formulas are
formed using predicate variables. An algorithm is developed for model checking finite-control
mobile ambients against formulas of the logic, providing the first decidability result for model
checking a spatial logic with recursion.
地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Lin, HM, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080,
Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 14
被引频次: 1
出版商: SCIENCE CHINA PRESS
出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R
CHINA
ISSN: 1000-9000
29 字符的来源出版物名称缩写: J COMPUT SCI TECHNOL
ISO 来源文献出版物名称缩写: J. Comput. Sci. Technol.
来源文献页码计数: 10
学 科 类 别 : Computer Science, Hardware & Architecture; Computer Science, Software
Engineering
ISI 文献传递号: 897VK
-------------------------------------------------------------------------------显示 129 条,共 136 条
作者: Chang, DX; Feng, DZ; Zheng, WX; Li, L
标题: A fast recursive total least squares algorithm for adaptive IIR filtering
来源出版物: IEEE TRANSACTIONS ON SIGNAL PROCESSING, 53 (3): 957-965 MAR 2005
语言: English
文献类型: Article
作者关键词: adaptive filtering; fast gain vector; IIR filtering; Rayleigh quotient
KeyWords Plus: SPECTRAL ESTIMATION; SYSTEM-IDENTIFICATION; FREQUENCY
ESTIMATION;
MONIC
NORMALIZATION;
HARMONIC
RETRIEVAL;
SIGNAL-DETECTION; NEURAL NETWORKS; NOISE; EFFICIENT
摘要: This paper develops a new fast recursive total least squares (N-RTLS) algorithm to
recursively compute the total least squares (TLS) solution for adaptive infinite-impulse-response
(IIR) filtering. The new algorithm is based on the minimization of the constraint Rayleigh quotient
in which the first entry of the parameter vector is fixed to the negative one. The highly
computational efficiency of the proposed algorithm depends on the efficient computation of the
gain vector and the adaptation of the Reyleigh quotient. Using the shift structure of the input data
vectors, a fast algorithm for computing the gain vector is established, which is referred to as the
fast gain vector (FGV) algorithm. The computational load of the FGV algorithm is smaller than
that of the fast Kalman algorithm. Moreover, the new algorithm is numerically stable since it does
not use the well-known matrix inversion lemma. The computational complexity of the new
algorithm per iteration is also O(L). The global convergence of the new algorithm is studied. The
performances of the relevant algorithms are compared via simulations.
地址: Xidian Univ, Natl Lab Radar Signal Proc, Xian 710071, Peoples R China; Univ Western
Sydney, Sch QMMS, Sydney, NSW, Australia; Chinese Acad Sci, Inst Software, E Govt Ctr,
Beijing, Peoples R China
通讯作者地址: Chang, DX, Xidian Univ, Natl Lab Radar Signal Proc, Xian 710071, Peoples R
China.
电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected];
[email protected]
引用的参考文献数: 45
被引频次: 0
出版商: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
出版商地址: 445 HOES LANE, PISCATAWAY, NJ 08855 USA
ISSN: 1053-587X
DOI: 10.1109/TSP.2004.842180
29 字符的来源出版物名称缩写: IEEE TRANS SIGNAL PROCESS
ISO 来源文献出版物名称缩写: IEEE Trans. Signal Process.
来源文献页码计数: 9
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 898DN
-------------------------------------------------------------------------------显示 130 条,共 136 条
作者: Chang, L; Lu, JA; Deng, XM
标题: A new two-dimensional discrete chaotic system with rational fraction and its tracking and
synchronization
来源出版物: CHAOS SOLITONS & FRACTALS, 24 (4): 1135-1143 MAY 2005
语言: English
文献类型: Article
摘要: This letter reports the finding of a novel two-dimensional discrete chaotic system. The new
system is based on the recently proposed one-dimensional discrete chaotic system with rational
fraction [J.-A. Lu, X. Wu, J. Lu, L. Kang. A new discrete chaotic system with rational fraction and
its dynamical behaviors. Chaos, Solitons Fractals 2004; 22: 311]. We studied the dynamical
behavior and investigated its tracking and synchronization. Sufficient conditions for tracking and
synchronization are deduced. Finally, numerical simulations are provided for illustration and
verification. (C) 2004 Elsevier Ltd. All rights reserved.
地址: Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China; Chinese Acad Sci, Inst
Automat, Natl Lab Pattern Recognit, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst
Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
通讯作者地址: Lu, JA, Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China.
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 9
被引频次: 1
出版商: PERGAMON-ELSEVIER SCIENCE LTD
出版商地址: THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB,
ENGLAND
ISSN: 0960-0779
DOI: 10.1016/j.chaos.2004.09.089
29 字符的来源出版物名称缩写: CHAOS SOLITON FRACTAL
ISO 来源文献出版物名称缩写: Chaos Solitons Fractals
来源文献页码计数: 9
学 科 类别 : Mathematics, Interdisciplinary Applications; Physics, Multidisciplinary; Physics,
Mathematical
ISI 文献传递号: 899CO
-------------------------------------------------------------------------------显示 131 条,共 136 条
作者: Sun, JC; Li, HY
标题: Generalized Fourier transform on an arbitrary triangular domain
来源出版物: ADVANCES IN COMPUTATIONAL MATHEMATICS, 22 (3): 223-248 APR 2005
语言: English
文献类型: Article
作者关键词: arbitrary triangle; eigen-decomposition; generalized Fourier transform; generalized
Fourier series; convergence; error estimates
KeyWords Plus: ORTHOGONAL POLYNOMIALS; EQUILATERAL TRIANGLE;
WEIGHT-FUNCTIONS; SIMPLEX; EIGENVALUES; SERIES
摘要: In this paper, we construct generalized Fourier transform on an arbitrary triangular domain
via barycentric coordinates and PDE approach. We start with a second-order elliptic differential
operator for an arbitrary triangle which has the so-called generalized sine (TSin) and generalized
cosine (TCos) systems as eigenfunctions. The orthogonality and completeness of the systems are
then proved. Some essential convergence properties of the generalized Fourier series are discussed.
Error estimates are obtained in Sobolev norms. Especially, the generalized Fourier transforms for
some elementary polynomials and their convergence are investigated.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
电子邮箱地址: [email protected]; [email protected]
引用的参考文献数: 23
被引频次: 6
出版商: SPRINGER
出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA
ISSN: 1019-7168
DOI: 10.1007/s10444-003-7667-8
29 字符的来源出版物名称缩写: ADV COMPUT MATH
ISO 来源文献出版物名称缩写: Adv. Comput. Math.
来源文献页码计数: 26
学科类别: Mathematics, Applied
ISI 文献传递号: 894NS
-------------------------------------------------------------------------------显示 132 条,共 136 条
作者: Wu, CK
标题: On the independence of Boolean functions
来 源 出 版 物 : INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 82 (4):
415-420 APR 2005
语言: English
文献类型: Article
作者关键词: cryptography Boolean function; independence
摘要: Boolean functions are widely used because they can be used to precisely describe logical
circuits. Properties of Boolean functions with respect to their applications to cryptography have
been studied but relationship between Boolean functions are rarely studied. This paper studies the
independent-v of Boolean functions, gives necessary and sufficient conditions for judging whether
two given Boolean functions are independent. Some enumeration formulae are given.
地址: Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R
China
通讯作者地址: Wu, CK, Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 3
被引频次: 0
出版商: TAYLOR & FRANCIS LTD
出版商地址: 4 PARK SQUARE, MILTON PARK, ABINGDON OX14 4RN, OXON, ENGLAND
ISSN: 0020-7160
DOI: 10.1080/00207160412331291035
29 字符的来源出版物名称缩写: INT J COMPUT MATH
ISO 来源文献出版物名称缩写: Int. J. Comput. Math.
来源文献页码计数: 6
学科类别: Mathematics, Applied
ISI 文献传递号: 893WN
-------------------------------------------------------------------------------显示 133 条,共 136 条
作者: Cao, TJ; Lin, DD; Xue, R
标题: A randomized RSA-based partially blind signature scheme for electronic cash
来源出版物: COMPUTERS & SECURITY, 24 (1): 44-49 FEB 2005
语言: English
文献类型: Article
作者关键词: partially blind signatures; electronic cash; privacy; randomization; RSA
摘要: Blind signature schemes can yield a signature and message pair whose information does not
teak to the signer. However, when blind signatures are used to design e-cash schemes, there are
two problems. One is the unlimited growth of the bank's database which keeps all spent e-cashes
for preventing double spending. Another problem is that the signer must assure himself that the
message contains accurate information such as the face value of the e-cash without seeing it.
Partially blind signatures can cope with these problems. In partially blind signatures, the signer
can explicitly include some agreed common information such as the expiration date and the face
value in the blind signature. Randomized signature schemes can withstand one-more-forgery
under the chosen plaintext attack. Based on RSA cryptosystem Fan-Chen-Yeh proposed a
randomized blind signature scheme and Chien-Jan-Tseng also proposed a randomized partially
blind signature scheme. But, the attacker can remove the randomizing factor from the messages to
be signed in these two schemes. The attacker can also change the common information of
Chien-Jan-Tseng's partially blind signature. In this paper, we propose a secure randomized
RSA-based partially blind signature scheme, and show that the proposed scheme satisfies the
blindness and unforgeabitity properties. We also analyse the computation cost of the proposed
scheme. (C) 2005 Elsevier Ltd. All rights reserved.
地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R
China; China Univ Min & Technol, Sch Comp Sci & Technol, Zuzhou 221008, Peoples R China
通讯作者地址: Cao, TJ, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing
100080, Peoples R China.
电子邮箱地址: [email protected]; [email protected]; [email protected]
引用的参考文献数: 9
被引频次: 7
出版商: ELSEVIER ADVANCED TECHNOLOGY
出版商地址: OXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE,
KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND
ISSN: 0167-4048
DOI: 10.1016/j.cose.2004.05.008
29 字符的来源出版物名称缩写: COMPUT SECURITY
ISO 来源文献出版物名称缩写: Comput. Secur.
来源文献页码计数: 6
学科类别: Computer Science, Information Systems
ISI 文献传递号: 896TL
-------------------------------------------------------------------------------显示 134 条,共 136 条
作者: Zhang, XF; Liang, HL; Sun, YF
标题: Dynamic enforcement of the Strict integrity policy
来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (1): 49-53 JAN 2005
语言: English
文献类型: Article
作者关键词: information system security; information integrity; Strict integrity policy; Biba's
model
摘要: The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting
information integrity, but the static integrity labels of both subjects and objects increase
compatibility cost of applications and might prevent some operations that are indeed harmless. In
order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put
forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in
DESIP, which are used to confine dynamically the range of objects a subject could be allowed to
access. The new rules of access control in DESIP are given for each kind of access mode (observe,
modify and invoke) together with the proofs of their validity. Comparison between SIP and DESIP
shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a
similar way as it is controlled by SIP and DESIP is more compatible than SIP.
地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
通讯作者地址: Zhang, XF, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
引用的参考文献数: 11
被引频次: 0
出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG
出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN,
SHATIN, 00000, PEOPLES R CHINA
ISSN: 1022-4653
29 字符的来源出版物名称缩写: CHINESE J ELECTRON
ISO 来源文献出版物名称缩写: Chin. J. Electron.
来源文献页码计数: 5
学科类别: Engineering, Electrical & Electronic
ISI 文献传递号: 892MN
-------------------------------------------------------------------------------显示 135 条,共 136 条
作者: Lo, SH; Wang, WX
标题: Finite element mesh generation over intersecting curved surfaces by tracing of neighbours
来源出版物: FINITE ELEMENTS IN ANALYSIS AND DESIGN, 41 (4): 351-370 JAN 2005
语言: English
文献类型: Article
作者关键词: triangular surface intersection; neighbour tracing; local meshing
KeyWords Plus: TRIANGULATION; ALGORITHM; ROBUST
摘要: The use of discrete data to represent engineering structures as derivatives from intersecting
components requires algorithms to perform Boolean operations between groups of triangulated
surfaces. In the intersection process, an accurate and efficient method for the determination of
intersection lines is a crucial step for large scale and complex surface intersections. Given the
node numbers at the vertices of the triangles, the neighbour relationship is first established. A
background grid is employed to limit the scope of searching for candidate triangles that may
intersect. This will drastically reduce the time of geometrical check for intersections between
triangles, making the surface intersection and mesh generation a quasi-linear process with respect
to the number of elements involved. The intersection lines are determined by the robust algorithm
based on tracing the neighbours of intersecting triangles. In the determination of intersection
between two triangles, four fundamental cases are identified and treated systematically to enhance
robustness and reliability.
In this paper, the consistent treatment of mesh generation along intersection lines is emphasized.
The procedure ensures that all mesh generation operations are carried out on the surface concerned
without leaving the surface so that elements generated will always be on the surface. Five
examples on a great variety of surface and mesh characteristics are given to illustrate the
efficiency and robustness of the algorithm. (C) 2004 Elsevier B.V. All rights reserved.
地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese
Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China
通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Pokfulam Rd, Hong Kong, Hong
Kong, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 26
被引频次: 1
出版商: ELSEVIER SCIENCE BV
出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
ISSN: 0168-874X
DOI: 10.1016/j.finel.2004.07.002
29 字符的来源出版物名称缩写: FINITE ELEM ANAL DESIGN
ISO 来源文献出版物名称缩写: Finite Elem. Anal. Des.
来源文献页码计数: 20
学科类别: Mathematics, Applied; Mechanics
ISI 文献传递号: 885JN
-------------------------------------------------------------------------------显示 136 条,共 136 条
作者: Li, SG; Li, GJ; Wang, XL; Liu, QM
标题: Minimizing makespan on a single batching machine with release times and non-identical
job sizes
来源出版物: OPERATIONS RESEARCH LETTERS, 33 (2): 157-164 MAR 2005
语言: English
文献类型: Article
作者关键词: approximation algorithms; scheduling; batch processing; makespan; release times
KeyWords Plus: PROCESSING MACHINE
摘要: We consider the problem of scheduling jobs with release times and non-identical job sizes
on a single batching machine; our objective is to minimize makespan. We present an
approximation algorithm with worst-case ratio 2 + epsilon, where epsilon > 0 can be made
arbitrarily small. (C) 2004 Elsevier B.V. All rights reserved.
地址: Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China; Shandong Univ,
Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing
100080, Peoples R China; Yantai Normal Univ, Sch Comp Sci & Technol, Yantai 264025, Peoples
R China
通讯作者地址: Li, SG, Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China.
电子邮箱地址: [email protected]
引用的参考文献数: 11
被引频次: 10
出版商: ELSEVIER SCIENCE BV
出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
ISSN: 0167-6377
DOI: 10.1016/j.orl.2004.04.009
29 字符的来源出版物名称缩写: OPER RES LETT
ISO 来源文献出版物名称缩写: Oper. Res. Lett.
来源文献页码计数: 8
学科类别: Operations Research & Management Science
ISI 文献传递号: 873XH