1. 检索条件 地址=(((Inst Sofware) OR (Inst Software) OR (Software Inst)) SAME (Chin* and aca*) SAME Beijing) AND 出版年=(2005) 入库时间=所有年份. 数据库=SCI-EXPANDED. 2. 检索结果 显示 1 条,共 136 条 作者: Sun, JC (Sun, Jiachang); Tai, XC (Tai, Xue-Cheng) 标题: Scientific Computing in Petroleum Industry (SCPI) - Preface 来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING, 2: - Sp. Iss. SI 2005 语言: English 文献类型: Editorial Material 地址: Chinese Acad Sci, Lab Parallel Comp, Inst Software, Beijing 100080, Peoples R China; Univ Bergen, Dept Math, N-5007 Bergen, Norway 通讯作者地址: Sun, JC, Chinese Acad Sci, Lab Parallel Comp, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 0 被引频次: 0 出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION 出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA T6G 2G1, CANADA ISSN: 1705-5105 29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model. 来源文献页码计数: 2 学科类别: Mathematics, Applied; Mathematics ISI 文献传递号: 091ZZ -------------------------------------------------------------------------------显示 2 条,共 136 条 作者: Cao, JW (Cao, Jianwen); Sun, JC (Sun, Jiachang) 标题: An efficient and effective nonlinear solver in a parallel software for large scale petroleum reservoir simulation 来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING, 2: 15-27 Sp. Iss. SI 2005 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Scientific Computing in Petroleum Industry (SCPI) 会议日期: AUG 04-07, 2004 会议地点: Beijing, PEOPLES R CHINA 作者关键词: petroleum reservoir simulation; nonlinear solver; preconditioning; inexact Newton; BFGS; Krylov subspace; parallel performance KeyWords Plus: QUASI-NEWTON METHODS; NONSYMMETRIC LINEAR-SYSTEMS 摘要: We study a parallel Newton-Krylov-Schwarz (NKS) based algorithm for solving large sparse systems resulting from a fully implicit discretization of partial differential equations arising from petroleum reservoir simulations. Our NKS algorithm is designed by combining an inexact Newton method with a rank-2 updated quasi-Newton method. In order to improve the computational efficiency, both DDM and SPMD parallelism strategies are adopted. The effectiveness of the overall algorithm depends heavily on the performance of the linear preconditioner, which is made of a combination of several preconditioning components including AMC, relaxed ILU, up scaling, additive Schwarz, CRP-like(constraint residual preconditioning), Watts correction, Shur complement, among others. In the construction of the CRP-like preconditioner, a restarted CMRES is used to solve the projected linear systems. We have tested this algorithm and related parallel software using data from some real applications, and presented numerical results that show that this solver is robust and scalable for large scale calculations in petroleum reservoir simulations. 地址: Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080, Peoples R China 通讯作者地址: Cao, JW, Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 27 被引频次: 1 出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION 出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA T6G 2G1, CANADA ISSN: 1705-5105 29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model. 来源文献页码计数: 13 学科类别: Mathematics, Applied; Mathematics ISI 文献传递号: 091ZZ -------------------------------------------------------------------------------显示 3 条,共 136 条 作者: Li, HW (Li, Hongwei); Sun, JC (Sun, Jiachang) 标题: Robin transmission conditions for overlapping additive Schwarz method applied to linear elliptic problems 来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING, 2: 83-99 Sp. Iss. SI 2005 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Scientific Computing in Petroleum Industry (SCPI) 会议日期: AUG 04-07, 2004 会议地点: Beijing, PEOPLES R CHINA 作者关键词: domain decomposition; additive Schwarz methods; Robin transmission conditions KeyWords Plus: DOMAIN DECOMPOSITION 摘要: We consider overlapping Additive Schwarz Method(ASM) with Robin conditions as the transmission conditions (interior boundary conditions). The main difficulty left in this field is how to select the parameters for Robin conditions - these parameters have strong effect on the convergence rate of ASM. In this paper, we proposed the parameters for linear elliptic problems which seemed to be near optimal. 地址: Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080, Peoples R China 通讯作者地址: Li, HW, Chinese Acad Sci, Inst Software, Lab Parallel Comp, POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 12 被引频次: 0 出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION 出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA T6G 2G1, CANADA ISSN: 1705-5105 29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model. 来源文献页码计数: 17 学科类别: Mathematics, Applied; Mathematics ISI 文献传递号: 091ZZ -------------------------------------------------------------------------------显示 4 条,共 136 条 作者: Yao, JF (Yao, Jifeng) 标题: Explorer, a visualization system for reservoir simulations 来源出版物: INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING, 2: 169-176 Sp. Iss. SI 2005 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Scientific Computing in Petroleum Industry (SCPI) 会议日期: AUG 04-07, 2004 会议地点: Beijing, PEOPLES R CHINA 作者关键词: visualization system; post-processing; reservoir simulation 摘要: In this paper, we introduce Explorer, a visualization system for reservoir simulations. It is designed for large-scale data sets and many technologies have been used during its implementation, such as a 3-layer Client-Commware-Server (CCS) structure, Object-Oriented method, VTK based rendering and etc. Compared with current commercial softwares, Explorer has many features including more data formats support, many user-defined properties and full support for Chinese characters. 地址: Chinese Acad Sci, Inst Software, Parallel Comp Lab, Beijing 100080, Peoples R China 通讯作者地址: Yao, JF, Chinese Acad Sci, Inst Software, Parallel Comp Lab, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 3 被引频次: 0 出版商: ISCI-INSTITUTE SCIENTIFIC COMPUTING & INFORMATION 出版商地址: PO BOX 60632, UNIV ALBERTA POSTAL OUTLET,, EDMONTON, ALBERTA T6G 2G1, CANADA ISSN: 1705-5105 29 字符的来源出版物名称缩写: INT J NUMER ANAL MODEL ISO 来源文献出版物名称缩写: Int. J. Numer. Anal. Model. 来源文献页码计数: 8 学科类别: Mathematics, Applied; Mathematics ISI 文献传递号: 091ZZ -------------------------------------------------------------------------------显示 5 条,共 136 条 作者: Liu, W; Wang, Q; Wang, HG; Dai, GZ 标题: Adaptive real-time publish-subscribe messaging for distributed monitoring systems 来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (4): 569-574 OCT 2005 语言: English 文献类型: Article 作者关键词: real-time publish-subscribe; event condition action (ECA) rule; active real-time database 摘要: Many complex distributed real-time applications, monitoring and controlling the external environment, require sophisticated processing and sharing of an extensive amount of data under critical timing constraints. In this paper, we present an adaptive Realtime publish-subscribe (RTPS) messaging service for distributed real-time applications, and four primitives are defined for implementing the adaptive RTPS. Furthermore, adaptive RTPS is incorporated into an Active real-time database (ARTDB) named Agilor by translating RTPS primitives into subscription objects and ECA rules. We also apply real-time scheduling algorithm to protocol processing for improving predictability and minimizing priority inversions during message transmission. The experimental results indicate the idea is feasible, and the current implementation shows better performance. 地址: Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080, Peoples R China 通讯作者地址: Liu, W, Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080, Peoples R China. 引用的参考文献数: 14 被引频次: 0 出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG 出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN, SHATIN, 00000, PEOPLES R CHINA ISSN: 1022-4653 29 字符的来源出版物名称缩写: CHINESE J ELECTRON ISO 来源文献出版物名称缩写: Chin. J. Electron. 来源文献页码计数: 6 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 037FU -------------------------------------------------------------------------------显示 6 条,共 136 条 作者: Hua, C; Wu, CK; Feng, DG 标题: On statistical properties of S-boxes in block ciphers 来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (4): 584-587 OCT 2005 语言: English 文献类型: Article 作者关键词: block cipher; S-box; bias test 摘要: S-boxes being core nonlinear components play a very important role in traditional block ciphers. Well-designed S-boxes will contribute to the security of a block cipher significantly, and security measurement of S-boxes has attracted much interest. Besides many measurements for S-boxes in block ciphers, this paper proposes a new measurement on the statistical property, namely bias test of S-boxes, and gives analysis of the S-boxes in Rijndael and Crypton using the new measurement. It shows that the S-box of Rijndael performs better than that of Crypton under the new measurement. Some relationships between the new measurement and algebraic properties have also been explored. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Hua, C, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 引用的参考文献数: 12 被引频次: 0 出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG 出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN, SHATIN, 00000, PEOPLES R CHINA ISSN: 1022-4653 29 字符的来源出版物名称缩写: CHINESE J ELECTRON ISO 来源文献出版物名称缩写: Chin. J. Electron. 来源文献页码计数: 4 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 037FU -------------------------------------------------------------------------------显示 7 条,共 136 条 作者: Li, MS 编者: Li, M; Boehm, B; Osterweil, LJ 标题: Expanding the horizons of software development processes: A 3-D integrated methodology 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 54-67 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. 摘要: This paper investigates how to define and improve software development processes. Based on examining the software development during last two decades, it proposes a breakthrough point of an updated view of requirements, called Great Requirements, and presents a 3-D integrated software engineering methodology for improving software development activities. It expands the horizons of possible future software development processes. 地址: Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China 通讯作者地址: Li, MS, Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, 4 S 4th St, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 44 被引频次: 5 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 8 条,共 136 条 作者: Huang, M; Yang, LG; Yang, Y 编者: Li, M; Boehm, B; Osterweil, LJ 标题: A development process for building OSS-based applications 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 122-135 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. KeyWords Plus: OPEN SOURCE SOFTWARE 摘要: It has become great prominence that business organizations are considering open source software (OSS) when looking for software system solutions. However, building applications based on open source software remains an essential issue for many software developers since the new development process differs from traditional in-house development. In this paper, we present a development process based on our experience on using open source software in application development. The new process emphasizes the early assessment to improve the architecture stability and project manageability by assessing available OSS. A set of measurable assessment criteria is established in assessing OSS candidates and making optimal decisions in the development process. A case study is discussed to show the application of this process. 地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ So Calif, Ctr Software Engn, Los Angeles, CA 90089 USA 通讯作者地址: Huang, M, Chinese Acad Sci, Lab Internet Software Technol, Inst Software, POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 25 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 9 条,共 136 条 作者: Chen, W; Ying, Q; Xue, YZ; Zhao, C 编者: Li, M; Boehm, B; Osterweil, LJ 标题: Software testing process automation based on UTP - A case study 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 222-234 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. KeyWords Plus: TTCN-3 摘要: Automation of software testing process plays an important role in improving software quality, shortening period of development and reducing development cost. However, most existing testing automation methods tend to rely on various kinds of limited formal models, and make a contrived separation between software testing and other phases in software life cycle. This separation limits wide spread application of these methods. On the other hand, UML, as a unified modeling language that has been widely employed to describe and model software and software process, can provide good basis for testing automation to close the separation. In this paper we introduce an approach that transforms design models represented by UML to testing models represented by UTP (UML Testing Profile), and further more transforms the testing models to TTCN-3 (Test and Test Control Notation) test cases that can be executed on a TTCN-3 execution engine, according to TTCN-3 mapping interface defined in UTP. This approach integrates testing phase with other phases tightly together, and leads to automation or semi-automation of software testing process. Finally, the paper demonstrates the effectiveness of the proposed approach by deriving TTCN-3 test cases for a typical C/S software system. 地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Chen, W, Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 11 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 13 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 10 条,共 136 条 作者: Ding, LP; Yang, QS; Sun, L; Tong, J; Wang, YJ 编者: Li, M; Boehm, B; Osterweil, LJ 标题: Evaluation of the capability of Personal Software Process based on data envelopment analysis 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 235-248 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. 摘要: Personal Software Process (PSP) is a defined and measured software process designed to be used by an individual software engineer. For PSP users, it's important to evaluate the impact of the PSP upon their own personal capabilities of software development. However, the evaluation of capability of PSP is a Variable Return to Scale (VRS) and multivariate input and output problem, which makes traditional evaluation methods useless. In this paper, an evaluation framework for the capability of PSP based on Data Envelopment Analysis (DEA) is proposed. This framework has the advantage of dealing with VRS issues with multivariate input and output. In addition, the input or output variables of the framework can have different measurement units. Therefore, a quantitative and comprehensive result can be returned by this relative efficiency evaluation method and it can support the continuous improvement of PSP. 地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Key Lab Comp Sci, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Ding, LP, Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 11 条,共 136 条 作者: Wang, JZ; Meyers, S 编者: Li, M; Boehm, B; Osterweil, LJ 标题: Spiral Pro: A project plan generation framework and support tool 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 262-276 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. 摘要: Project planning is a delicate and on-going activity that requires a great deal of experience and knowledge. Several models and methods are developed which explore the various aspects of planning a project. In this paper, we propose a framework named Spiral Pro that integrates Spiral Model, MBASE and COCOMO II to help project managers do their project planning in a systematic way. In an empirical study, a project plan template, developed following the framework, was provided for thirteen e-service projects and a survey was used at the end to assess the study. Based on the survey, some characteristics are summarized, which help point out the effectiveness of using of Spiral Pro framework. Motivated by the findings in the study, a tool has been developed to help both experienced and inexperienced project managers make better use of the framework for project planning. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ So Calif, Ctr Software Engn, Los Angeles, CA 90089 USA; Software Proc Grp, Los Angeles, CA 90018 USA 通讯作者地址: Wang, JZ, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 20 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 15 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 12 条,共 136 条 作者: Wang, Q; Li, MS 编者: Li, M; Boehm, B; Osterweil, LJ 标题: Software process management: Practices in China 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 317-331 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. 摘 要 : Software process management has been proven a useful means to help software organizations improve their development processes and produce high quality products. It focuses on providing process-related products and services to software developer. Chinese software industry is developing rapidly. Effective software process methods, technology and tools that help them produce quality products while reducing the costs are in desperate need. This paper discusses the current state of project management in Chinese software companies and presents a solution and practices meeting this need. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100080, Peoples R China 通讯作者地址: Wang, Q, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, 4 South 4th St,Zhong Guan Cun,POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 5 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 15 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 13 条,共 136 条 作者: Wu, ZC; Christensen, D; Li, MS; Wang, Q 编者: Li, M; Boehm, B; Osterweil, LJ 标题: Survey of CMM/CMMI implementation in China 来源出版物: UNIFYING THE SOFTWARE PROCESS SPECTRUM, 3840: 507-520 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Software Process Workshop (SPW 2005) 会议日期: MAY 25-27, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad Sci, Inst Software. 摘要: Since 1999, the Chinese software industry has been using CMM/CMMI to improve software process. By November, 2004, more that 180 appraisals have been conducted. But the number of CMM/CMMI users is fairly low compared to the whole Chinese software industry. In addition, the growth rate of appraisal numbers has fallen during 2004. Limited research has been done to find out the obstacles for the wide-usage of CMM/CMMI in China. In this research, by investigating most of the organizations who have been appraised, reasons, success factors and benefits of CMM/CMMI implementation are identified, problems which negatively impact the CMM/CMMI usage are analyzed. Recommendations are made to the Chinese software industry and government to solve those problems, which could help those who want to or are using CMM/CMMI. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; One Market Ltd Co, Wellington, New Zealand; Chinese Acad Sci, Key Lab Comp Sci, Beijing 100080, Peoples R China 通讯作者地址: Wu, ZC, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 18 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-31112-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDV58 -------------------------------------------------------------------------------显示 14 条,共 136 条 作者: Gu, Y; Zhang, W; Liu, HC; Zhao, BH; Qu, YG 编者: Enokido, T; Yan, L; Xiao, B; Kim, D; Dai, Y; Yang, LT 标题: Energy-efficient target localization based on a prediction model 来源出版物: EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 3823: 1178-1190 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Embedded and Ubiquitous Computing 会议日期: DEC 06-09, 2005 会议地点: Nagasaki, JAPAN 会议赞助商: Nagasaki Inst Appl Sci.; Int Federat Informat Proc. 作者关键词: wireless sensor networks; energy-efficient; prediction model; TLS 摘要: In this paper, we propose an energy-efficient target localization scheme (TLS) based on a prediction model that can reveal the most likely zone the target will be in, and also a corresponding two-step communication protocol between base station (BS) and sensors. BS uses a query mechanism to determine which sensors should be used for detailed information according to a limited amount of data received from the sensors. This scheme reduces both energy consumption and communication bandwidth requirement, prolongs the lifetime of the wireless sensor networks. Simulation results indicate that it can achieve a high accuracy while saving a large amount of energy. 地址: Univ Sci & Technol China, Dept Comp Sci, Hefei 230027, Peoples R China; Chinese Acad Sci, Sci Inst Software, Comp Sci Lab, Beijing 100864, Peoples R China 通讯作者地址: Gu, Y, Univ Sci & Technol China, Dept Comp Sci, Hefei 230027, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 16 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30803-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 13 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDW22 -------------------------------------------------------------------------------显示 15 条,共 136 条 作者: Wan, WX; Liu, LB; Yuan, H; Ning, BQ; Zhang, SR 标题: The GPS measured SITEC caused by the very intense solar flare on July 14, 2000 来源出版物: SPACE WEATHER, 36 (12): 2465-2469 Sp. Iss. 2005 2005 丛书标题: ADVANCES IN SPACE RESEARCH 语言: English 文献类型: Article 作者关键词: space weather; GPS; total electron content; solar flares; sudden ionospheric disturbances KeyWords Plus: GEOMAGNETIC STORM; NETWORK DATA/; RADIO 摘要: This work studies the sudden increases in total electron content of the ionosphere caused by the very intense solar flare on July 14, 2000. Total electron content (TEC) data observed from a Global Positioning System (GPS) network are used to calculate the flare-induced TEC increment, delta TECf, and variation rate, dTEC(f)/dt. It is found that both dTEC(f)/dt and delta TECf are closely related with the solar zenith angles. To explain the observation results, we derived a simple relationship between the partial derivative of the flare-induced TEC, partial derivative TECf/partial derivative t, which is a good approximation for dTECf/dt, and the solar zenith angle chi as well as the effective flare radiation flux If, according to the well-known Chapman theory of ionization. The derived formula predicted that OTECf/partial derivative t is proportional to If and inverse proportional to Chapman function ch(chi). This theoretical prediction not only explains the correlation of dTEC(f)/dt and delta TECf with chi as shown in our TEC observation, but also gives a way to deduce I-f from TEC observation of GPS network. Thus, the present work shows that GPS observation is a powerful tool in the observation and investigation of solar flare effects on the ionosphere, i.e., the sudden ionospheric disturbances, which is a significant phenomenon of space weather. (c) 2005 COSPAR. Published by Elsevier Ltd. All rights reserved. 地址: Chinese Acad Sci, Inst Geol & Geophys, Beijing 100029, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; MIT, Haystack Observ, Westford, MA 01886 USA 通讯作者地址: Wan, WX, Chinese Acad Sci, Inst Geol & Geophys, Beijing 100029, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 12 被引频次: 4 出版商: ELSEVIER SCIENCE LTD 出版商地址: THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD 0X5 1GB, OXON, ENGLAND ISSN: 0273-1177 DOI: 10.1016/j.asr.2004.01.027 29 字符的来源出版物名称缩写: ADV SPACE RES 来源文献页码计数: 5 学科类别: Engineering, Aerospace; Astronomy & Astrophysics; Geosciences, Multidisciplinary; Meteorology & Atmospheric Sciences ISI 文献传递号: BDS48 -------------------------------------------------------------------------------显示 16 条,共 136 条 作者: Wang, P; Feng, DG; Wu, WL 编者: Feng, D; Lin, DD 书籍作者: Yung, M 标题: HCTR: A variable-input-length enciphering mode 来 源 出 版 物 : INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 3822: 175-188 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st SKLOIS Conference on Information Security and Cryptology 会议日期: DEC 15-17, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: State Key Lab Informat Secur, Chinese Acad Sci. 作者关键词: blockcipher; tweakable blockcipher; disk sector encryption; modes of operation; symmetric encryption KeyWords Plus: BLOCK CIPHERS 摘要: This paper proposes a blockcipher mode of operation, HCTR, which is a length-preserving encryption mode. HCTR turns an n-bit blockcipher into a tweakable blockcipher that supports arbitrary variable input length which is no less than n bits. The tweak length of HCTR is fixed and can be zero. We prove that HCTR is a strong tweakable pseudorandom permutation (sprp), when the underlying blockcipher is a strong pseudorandom permutation (sprp). HCTR is shown to be a very efficient mode of operation when some pre-computations are taken into consideration. Arbitrary variable input length brings much flexibility in various application environments. HCTR can be used in disk sector encryption, and other length-preserving encryptions, especially for the message that is not multiple of n bits. 地址: Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China; Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Wang, P, Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 27 被引频次: 15 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30855-5 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDQ31 -------------------------------------------------------------------------------显示 17 条,共 136 条 作者: Cao, TJ; Lin, DD 编者: Feng, D; Lin, DD 书籍作者: Yung, M 标题: Security analysis of some threshold signature schemes and multi-signature schemes 来 源 出 版 物 : INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 3822: 233-241 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st SKLOIS Conference on Information Security and Cryptology 会议日期: DEC 15-17, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: State Key Lab Informat Secur, Chinese Acad Sci. 摘要: Digital signature scheme allows a user to sign a message in such a way that anyone can verify the signature, but no one can forge the signature on any other message. In this paper, we show that Xie and Yu's threshold signature scheme, Huang and Chang's threshold proxy signature scheme, Qian, Cao and Xue's pairing-based threshold proxy signature scheme, Xue and Cao's multi-proxy signature scheme and Zhou et al.'s proxy multi-signature scheme are all insecure against the forgery attacks. 地址: China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Cao, TJ, China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 2 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30855-5 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 9 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDQ31 -------------------------------------------------------------------------------显示 18 条,共 136 条 作者: Wen, FT; Wu, WL; Wen, QY 编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC 标题: Error oracle attacks on several modes of operation 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 62-67 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. KeyWords Plus: ENCRYPTION 摘要: In [7] Vaudenay demonstrated side-channel attacks on CBC-mode encryption, exploiting a "valid padding" oracle. His work showed that several uses of CBC-mode encryption in well-known products and standards were vulnerable to attack when an adversary was able to distinguish between valid and invalid ciphertexts. In [2] [5] [6], Black, Paterson, Taekeon et al. generalized these attacks to various padding schemes of CBC-mode encryption and multiple modes of operation. In this paper, we study side-channel attacks on the CFB, CBC vertical bar CBC, CFB vertical bar CFB, CBC vertical bar CBC vertical bar CBC, CFB vertical bar CFB vertical bar CFB modes under the error oracle models, which enable an adversary to determine the correct message with knowledge of ciphertext. It is shown that an attacker can exploit an oracle to efficiently extract the corresponding position plaintext bits of any block if the target plaintext contains some fixed bits in a known position of one block. 地址: Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China; Jinan Univ, Sch Sci, Jinan 250022, Peoples R China 通讯作者地址: Wen, FT, Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 7 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30819-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 6 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 19 条,共 136 条 作者: Zhou, SJ; Lin, DD 编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC 标题: On anonymity of group signatures 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 131-136 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. KeyWords Plus: FOUNDATIONS; ASSUMPTIONS; EFFICIENT; SCHEMES 摘要: A secure group signature is required to be anonymous, that is, given two group signatures generated by two different members on the same message or two group signatures generated by the same member on two different messages, they are indistinguishable except for the group manager. In this paper we prove the equivalence of a group signature's anonymity and its indistinguishability against chosen ciphertext attacks if we view a group signature as an encryption of member identity. Particularly, we prove ACJT's group signature is IND-CCA2 secure, so ACJT's scheme is anonymous in the strong sense. The result is an answer to an open question in literature. 地址: Chinese Acad Sci, SKLOIS Lab, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhou, SJ, Chinese Acad Sci, SKLOIS Lab, Inst Software, 4 S 4th St, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 11 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30819-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 6 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 20 条,共 136 条 作者: Wang, DY; Lin, DD; Wu, WL 标题: A variant of Poly1305 MAC and its security proof 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 375-380 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Article KeyWords Plus: HASH FUNCTIONS 摘要: We give a variant of Poly1305 MAC and prove its security viewing this MAC as a Carter-Wegman MAC. The proposed variant not only keeps all the good properties of the Poly1305, but also makes Poly1305 deterministic. 地址: Chinese Acad Sci, Inst Software, SKLOIS Lab, Beijing 100080, Peoples R China 通讯作者地址: Wang, DY, Chinese Acad Sci, Inst Software, SKLOIS Lab, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 10 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 6 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 21 条,共 136 条 作者: Shen, JJ; Qing, SH; Shen, QN; Li, LP 编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC 标题: Covert channel identification founded on information flow analysis 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 381-387 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. KeyWords Plus: STORAGE 摘要: This paper focuses on covert channel identification in a nondiscretionary secure system. The properties of covert channels are analyzed by channel types. Information flow characteristics are utilized to optimize channel identification with the Share Resource Matrix method adopted for demonstration, and a general framework for channel identification founded on information flow analysis is presented. At last, timing channels are also discussed. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Grad Univ, Chinese Acad Sci, Beijing 100080, Peoples R China 通讯作者地址: Shen, JJ, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 9 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30819-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 7 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 22 条,共 136 条 作者: Zheng, QH; Qian, YT 编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC 标题: An event correlation approach based on the combination of IHU and codebook 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 757-763 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. KeyWords Plus: COMMUNICATION-NETWORKS; FAULT IDENTIFICATION 摘要: This paper proposes a new event correlation technique, which integrates the increment hypothesis updating (IHU) technique with the codebook approach. The technique allows multiple simultaneous independent faults to be identified when the system's codebook only includes the codes of the single fault and lacks the information of prior fault probability and the conditional probability of fault lead to symptoms occur. The method utilizes the refined IHU technique to create and update fault hypotheses that can explain these events, and ranks these hypotheses by the codebook approach. The result of event correlation is the hypothesis with maximum hamming distance to the code of the received events. Simulation shows that this approach can get a high accuracy and a fast speed of correlation even if the network has event loss and spuriousness. 地址: Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci, Hangzhou, Zjhejiang, Peoples R China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing, Peoples R China 通讯作者地址: Zheng, QH, Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci, Hangzhou, Zjhejiang, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 10 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30819-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 7 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 23 条,共 136 条 作者: Liu, ZQ; Feng, DG 编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC 标题: Incremental fuzzy decision tree-based network forensic system 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 995-1002 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. 摘要: Network forensic plays an important role in the modern network environment for computer security, but it has become a time-consuming and daunting task due to the sheer amount of data involved. This paper proposes a new method for constructing incremental fuzzy decision trees based on network service type to reduce the human intervention and time-cost, and to improve the comprehensibility of the results. At the end of paper, we discuss the performance of the forensic system and present the result of experiments. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Liu, ZQ, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 13 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30819-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 8 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 24 条,共 136 条 作者: Cao, TJ; Lin, DD; Xue, R 编者: Hao, Y; Liu, J; Wang, Y; Cheung, YM; Yin, H; Jiao, L; Ma, J; Jiao, YC 标题: Universal designated-verifier proxy blind signatures for E-commerce 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802: 1036-1041 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. 摘要: To protect the privacy of proxy blind signature holders from dissemination of signatures by verifiers, this paper introduces universal designated-verifier proxy blind signatures. In a universal designated-verifier proxy blind signature scheme, any holder of a proxy blind signature can convert the proxy blind signature into a designated-verifier signature. Given the designated-signature, only the designated-verifier can verify that the message was signed by the proxy signer, but is unable to convince anyone else of this fact. This paper also proposes an ID-based universal designated-verifier proxy blind signature scheme from bilinear group-pairs. The proposed scheme can be used in E-commerce to protect user privacy. 地址: China Univ Mining & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China; Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Cao, TJ, China Univ Mining & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 9 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30819-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 6 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ20 -------------------------------------------------------------------------------显示 25 条,共 136 条 作者: Luan, SM; Dai, GZ 书籍作者: Hao, Y 标题: A computational approach for belief change 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 3801: 355-360 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xian, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. KeyWords Plus: REVISION; LOGIC 摘要: In this paper, we combine the syntax-based belief change approach and model-based approach, and present a computational approach for belief change. We introduce functions to revise or contract a belief set, as well as functions to revise or contract a belief base. We also show properties of the revision functions and the contraction functions. The implementation of the revision functions and the contraction functions are also considered, and algorithms to revise a belief set or contract a sentence from a belief set are also given. Compared with related works, the main characteristic of our approach is that the functions can be implemented by algorithms. 地址: Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China 通讯作者地址: Luan, SM, Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 17 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30818-0 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 6 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ19 -------------------------------------------------------------------------------显示 26 条,共 136 条 作者: Jin, H; Wang, H; Wang, HG; Dai, GZ 书籍作者: Hao, Y 标题: Optimization design of controller periods using evolution strategy 来源出版物: COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 3801: 1100-1105 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Intelligence and Security 会议日期: DEC 15-19, 2005 会议地点: Xi'an, PEOPLES R CHINA 会议赞助商: IEEE Computat Intelligence, Hong Kong Chapter.; Xidian Univ.; Hong Kong Baptist Univ.; Natl Nat Sci Fdn China.; Guangdong Univ Technol. 摘要: For real-time computer-controlled systems, a control task does not have a fixed period but a range of periods in which control performance varies. Hence for multiple tasks scheduled on a single processor, to consider the optimization design of sampling periods in the co-design of control and scheduling is necessary to improve the control performance and use limited computing resource efficiently. In this paper, the mathematic description of the optimization problem of designing periods is presented, and the optimization solution using evolution strategy is proposed. The performances of proposed solution are revealed via simulation studies. Simulation shows that the optimization design of sampling periods can be implemented by using the evolution strategy method. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Jin, H, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 6 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30818-0 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 6 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDQ19 -------------------------------------------------------------------------------显示 27 条,共 136 条 作者: Zhang, ZF; Liu, ML; Xiao, LL 编者: Roy, B 标题: Parallel multi-party computation from linear multi-secret sharing schemes 来源出版物: ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 3788: 156-173 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 11th International Conference on the Theory and Application of Cryptology and Information Security 会议日期: DEC 04-08, 2005 会议地点: Chennai, INDIA 会议赞助商: Int Assoc Cryptol Res.; Indian Inst Technol. 摘要: As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against an adversary with multistructures. Precisely, there are m functions f(1), ..., f(m) and m adversary structures A(1), ..., A(m), where f(i) is required to be securely computed against an A(i)-adversary. We give a general construction to build a parallel multi-party computation protocol from any linear multi-secret sharing scheme (LMSSS), provided that the access structures of the LMSSS allow MPC at all. When computing complicated functions, our protocol has more advantage in communication complexity than the "direct sum" method which actually executes a MPC protocol for each function. The paper also provides an efficient and generic construction to obtain from any LMSSS a multiplicative LMSSS for the same multi-access structure. 地址: Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhang, ZF, Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 11 被引频次: 2 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30684-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 18 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDQ24 -------------------------------------------------------------------------------显示 28 条,共 136 条 作者: Zhang, Z; Che, HY; Shi, PF; Sun, Y; Gu, J 标题: Multi-labeled graph matching - An algorithm model for schema matching 来源出版物: ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS, 3818: 90-103 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Article 摘要: Schema matching is the task of finding semantic correspondences between elements of two schemas, which plays a key role in many database applications. In this paper, we treat the schema matching problem as a combinatorial problem. First, we propose an internal schema model, i.e., the multi-labeled graph, and transform schemas into multi-labeled graphs. Secondly, we discuss a generic graph similarity measure, and propose an optimization function based on multi-labeled graph similarity. Then, we cast schema matching problem into a multi-labeled graph matching problem, which is a classic combinational problem. Finally, we implement a greedy algorithm to find the feasible matching results. 地址: Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Zhang, Z, Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 17 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDP59 -------------------------------------------------------------------------------显示 29 条,共 136 条 作者: Zhang, Z; Che, HY; Shi, PF; Sun, Y; Gu, J 编者: Grumbach, S; Sui, L; Vianu, V 标题: Schema homomorphism - An algebraic framework for schema matching 来源出版物: ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS - DATA MANAGEMENT ON THE WEB , 3818: 255-256 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 10th Asian Computing Science Conference 会议日期: DEC 07-09, 2005 会议地点: Kunming, PEOPLES R CHINA 会议赞助商: AIT.; INRIA.; UNU/IIST. 摘要: A formal framework for SMP is important because it facilitates the building of algorithm model and the evaluation of algorithms. First, we propose a formal definition of schema matching that is named multivalent matching, i.e., an individual of source schema can be associated with a set of individuals of target schema. Second, we develop the algebraic framework of multivalent matching that is called schema homomorphism and propose the algorithm model of SMP. Then, we discuss the relations between match cardinality and variants of schema homomorphism. 地址: Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Zhang, Z, Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 4 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30767-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 2 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDP59 -------------------------------------------------------------------------------显示 30 条,共 136 条 作者: Zhang, ZF; Feng, DG; Xu, J; Zhou, YB 编者: Qing, S; Mao, W; Lopez, J; Wang, G 标题: Efficient ID-based optimistic fair exchange with provable security 来源出版物: INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 3783: 14-26 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 7th International Conference on Information and Communications Security 会议日期: DEC 10-13, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Chinese Acad SCi.; Int Commun & Informat Secur Assoc. 作者关键词: fair exchange; identity-based signature; provable security KeyWords Plus: DIGITAL-SIGNATURES; SCHEMES; PROTOCOL 摘要: The notion of identity based cryptosystem was introduced by Shamir in 1984, and has attracted much interest since it eliminates the need of certificates and simplify the key management. In this paper, we propose an optimistic fair exchange protocol for identity-based signatures, A semi-trust third party (TTP) is still involved in our protocol to ensure fairness. However, there is no need for registrations between users and TTP, and no zero-knowledge proof is needed to provide verifiability. The proposed optimistic fair exchange protocol is much concise and efficient, and can be shown to be secure in the random model with a tight security reduction. 地址: Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Sofware, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Zhang, ZF, Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 22 被引频次: 3 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30934-9 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 13 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDQ16 -------------------------------------------------------------------------------显示 31 条,共 136 条 作者: Xu, G; Ma, JG; Huang, T 编者: Zhuge, H; Fox, GC 标题: A XML-based composition event approach as an integration and cooperation middleware 来源出版物: GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 3795: 436-442 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Symposium on Trustworthy Global Computing 会议日期: APR 07-09, 2005 会议地点: Edinburgh, SCOTLAND 摘要: Content-based Pub/Sub systems are gaining increasing popularity as an integration and cooperation middleware supporting large-scale distributed applications, especially for Grid. However, existing content-based Pub/Sub systems mainly focus on the "one-to-one" event matching, not on the composite event matching. The composite event matching enables application components to express more interest in the occurrence of event composite patterns. In this paper, we present a XML-based composite event model that consists of the temporal logical model and the event composite pattern. Based on the composite event model, a subscription language (EXML-QL) is introduced by extending XML-QL to support the XML-based composite event computing. Finally, in terms of the peculiarities of the subscription language, a composite event matching process is presented and analyzed. 地址: Chinese Acad Sci, Technol Ctr Software Engn, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Xu, G, Chinese Acad Sci, Technol Ctr Software Engn, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 8 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30510-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 7 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDQ17 -------------------------------------------------------------------------------显示 32 条,共 136 条 作者: Xu, J; Zhang, ZF; Feng, DG 编者: Desmedt, YG; Wang, H; Mu, Y; Li, Y 标题: ID-based aggregate signatures from bilinear pairings 来源出版物: CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 3810: 110-119 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 4th International Conference on Cryptology and Network Security 会议日期: DEC 14-16, 2005 会议地点: Xiamen, PEOPLES R CHINA 会议赞助商: Fujian Normal Univ.; Fujian Digital Certificate Author Co Ltd.; Int Assoc Cryptol Res. 作者关键词: ID-based signatures; aggregate signatures; bilinear pairings KeyWords Plus: CRYPTOSYSTEMS 摘要: Aggregate signature scheme was recently proposed by Boneh, Gentry, Lynn and Shacham, which presented a method for combining n signatures from n different signers on n different messages into one signature. In this paper, we propose an identity-based aggregate signature scheme based on the bilinear pairings. This enhances the efficiency of communication and signature verification process. We show that the security of our scheme is tightly related to the computational Diffie-Hellman assumption in the random oracle model. 地址: Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 16 被引频次: 4 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30849-0 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDP94 -------------------------------------------------------------------------------显示 33 条,共 136 条 作者: Zhang, ZF; Xu, J; Feng, DG 编者: Desmedt, YG; Wang, H; Mu, Y; Li, Y 标题: Efficient identity-based protocol for fair certified e-mail delivery 来源出版物: CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 3810: 200-210 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 4th International Conference on Cryptology and Network Security 会议日期: DEC 14-16, 2005 会议地点: Xiamen, PEOPLES R CHINA 会议赞助商: Fujian Normal Univ.; Fujian Digital Certificate Author Co Ltd.; Int Assoc Cryptol Res. 作者关键词: fair exchange; certified e-mail; security protocol; identity-based signature KeyWords Plus: SIGNATURES; EXCHANGE 摘要: Certified e-mail delivery has become one of the basic requirement in performing business transactions over the Internet securely. How to construct efficient fair protocols for certified e-mail delivery is of great interest. The notion of identity based cryptosystem has attracted much interest since its introduction by Shamir in 1984, as it eliminates the need of certificates and simplifies the key management. In this paper, we propose a fair protocol for certified e-mail delivery based on identity-based signatures. A semi-trust third party (TTP) is involved in our protocol to ensure fairness, who does not need to store anything except its own private-key. There is no need for an additional registration between users and TTP. The proposed scheme is the first identity-based protocol with such a concise frame and is computation- and communication-efficient. 地址: Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Zhang, ZF, Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 24 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-30849-0 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 11 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDP94 -------------------------------------------------------------------------------显示 34 条,共 136 条 作者: Luan, SM; Dai, GZ; Li, W 标题: A programmable approach to revising knowledge bases 来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (6): 681-692 DEC 2005 语言: English 文献类型: Article 作者关键词: knowledge base; knowledge base revision; rules; predicate logic; propositional logic KeyWords Plus: BELIEF REVISION; LOGIC; CONTRACTION; OPERATORS 摘要: This paper presents a programmable approach to revising knowledge bases consisting of clauses. Some theorems and lemmas are shown in order to give procedures for generating maximally consistent subsets. Then a complete procedure and an incomplete procedure for generating the maximal consistent subsets are presented, and the correctness of the procedures is also shown. Furthermore, a way to implement knowledge base revision is presented, and a prototype system is introduced. Compared with related works, the main characteristic of our approach is that the approach can be implemented by a computer program. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Beijing Univ Aeronaut & Astronaut, Dept Comp Sci & Technol, Beijing 100083, Peoples R China 通讯作者地址: Luan, SM, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 28 被引频次: 3 出版商: SCIENCE PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1009-2757 DOI: 10.1360/03yf0327 29 字符的来源出版物名称缩写: SCI CHINA SER F ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci. 来源文献页码计数: 12 学科类别: Computer Science, Information Systems ISI 文献传递号: 008AS -------------------------------------------------------------------------------显示 35 条,共 136 条 作者: Wang, XC; Qin, YY; Tian, F; Dai, GZ 编者: Tao, J; Picard, RW 标题: Scenario-based interactive intention understanding in pen-based user interfaces 来 源 出 版 物 : AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION, PROCEEDINGS, 3784: 828-835 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Conference on Affective Computing and Intelligent Interaction 会议日期: OCT 22-24, 2005 会议地点: Beijing, PEOPLES R CHINA 会议赞助商: Nokia Ltd.; Siemens Ltd.; Int Speech Commun Assoc.; Natl Nat Sci Fdn China.; Chinese Assoc Automat.; China Soc Image & Graph.; China Comp Federat.; Natl High-Tech Res & Dev Program. 摘要: Interactive intention understanding is important for Penbased User Interface (PUI). Many works on this topic are reported, and focus on handwriting or sketching recognition algorithms at the lexical layer. But these algorithms cannot totally solve the problem of intention understanding and can not provide the pen-based softwaxe with high usability. Hence, a scenario-based interactive intention understanding framework is presented in this paper, and is used to simulate human cognitive mechanisms and cognitive habits. By providing the understanding environment supporting the framework, we can apply the framework to the practical PUI system. The evaluation of the Scientific Training Management System for the Chinese National Diving Team shows that the framework is effective in improving the usability and enhancing the intention understanding capacity of this system. 地址: Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China 通讯作者地址: Wang, XC, Chinese Acad Sci, Inst Software, Beijing 100864, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 14 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29621-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 8 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDM83 -------------------------------------------------------------------------------显示 36 条,共 136 条 作者: Bi, WX; Wang, XG; Tang, Z; Tamura, H 标题: Avoiding the local minima problem in backpropagation algorithm with modified error function 来 源 出 版 物 : IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E88A (12): 3645-3653 DEC 2005 语言: English 文献类型: Article 作者关键词: backpropagation; learning; local minima; modified error function KeyWords Plus: NEURAL-NETWORKS 摘要: One critical "drawback" of the backpropagation algorithm is the local minima problem. We have noted that the local minima problem in the backpropagation algorithm is usually caused by update disharmony between weights connected to the hidden layer and the output layer. To solve this kind of local minima problem, we propose a modified error function with two terms. By adding one term to the conventional error function., the modified error function can harmonize the update of weights connected to the hidden layer and those connected to the output layer. Thus, it can avoid the local minima problem caused by such disharmony. Simulations on some benchmark problems and a real classification task have been performed to test the validity of the modified error function. 地址: Toyama Univ, Fac Engn, Toyama 9308555, Japan; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100864, Peoples R China 通讯作者地址: Bi, WX, Toyama Univ, Fac Engn, Toyama 9308555, Japan. 电子邮箱地址: [email protected] 引用的参考文献数: 30 被引频次: 0 出版商: IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG 出 版 商 地 址 : KIKAI-SHINKO-KAIKAN BLDG MINATO-KU SHIBAKOEN 3 CHOME, TOKYO, 105, JAPAN ISSN: 0916-8508 DOI: 10.1093/ietfec/e88-a.12.3645 29 字符的来源出版物名称缩写: IEICE TRANS FUND ELEC COM COM ISO 来源文献出版物名称缩写: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 来源文献页码计数: 9 学科类别: Computer Science, Hardware & Architecture; Computer Science, Information Systems; Engineering, Electrical & Electronic ISI 文献传递号: 997XD -------------------------------------------------------------------------------显示 37 条,共 136 条 作者: Wang, L; Wu, CK 标题: Efficient identity-based multicast scheme from bilinear pairing 来源出版物: IEE PROCEEDINGS-COMMUNICATIONS, 152 (6): 877-882 DEC 2005 语言: English 文献类型: Article KeyWords Plus: ENCRYPTION 摘要: In a multicast communication system, when the membership changes, the group key must be refreshed securely and efficiently. The efficiency of the group key refreshment is critical, especially in a dynamic and large group since the size of deleted or added members may be quite large. An efficient identity-based multicast scheme based on pairings is proposed. It has distinct advantages in secure service over the existing schemes in the sense of dynamic group key management. The scheme satisfies forward secrecy and backward secrecy. A solution is also presented to the source authentication and data integrity services without introducing additional computation. In this scheme, the member can be a stateless receiver, Who does not need to update his/her state from session to session. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Wang, L, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 27 被引频次: 3 出版商: IEE-INST ELEC ENG 出版商地址: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD SG1 2AY, ENGLAND ISSN: 1350-2425 DOI: 10.1049/ip-com:20045308 29 字符的来源出版物名称缩写: IEE PROC-COMMUN ISO 来源文献出版物名称缩写: IEE Proc.-Commun. 来源文献页码计数: 6 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 998KX -------------------------------------------------------------------------------显示 38 条,共 136 条 作者: Cao, T; Lin, D; Xue, R 标题: ID-based designated-verifier proxy signatures 来源出版物: IEE PROCEEDINGS-COMMUNICATIONS, 152 (6): 989-994 DEC 2005 语言: English 文献类型: Article 摘要: Designated-verifier proxy signature (DVPS) is a proxy signature that can only be verified by a designated verifier. DVPS has three variants: weak DVPS, strong DVPS and universal DVPS. In a weak DVPS, the designated verifier can further convert a proxy signature into a public verifiable signature. In a strong DVPS, the designated verifier cannot prove to any third party that the signature is generated by the proxy signer. In a universal DVPS.. any holder of a proxy signature can designate the signature to any designated verifier. Based on Cha and Cheon's identity (ID)-based signatures, an ID-based weak DVPS scheme. an ID-based strong, DVPS scheme and an ID-based universal DVPS scheme are designed. The proposed schemes satisfy all the desired security properties. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China; China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China 通讯作者地址: Cao, T, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 14 被引频次: 1 出版商: IEE-INST ELEC ENG 出版商地址: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD SG1 2AY, ENGLAND ISSN: 1350-2425 DOI: 10.1049/ip-com:20045270 29 字符的来源出版物名称缩写: IEE PROC-COMMUN ISO 来源文献出版物名称缩写: IEE Proc.-Commun. 来源文献页码计数: 6 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 998KX -------------------------------------------------------------------------------显示 39 条,共 136 条 作者: Wu, CK 标题: Hash channels 来源出版物: COMPUTERS & SECURITY, 24 (8): 653-661 NOV 2005 语言: English 文献类型: Article 作者关键词: subliminal channel; hash function; digital signature KeyWords Plus: SUBLIMINAL CHANNELS; PROTOCOL 摘要: It is believed that in authentication protocols where no random numbers are involved, it is hard to introduce subliminal channels. In this paper we show that subliminal channels exist in digital signature schemes where no random numbers are used. The source where the subliminal channels exist is widely acceptable hash functions with their outputs being of some randomness. Because the subliminal channels are established by using hash functions, the subliminal channels are called hash channels in this paper. This indicates that there exist subliminal channels in any authentication protocols that use hash functions. (C) 2005 Elsevier Ltd. All rights reserved. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China; Australian Natl Univ, Dept Comp Sci, Canberra, ACT 0200, Australia 通讯作者地址: Wu, CK, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 23 被引频次: 1 出版商: ELSEVIER ADVANCED TECHNOLOGY 出版商地址: OXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND ISSN: 0167-4048 DOI: 10.1016/j.cose.2005.04.007 29 字符的来源出版物名称缩写: COMPUT SECURITY ISO 来源文献出版物名称缩写: Comput. Secur. 来源文献页码计数: 9 学科类别: Computer Science, Information Systems ISI 文献传递号: 996QP -------------------------------------------------------------------------------显示 40 条,共 136 条 作者: Hu, CY (Hu, Chenyong); Zhang, BY (Zhang, Benyu); Wang, YJ (Wang, Yongji); Yan, SC (Yan, Shuicheng); Chen, Z (Chen, Zheng); Wang, Q (Wang, Qing); Yang, Q (Yang, Qiang) 标题: Learning quantifiable associations via principal sparse non-negative matrix factorization 来源出版物: INTELLIGENT DATA ANALYSIS, 9 (6): 603-620 2005 语言: English 文献类型: Article 作者关键词: data mining; association rules; non-negative matrix factorization; principal sparse non-negative matrix factorization 摘要: Association rules are traditionally designed to capture statistical relationship among itemsets in a given database. To additionally capture the quantitative association knowledge, Korn et. al. recently propose a paradigm named Ratio Rules [6] for quantifiable data mining. However, their approach is mainly based on Principle Component Analysis (PCA), and as a result, it cannot guarantee that the ratio coefficients are non-negative. This may lead to serious problems in the rules' application. In this paper, we propose a new method, called Principal Sparse Non-negative Matrix Factorization (PSNMF), for learning the associations between itemsets in the form of Ratio Rules. In addition, we provide a support measurement to weigh the importance of each rule for the entire dataset. Experiments on several datasets illustrate that the proposed method performs well for discovering latent associations between itemsets in large datasets. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China; Microsoft Res Asia, Beijing 100080, Peoples R China; Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China; Hong Kong Univ Sci & Technol, Dept Comp Sci, Sha Tin, Hong Kong, Peoples R China; Chinese Acad Sci, Inst Software, Key Lab Comp Sci, Beijing, Peoples R China 通讯作者地址: Hu, CY, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 22 被引频次: 1 出版商: IOS PRESS 出版商地址: NIEUWE HEMWEG 6B, 1013 BG AMSTERDAM, NETHERLANDS ISSN: 1088-467X 29 字符的来源出版物名称缩写: INTELL DATA ANAL ISO 来源文献出版物名称缩写: Intell. Data Anal. 来源文献页码计数: 18 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: V43YE -------------------------------------------------------------------------------显示 41 条,共 136 条 作者: Xu, J; Zhang, ZF; Feng, DG 编者: Chen, G; Pan, Y; Guo, M; Lu, J 标题: ID-based proxy signature using bilinear pairings 来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 3759: 359-367 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN, SGCA and WISA 会议日期: NOV 02-05, 2005 会议地点: Nanjing, PEOPLES R CHINA 会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol. 作者关键词: ID-based signatures; proxy signatures; bilinear pairings; provable security 摘 要 : Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity. But to date, no ID-based proxy signature scheme with provable security has been proposed. In this paper, we formalize a notion of security for ID-based proxy signature schemes and propose a scheme based on the bilinear pairings. We show that the security of our scheme is tightly related to the computational Diffie-Hellman assumption in the random oracle model. 地址: Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 17 被引频次: 4 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29770-7 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 9 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDJ16 -------------------------------------------------------------------------------显示 42 条,共 136 条 作者: Zhang, ZF; Feng, DG 编者: Chen, G; Pan, Y; Guo, M; Lu, J 标题: Efficient fair certified e-mail delivery based on RSA 来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 3759: 368-377 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN, SGCA and WISA 会议日期: NOV 02-05, 2005 会议地点: Nanjing, PEOPLES R CHINA 会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol. 作者关键词: fair exchange; RSA; e-mail; security protocol KeyWords Plus: SIGNATURES; EXCHANGE 摘要: Certified e-mail delivery (CEMD) has become one of the basic requirement in performing business transactions over the Internet securely. How to construct fair protocols for certified e-mail delivery based on the RSA cryptosystem is of great interest. Recently, Nenadic etc. proposed a novel RSA-based method for the verifiable and recoverable encrypted signature (VRES), anti utilized it to construct a security protocol for certified e-mail delivery, which are claimed to provide strong fairness to ensure that the recipient receives the e-mail if and only if the sender receives the receipt. However, as a building block, their RSA-based VRES is totally breakable. This papers shows that an adversary can generate a valid VRES which cannot be recovered by the designated TTP, and hence the proposed certified e-mail delivery protocol cannot guarantee the required fairness. Based on probabilistic signatures, we proposed a novel fair CEMD protocol which works with the RSA cryptosystem and guarantees strong fairness. Moreover, there is no need for a registration phase between a party and TTP, and the proposed protocol is more computation and communication efficient. 地址: Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhang, ZF, Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 17 被引频次: 3 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29770-7 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDJ16 -------------------------------------------------------------------------------显示 43 条,共 136 条 作者: Zhang, LW; Feng, DG 编者: Chen, G; Pan, Y; Guo, M; Lu, J 标题: Intrusion tolerant CA scheme with cheaters detection ability 来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 3759: 378-386 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN, SGCA and WISA 会议日期: NOV 02-05, 2005 会议地点: Nanjing, PEOPLES R CHINA 会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol. 作者关键词: intrusion tolerance; threshold signature; CA; proactive 摘要: In this paper, we put forward a practical intrusion tolerant CA scheme with the ability of cheater detection. Compared to the scheme of ITTC's project[1], the scheme has built-in ability of detecting cheaters, and has ability to generate signature without specifying one group of servers in the serial mode. We also present shares proactive refresh protocol to prevent key shares from gradually exposed or corrupted. Our scheme can be changed from (t, n) scheme to (t, n + 1) scheme. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Zhang, LW, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 10 被引频次: 2 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29770-7 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 9 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDJ16 -------------------------------------------------------------------------------显示 44 条,共 136 条 作者: Cong, LL; Jin, BH; Cao, DL; Cao, JN 编者: Pan, Y; Chen, D; Guo, M; Cao, JN; Dongarra, J 标题: GCPM: A model for efficient call admission control in wireless cellular networks 来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 3758: 945-954 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 3rd International Conference on Parallel and Distributed Processing and Applications 会议日期: NOV 02-05, 2005 会议地点: Nanjing, PEOPLES R CHINA 会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol. 作者关键词: call admission control; guard channel; guard channel prediction model (GCPM); quality of service (QoS); wireless/mobile cellular networks 摘要: Call Admission Control (CAC) is crucial for assuring the quality of service (QoS) of communication in wireless cellular networks. In this paper, we propose a model, called Guard Channel Prediction Model (GCPM), for efficient call admission control satisfying the QoS requirements. A predictive value of the appropriate number of guard channels can be calculated based on this model by using statistical properties of new and handoff call arrival rates and mean call residency time, as well as the total capacity of a specific cell. Simulation studies are carried out to evaluate the performance in comparison with an existing adaptive algorithm under variable traffic loads and mobility patterns. Simulation results show that our proposed GCPM, using the static and fractional Guard Channel policy to process both types of incoming calls based on the predictive values, has gained better QoS with less blocking probabilities of both types of calls and meanwhile, larger network utilizations. 地址: Chinese Acad Sci, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing, Peoples R China; Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Cong, LL, Chinese Acad Sci, Inst Software, Beijing, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29769-3 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDJ13 -------------------------------------------------------------------------------显示 45 条,共 136 条 作者: Wang, JF; Zhou, HX; Xu, FJ; Li, L 编者: Pan, Y; Chen, D; Guo, M; Cao, JN; Dongarra, J 标题: Hyper-Erlang based model for network traffic approximation 来源出版物: PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 3758: 1012-1023 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 3rd International Conference on Parallel and Distributed Processing and Applications 会议日期: NOV 02-05, 2005 会议地点: Nanjing, PEOPLES R CHINA 会议赞助商: Nanjing Univ, State Key Lab Novel Software Technol. KeyWords Plus: TAIL DISTRIBUTIONS 摘要: The long-tailed distribution characterizes many properties of Internet traffic. The property is often modeled by Lognormal distribution, Weibull or Pareto distribution theoretically. However, it hinders us in traffic analysis and evaluation studies directly from these models due to their complex representations and theoretical properties. This paper proposes a Hyper-Erlang Model (Mixed Erlang distribution) for such long-tailed network traffic approximation. It fits network traffic with long-tailed characteristic into a mixed Erlang distribution directly to facilitate our further analysis. Compared with the well-known hyperexponential based method, the mixed Erlang model is more accurate in fitting the tail behavior and also computationally efficient. 地址: Chinese Acad Sci, Natl Key Lab Integrated Informat Syst Technol, Inst Software, Beijing 100080, Peoples R China; Chongqing Commun Inst, Chongqing 400035, Peoples R China 通讯作者地址: Wang, JF, Chinese Acad Sci, Natl Key Lab Integrated Informat Syst Technol, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 19 被引频次: 2 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29769-3 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDJ13 -------------------------------------------------------------------------------显示 46 条,共 136 条 作者: Ding, XN; Zhang, X; Jin, BH; Huang, T 编者: Meersman, R; Tari, Z; Hacid, MS; Mylopoulos, J; Pernici, B; Babaoglu, O; Jacobsen, HA; Loyall, J; Kifer, M; Spaccapietra, S 标题: A task-type aware transaction scheduling algorithm in J2EE 来源出版物: ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: COOPIS, DOA, AND ODBASE, PT 2, PROCEEDINGS, 3761: 1034-1045 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: OTM Confederated International Conference and Workshop 会议日期: OCT 31-NOV 04, 2005 会议地点: Agia Napa, CYPRUS 会议赞助商: RMIT Univ.; Vrije Univ Brussels, Dept Comp Sci.; Interop. 摘要: A large number of J2EE applications use entity beans as their application persistence mechanism, while current J2EE scheduling to entity beans is still a simple First-Come First-Served (FCFS) policy, Due to this simple policy, the scheduling does not distinguish the key transactions from the trivial ones. A task-type aware scheduling algorithm should be adopted to provide better service for key transactions. However, some characteristics of ME middleware transaction processing, such as the absence of necessary scheduling information and the interactive executing model, made it impossible to apply the traditional priority-driven scheduling algorithms. This paper puts forward a scheduling algorithm named TMPBP, which offers a new dynamic priority assignment algorithm HRS that can recognize the key tasks at runtime heuristically. Additionally, TMPBP add some extra techniques to the traditional concurrency control policies according to the features of ME The algorithm is proven to be safe and will not produce starvation or priority inversion, The experimental evaluations indicated that TMPBP improves the Quality of Service (QoS) of key tasks effectively, especially when the server is under a heavy load. 地址: Chinese Acad Sci, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing, Peoples R China 通讯作者地址: Ding, XN, Chinese Acad Sci, Inst Software, Beijing, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 17 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29738-3 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDJ18 -------------------------------------------------------------------------------显示 47 条,共 136 条 作者: Wang, P; Feng, DG; Wu, WL 编者: Zhou, J; Lopez, J; Deng, RH; Bao, F 标题: On the security of tweakable modes of operation: TBC and TAE 来源出版物: INFORMATION SECURITY, PROCEEDINGS, 3650: 274-287 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 8th International Conference on Information Security 会议日期: SEP 20-23, 2005 会议地点: Singapore, SINGAPORE 会议赞助商: Inst Infocomm Res.; Singapore Management Univ. 作者关键词: blockcipher; tweakable blockcipher; modes of operation; symmetric encryption; authenticated encryption KeyWords Plus: BLOCK-CIPHER 摘要: We investigate the security of two tweakable-blockcipher-based modes TBC and TAE proposed in [13]. Our results show that: (1) The TBC encryption mode, whether randomized or stateful, is secure in the sense of indistinguishability from random bits; (2) Theorem 3 in [13] is wrong. A simple counterexample against the authenticity of TAE is presented, which shows that the secure tweakable blockcipher against chosen plaintext attack is not sufficient for the security of the TAE mode. 地址: Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100049, Peoples R China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Wang, P, Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100049, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 21 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29001-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDI50 -------------------------------------------------------------------------------显示 48 条,共 136 条 作者: Zhan, NJ; Majster-Cederbaum, M 编者: Wang, F 标题: Deriving non-determinism from conjunction and disjunction 来源出版物: FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS FORTE 2005, 3731: 351-365 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 25th International Conference on Formal Techniques for Networked and Distributed Systems 会议日期: OCT 02-05, 2005 会议地点: Taipei, TAIWAN 会议赞助商: IFIP Working Grp 6 1. 作者关键词: non-determinism; synchronization tree logic; mu-calculus; process algebra KeyWords Plus: PROPOSITIONAL MU-CALCULUS 摘要: In this paper, we show that the non-deterministic choice "+", which was proposed as a primitive operator in Synchronization Tree Logic (STL for short) can be defined essentially by conjunction and disjunction in the mu-calculus (mu M for short). This is obtained by extending the mu-calculus with the non-deterministic choice "+" (denoted by mu M+) and then showing that mu M+ can be translated into mu M. Furthermore, we also prove that STL can be encoded into mu M+ and therefore into mu M. 地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China; Univ Mannheim, Fak Math & Informat, Lehrstuhl Prakt Informat 2, D-68163 Mannheim, Germany 通讯作者地址: Zhan, NJ, Chinese Acad Sci, Inst Software, Comp Sci Lab, S 4th St 4, Beijing 100080, Peoples R China. 引用的参考文献数: 11 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29189-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 15 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDI24 -------------------------------------------------------------------------------显示 49 条,共 136 条 作者: Li, YJ 编者: Wang, F 标题: The inductive approach to strand space 来源出版物: FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS FORTE 2005, 3731: 547-552 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 25th International Conference on Formal Techniques for Networked and Distributed Systems 会议日期: OCT 02-05, 2005 会议地点: Taipei, TAIWAN 会议赞助商: IFIP Working Grp 6 1. 摘要: Strand space is a promising technique developed by Guttman et al. from MITRE company, and it provides us an intuitive and clear framework to analyze security protocols, but its mechanics of the proof tend to be quite intricate and not necessarily easy to be formalized. In this paper, we combine the inductive approach with strand space. We introduce an inductive definition for bundles, and it not only provides us a constructive illustration for a bundle, but also introduces an effective and rigorous technique of rule induction to prove properties of bundles. Using this induction principle, we not only prove that a bundle is a casually well-founded graph, but also give a rigorous proof for results of authentication tests. Our result of authentication test extends Guttman's result to a more general case, and its proof is also much easier and clearer. As a trivial case study, we prove authentication properties of Needham-Schroeder-Lowe protocol. Our approach has been mechanized using Isabelle/HOL. 地址: Chinese Acad Sci, Key Lab Comp Sci, Beijing, Peoples R China; Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China 通讯作者地址: Li, YJ, Chinese Acad Sci, Key Lab Comp Sci, POB 8718, Beijing, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 3 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29189-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDI24 -------------------------------------------------------------------------------显示 50 条,共 136 条 作者: Wu, P; Zhang, DM 编者: Wang, F 标题: Compositional modelling and verification of IPv6 mobility 来源出版物: FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS FORTE 2005, 3731: 553-556 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 25th International Conference on Formal Techniques for Networked and Distributed Systems 会议日期: OCT 02-05, 2005 会议地点: Taipei, TAIWAN 会议赞助商: IFIP Working Grp 6 1. 摘要: An enhanced compositional framework is presented for modelling network protocols with symbolic transition graphs. In the context of the modelling framework, a sufficient condition for deadlock freedom of network protocols, namely interoperability, is reconstructed in a more concise way with an advantage that it allows for symbolic verification without referring to protocol states. Furthermore, a case study with Mobile IPv6 illustrates the effectiveness of the improved modelling framework and also discloses some infrangibilities of Mobile IPv6 in the sense that it can not maintain the binding coherency all the time, which may result in unreachable or unstable routes. 地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Grad Sch, Beijing 100080, Peoples R China; Beijing Univ Posts & Telecommun, Sch Comp Sci & Technol, Beijing 100876, Peoples R China 通讯作者地址: Wu, P, Chinese Acad Sci, Inst Software, Comp Sci Lab, Grad Sch, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 5 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29189-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 4 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDI24 -------------------------------------------------------------------------------显示 51 条,共 136 条 作者: Zhou, ZY; Liang, B; Jiang, L; Shi, WC; He, YP 标题: A formal description of SECIMOS operating system 来源出版物: COMPUTER NETWORK SECURITY, PROCEEDINGS, 3685: 286-297 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Article 摘要: The application of formal methods in secure operating system experiences a procedure of development and maturity with the eminence and development of secure operating system itself. According to Common Criteria and United States Department of Defenses Trusted Computer System Evaluation Criteria (TCSEC), high security level secure operating system should introduce formal methods in the process development and evaluation. Security in Mind Operating System (SEC-IMOS) is a customizable secure operating system developed by Institute of Software, Chinese Academy of Science. In this work, we formally model the security policies using Z specification language and informally proved the correspondence between policies and top level functionalities. As a result, we summarize the gist to choose a formal description language for modeling a secure operating system and possibility of use Isabelle/HOL as a formal tool. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100049, Peoples R China; Hunan Univ, Coll Comp & Commun, Changsha 410082, Peoples R China; Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China; Beijing Venus Info Tech Inc, Beijing 100081, Peoples R China 通讯作者地址: Zhou, ZY, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 15 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDI14 -------------------------------------------------------------------------------显示 52 条,共 136 条 作者: Sun, JQ; Ma, ZQ; Tian, YM; Qin, MZ 标题: Symplectic structure of poisson system 来源出版物: APPLIED MATHEMATICS AND MECHANICS-ENGLISH EDITION, 26 (11): 1484-1490 NOV 2005 语言: English 文献类型: Article 作者关键词: Poisson system; nonlinear transformation; symplectic method; rigid body problem KeyWords Plus: INTEGRATION; EQUATIONS; SCHEMES 摘要: When the Poisson matrix of Poisson system is non-constant, classical symplectic methods, such as symplectic Runge-Kutta method, generating function method, cannot preserve the Poisson structure. The non-constant Poisson structure was transformed into the symplectic structure by the nonlinear transform. Arbitrary order symplectic method was applied to the transformed Poisson system. The Euler equation of the free rigid body problem was transformed into the symplectic structure and computed by the mid-point scheme. Numerical results show the effectiveness of the nonlinear transform. 地址: Chinese Acad Sci, Inst High Energy Phys, Beijing 100039, Peoples R China; Inst Appl Phys & Computat Math, Beijing 100088, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Computat Math, Beijing 100080, Peoples R China 通讯作者地址: Sun, JQ, Chinese Acad Sci, Inst High Energy Phys, Beijing 100039, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 7 被引频次: 0 出版商: SHANGHAI UNIV 出版商地址: 149 YANCHANG RD, SHANGHAI 200072, PEOPLES R CHINA ISSN: 0253-4827 29 字符的来源出版物名称缩写: APPL MATH MECH-ENGL ED ISO 来源文献出版物名称缩写: Appl. Math. Mech.-Engl. Ed. 来源文献页码计数: 7 学科类别: Mathematics, Applied; Mechanics ISI 文献传递号: 990YP -------------------------------------------------------------------------------显示 53 条,共 136 条 作者: Zhan, NJ; Wu, JZ 编者: VanHung, D; Wirsing, M 标题: Compositionality of fixpoint logic with chop 来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2005, 3722: 136-150 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Colloquium on Theoretical Aspects of Computing 会议日期: OCT 17-21, 2005 会议地点: Hanoi, VIETNAM 会议赞助商: United Nations Univ, Int Inst Software Technol.; Vietnam Natl Univ.; Vietnam Acad Sci & Technol. 作者关键词: FLC; compositionality; verification; bisimulation; characteristic formula; basic process algebra KeyWords Plus: DIVERGENCE 摘要: Compositionality plays an important role in designing reactive systems as it allows one to compose/decompose a complex system from/to several simpler components. Generally speaking, it is hard to design a complex system in a logical frame in a compositional way because it is difficult to find a connection between the structure of a system to be developed and that of its specification given by the logic. In this paper, we investigate the compositionality of the Fixpoint Logic with Chop (FLC for short). To this end, we extend FLC with the nondeterministic choice "+" (FLC+ for the extension) and then establish a correspondence between the logic and the basic process algebra with deadlock and termination (abbreviated BPA(delta)(epsilon)). Subsequently, we show that the choice is definable in FLC. As an application of the compositionality of FLC, an algorithm is given to construct characteristic formulae of BPA(delta)(epsilon) up to strong bisimulation directly from the syntax of processes in a compositional manner. 地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China; Univ Mannheim, Lehrstuhl Prakt Informat 2, Fak Math & Informat, D-68163 Mannheim, Germany 通讯作者地址: Zhan, NJ, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China. 引用的参考文献数: 28 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29107-5 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 15 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDG72 -------------------------------------------------------------------------------显示 54 条,共 136 条 作者: Yan, RJ; Li, GY; Tang, ZS 编者: VanHung, D; Wirsing, M 标题: Symbolic model checking of finite precision timed automata 来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2005, 3722: 272-287 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Colloquium on Theoretical Aspects of Computing 会议日期: OCT 17-21, 2005 会议地点: Hanoi, VIETNAM 会议赞助商: United Nations Univ, Int Inst Software Technol.; Vietnam Natl Univ.; Vietnam Acad Sci & Technol. 作者关键词: finite precision timed automata; model checking; symbolic methods KeyWords Plus: VERIFICATION; ALGORITHMS 摘要: This paper introduces the notion of finite precision timed automata (FPTAs) and proposes a data structure to represent its symbolic states. To reduce the state space, FPTAs only record the integer values of clock variables together with the order of their most recent resets. We provide constraints under which the reachability checking of a timed automaton can be reduced to that of the corresponding FPTA, and then present an algorithm for reachability analysis. Finally, the paper reports some preliminary experimental results, and analyzes the advantages and disadvantages of the new data structure. 地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Yan, RJ, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 25 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29107-5 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 16 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDG72 -------------------------------------------------------------------------------显示 55 条,共 136 条 作者: Sun, JC 编者: Hobbs, M; Goscinski, AM; Zhou, W 标题: Multi-color difference schemes of Helmholtz equation and its parallel fast solver over 3-D dodecahedron partitions 来源出版物: DISTRIBUTED AND PARALLEL COMPUTING, 3719: 301-308 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 6th International Conference on Algorithms and Architectures for Parallel Processing 会议日期: OCT 02-03, 2005 会议地点: Melbourne, AUSTRALIA 会议赞助商: Deakin Univ, Sch IT.; Martin Lack & Associates.; Deakin Univ, Fac Sci & Technol.; Natl ICT Australia.; Alexander Technol. 摘要: In this paper, the problem of partitioning parallel dodecahedrons in 3D is examined. Two schemes are introduced and their convergence rate discussed. A parallel fast solver was implemented and tested experimentally, with the performance results presented. 地址: Chinese Acad Sci, Inst Software, R&D Ctr Parallel Software, Beijing 100080, Peoples R China 通讯作者地址: Sun, JC, Chinese Acad Sci, Inst Software, R&D Ctr Parallel Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 7 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29235-7 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 8 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDG70 -------------------------------------------------------------------------------显示 56 条,共 136 条 作者: Zhang, Z; Che, HY; Shi, PF; Sun, Y; Gu, J 编者: Fan, W; Wu, Z; Yang, J 标题: An algebraic framework for schema matching 来源出版物: ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 3739: 694-699 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 6th International Conference on Web -Age Informational Management 会议日期: OCT 11-13, 2005 会议地点: Hangzhou, PEOPLES R CHINA 会议赞助商: DatabaseSoc China Comp Federat.; Natl Sci Fdn China.; Zhejiang Univ, Y C Tang Disciplinary Dev & Fund.; Oracle China. 摘要: It is well known that a formal framework for the schema matching problem (SMP) is important because it facilitates the building of algorithm model and the evaluation of algorithms. First, based on universal algebra, we propose a meta-meta structure for schema. This definition has a distinctive feature: it is able to describe any particular style of schemas, and transforms a schema and other matching information into a finite structure over specific signature. Then, we formulize SMP as a schema homomorphism problem, and prove that SMP is equivalent to finding a semantic homomorphism from one schema to another. These results lead to the main contribution of this paper: an algebraic framework for SMP. Thirdly, we show a classification of schema matching based on the algebraic framework. 地址: Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Zhang, Z, Shanghai Jiao Tong Univ, Inst Image Proc & Pattern Recognit, Shanghai 200030, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 13 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29227-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDG49 -------------------------------------------------------------------------------显示 57 条,共 136 条 作者: Li, SJ; Ou, WJ; Yu, JQ 编者: Fan, W; Wu, Z; Yang, J 标题: Ontology-based HTML to XML conversion 来源出版物: ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 3739: 888-893 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 6th International Conference on Web -Age Informational Management 会议日期: OCT 11-13, 2005 会议地点: Hangzhou, PEOPLES R CHINA 会议赞助商: DatabaseSoc China Comp Federat.; Natl Sci Fdn China.; Zhejiang Univ, Y C Tang Disciplinary Dev & Fund.; Oracle China. KeyWords Plus: EXTRACTION 摘要: Current wrapper approaches break down in extracting data from differently structured and frequently changing Web pages. To tackle this challenge, this paper defines domain-specific ontology, captures the semantic hierarchy in Web pages automatically by exploiting both structural information and common formatting information, and recognizes and extracts data by using ontology-based semantic matching without relying on page-specific formatting. It is adaptive to differently structured and frequently changing Web pages for a domain of interest. 地址: Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China; Chinese Acad Sci, Lab Comp Sci, Inst Software, Beijing 100080, Peoples R China; Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China 通讯作者地址: Li, SJ, Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 10 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-29227-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDG49 -------------------------------------------------------------------------------显示 58 条,共 136 条 作者: Zhang, ZF 标题: An additive problem with primes in arithmetic progressions 来源出版物: ACTA MATHEMATICA SINICA-ENGLISH SERIES, 21 (1): 155-168 JAN 2005 语言: English 文献类型: Article 作者关键词: additive problem; prime; arithmetic progression; circle method 摘要: In this paper, we extend a classical result of Hua to arithmetic progressions with large moduli. The result implies the Linnik Theorem on the least prime in an arithmetic progression. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Zhang, ZF, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 17 被引频次: 1 出版商: SPRINGER HEIDELBERG 出版商地址: TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY ISSN: 1439-8516 DOI: 10.1007/s10114-004-0322-6 29 字符的来源出版物名称缩写: ACTA MATH SIN-ENGLISH SERIES ISO 来源文献出版物名称缩写: Acta. Math. Sin.-English Ser. 来源文献页码计数: 14 学科类别: Mathematics, Applied; Mathematics ISI 文献传递号: 906MB -------------------------------------------------------------------------------显示 59 条,共 136 条 作者: Wang, XY; Feng, DG; Yu, XY 标题: An attack on hash function HAVAL-128 来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (5): 545-556 OCT 2005 语言: English 文献类型: Article 作者关键词: hash function; collision; differential attack; differential characteristic KeyWords Plus: COLLISIONS; SHA-0 摘要: In this paper, we give a fast attack against hash function - HAVAL-128. HAVAL was presented by Y. L. Zheng et al. at Auscrypto'92. It can be processed in 3, 4 or 5 passes, and produces 128, 160, 192, or 224-bit fingerprint. We break the HAVAL with 128-bit fingerprint. The conclusion is that, given any 1024-bit message m, we just make some modifications about m, and the modified message m can collide with another message m' only with probability 1/2(7), where m' = m + Delta m, in which Delta m is a fixed difference selected in advance. In addition, two collision examples for HAVAL-128 are given in this paper. 地址: Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Hangzhou Teachers Coll, Dept Math, Hangzhou 310012, Peoples R China 通讯作者地址: Wang, XY, Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 22 被引频次: 5 出版商: SCIENCE PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1009-2757 DOI: 10.1360/122004-107 29 字符的来源出版物名称缩写: SCI CHINA SER F ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci. 来源文献页码计数: 12 学科类别: Computer Science, Information Systems ISI 文献传递号: 984YR -------------------------------------------------------------------------------显示 60 条,共 136 条 作者: Wang, YJ; Cartmell, M; Tao, QM; Liu, H 标题: A generalized real-time obstacle avoidance method without the cspace calculation 来源出版物: JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 20 (6): 774-787 NOV 2005 语言: English 文献类型: Article 作者关键词: path planning; obstacle avoidance; autonomous underwater vehicle; non-linear programming; robotics; semi-infinite constrained optimization KeyWords Plus: MOBILE ROBOTS; CONSTRAINED OPTIMIZATION; CONFIGURATION SPACE; VEHICLE; ALGORITHM; MOTION; SONAR; GENERATION; SEQUENCES; GEOMETRY 摘要: An important concept proposed in the early stage of robot path planning field is the shrinking of a robot to a point and meanwhile the expanding of obstacles in the workspace as a set of new obstacles. The resulting grown obstacles are called the Configuration Space (Cspace) obstacles. The find-path problem is then transformed into that of finding a collision-free path for a point robot among the Cspace obstacles. However, the research experiences have shown that the Cspace transformation is very hard when the following situations occur: 1) both the robot and obstacles are not polygons, and 2) the robot is allowed to rotate. This situation gets even worse when the robot and obstacles are three dimensional (3D) objects with various shapes. For this reason, direct path planning approaches without the Cspace transformation is quite useful and expected. Motivated by the practical requirements of robot path planning, a generalized constrained optimization problem (GCOP) with not only logic AND but also logic OR relationships was proposed and a mathematical solution developed previously. This paper inherits the fundamental ideas of inequality and optimization techniques from the previous work, converts the obstacle avoidance problem into a semi-infinite constrained optimization problem with the help of the mathematical transformation, and proposes a direct path planning approach without Cspace calculation, which is quite different from traditional methods. To show its merits, simulation results in 3D space have been presented. 地址: Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China; Univ Glasgow, Ctr Syst & Control, Glasgow G12 8QQ, Lanark, Scotland 通讯作者地址: Wang, YJ, Chinese Acad Sci, Lab Internet Software Technol, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected] 引用的参考文献数: 56 被引频次: 0 出版商: SCIENCE PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1000-9000 29 字符的来源出版物名称缩写: J COMPUT SCI TECHNOL ISO 来源文献出版物名称缩写: J. Comput. Sci. Technol. 来源文献页码计数: 14 学 科 类 别 : Computer Science, Hardware & Architecture; Computer Science, Software Engineering ISI 文献传递号: 984YM -------------------------------------------------------------------------------显示 61 条,共 136 条 作者: Shen, YD; Yang, Q 编者: Kramer, S; Pfahringer, B 标题: Deriving a stationary dynamic Bayesian network from a logic program with recursive loops 来源出版物: INDUCTIVE LOGIC PROGRAMMING, PROCEEDINGS, 3625: 330-347 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: 15th International Conference on Inductive Logic Programming (ILP 2005) 会议日期: AUG 10-13, 2005 会议地点: Bonn, GERMANY 会议赞助商: Gesell Informat.; Bioinformat Initiat Munich.; TU Munich.; PASCAL European Network Excellence.; Machine Learning Journal. 作者关键词: probabilistic logic programming (PLP); the well-founded semantics; SLG-resolution; stationary dynamic Bayesian networks KeyWords Plus: WELL-FOUNDED SEMANTICS; QUERIES 摘要: Recursive loops in a logic program present a challenging problem to the PLP framework. On the one hand, they loop forever so that the PLP backward-chaining inferences would never stop. On the other hand, they generate cyclic influences, which are disallowed in Bayesian networks. Therefore, in existing PLP approaches logic programs with recursive loops are considered to be problematic and thus are excluded. In this paper, we propose an approach that makes use of recursive loops to build a stationary dynamic Bayesian network. Our work stems from an observation that recursive loops in a logic program imply a time sequence and thus can be used to model a stationary dynamic Bayesian network without using explicit time parameters. We introduce a Bayesian knowledge base with logic clauses of the form A <- A(1),....A(l), true, Context, Types, which naturally represents the knowledge that the A(i)s have direct influences on A in the context Context under the type constraints Types. We then use the well-founded model of a logic program to define the direct influence relation and apply SLG-resolution to compute the space of random variables together with their parental connections. We introduce a novel notion of influence clauses, based on which a declarative semantics for a Bayesian knowledge base is established and algorithms for building a two-slice dynamic Bayesian network from a logic program are developed. 地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China; Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Shen, YD, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 30 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28177-0 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 18 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDF31 -------------------------------------------------------------------------------显示 62 条,共 136 条 作者: Liao, Y; Li, MS 编者: Wu, ZH; Chen, C; Guo, MY; Bu, JJ 标题: A QoS-aware component-based middleware for pervasive computing 来源出版物: EMBEDDED SOFTWARE AND SYSTEMS, 3605: 229-235 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Conference on Embedded Software and Systems 会议日期: DEC 09-10, 2004 会议地点: Hangzhou, PEOPLES R CHINA 会议赞助商: Zhejiang Univ.; Intel Corp.; China Putian Corp.; Hopen Software Engn Co Ltdq.; ZTE Corp.; Huawei Technologies Co Ltd.; CoreTekl Syst Inc.; China Mobile Software League. 摘要: In this paper, a QoS-aware component-based middleware for pervasive computing is given. The design rationale is to cope with many constraints of pervasive computing application including resource awareness, diversity, QoS-sensitive. To introduce how we achieve those system goals, we describe the details of this middleware including system architecture, service model, QoS model, algorithms of service setup, implementation, and experimentation. 地址: Chinese Acad Sci, Inst Software, Internet Software Technol Lab, Beijing 100080, Peoples R China 通讯作者地址: Liao, Y, Chinese Acad Sci, Inst Software, Internet Software Technol Lab, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 12 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28128-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 7 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDE41 -------------------------------------------------------------------------------显示 63 条,共 136 条 作者: Jia, ZP; Li, X 编者: Wu, ZH; Chen, C; Guo, MY; Bu, JJ 标题: OPC-based architecture of Embedded Web Server 来源出版物: EMBEDDED SOFTWARE AND SYSTEMS, 3605: 362-367 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Conference on Embedded Software and Systems 会议日期: DEC 09-10, 2004 会议地点: Hangzhou, PEOPLES R CHINA 会议赞助商: Zhejiang Univ.; Intel Corp.; China Putian Corp.; Hopen Software Engn Co Ltdq.; ZTE Corp.; Huawei Technologies Co Ltd.; CoreTekl Syst Inc.; China Mobile Software League. 摘要: This paper combines OPC (OLE for Process Control) standard to EWS (Embedded Web Server) in order to distribute an integrated service for accessing real-time and history data from control networks. A layer of OPC XML-DA (Data Access) service is added between web services interfaces and embedded operation system in OPC-EWS. Architecture of DCS (Distributed Control System) with OPC-EWS is described too. This OPC-EWS applies such technologies as OPC, Java and XML and links to Internet through TCP/IP. Therefore, accesses to all kinds of embedded devices and data share in the heterogeneous Internet/Intranet environment are implemented. At last real-time performance and security of OPC-EWS are analyzed. The experiments and application have demonstrated that the architecture has good performance and is feasible for real-time operation in DCS. 地址: Shandong Univ, Sch Comp Sci & Technol, Shandong 250061, Peoples R China; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080, Peoples R China 通讯作者地址: Jia, ZP, Shandong Univ, Sch Comp Sci & Technol, Shandong 250061, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 4 被引频次: 3 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28128-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDE41 -------------------------------------------------------------------------------显示 64 条,共 136 条 作者: Ma, B; Zhang, Y; Shi, XG 编者: Wu, ZH; Chen, C; Guo, MY; Bu, JJ 标 题 : Applying component-based meta-service in liquid operating system for pervasive computing 来源出版物: EMBEDDED SOFTWARE AND SYSTEMS, 3605: 406-411 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Conference on Embedded Software and Systems 会议日期: DEC 09-10, 2004 会议地点: Hangzhou, PEOPLES R CHINA 会议赞助商: Zhejiang Univ.; Intel Corp.; China Putian Corp.; Hopen Software Engn Co Ltdq.; ZTE Corp.; Huawei Technologies Co Ltd.; CoreTekl Syst Inc.; China Mobile Software League. 摘要: Liquid meta-service, a component-based operating system layer, is intended to enable embedded operating system to support pervasive computing by meeting the requirements of being spontaneous and adaptive. This is accomplished through two key features: (1) configurable, component-based infrastructure services called meta-service, and (2) a meta-service components trading service, which provides selecting and configuring mechanism for meta-service components. In this paper, we discuss the design principle, component model, implementations of some meta-service, and analyze the performance impact of using meta-service in embedded operating system. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing, Peoples R China 通讯作者地址: Ma, B, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, 4 S 4th St, Beijing, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 12 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28128-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDE41 -------------------------------------------------------------------------------显示 65 条,共 136 条 作者: Jiao, L; Cheung, TY; Lu, WM 标题: Handling synchronization problem in Petri net-based system design by property-preserving transition-reduction 来源出版物: COMPUTER JOURNAL, 48 (6): 692-701 NOV 2005 语言: English 文献类型: Article 摘要: Synchronizations frequently occur in the modeling and design of distributed and concurrent systems. Designing a correct system from subsystems by considering the synchronizations of events is a difficult and complex task because it often destroys some desirable properties of subsystems and induces the whole system deadlocks. This paper formulates a property-preserving transition-reduction transformation to handle the synchronization problem in Petri net-based system design. It starts by designing correct subsystems without taking transition-reduction consideration. Synchronizations are then introduced by merging transitions of subsystems. Depending on the structure of transitions, two classes of transition-reductions are investigated. For each class, this paper shows that many structural and behavior properties can be preserved. 地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Acad Math & Syst Sci, Beijing, Peoples R China; City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Jiao, L, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 25 被引频次: 0 出版商: OXFORD UNIV PRESS 出版商地址: GREAT CLARENDON ST, OXFORD OX2 6DP, ENGLAND ISSN: 0010-4620 DOI: 10.1093/comjnl/bxh125 29 字符的来源出版物名称缩写: COMPUT J ISO 来源文献出版物名称缩写: Comput. J. 来源文献页码计数: 10 学科类别: Computer Science, Hardware & Architecture; Computer Science, Information Systems; Computer Science, Software Engineering ISI 文献传递号: 983FN -------------------------------------------------------------------------------显示 66 条,共 136 条 作者: Cheng, W; Lin, HS; Sun, YF 编者: Khosla, R; Howlett, RJ; Jain, LC 标题: An efficient schema matcing algorithm 来源出版物: KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 3682: 972-978 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会 议 标 题 : 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems 会议日期: SEP 14-16, 2005 会议地点: Melbourne, AUSTRALIA 会议主办方: La Trobe Univ 摘要: Schema matching, the problem of finding semantic correspondences between elements of source and warehouse schemas, plays a key role in data warehousing. Currently, the mappings are largely determined manually by domain experts, thus a time-consuming process. In this paper, based on a multistrategy schema matching framework, we develop a linguistic matching algorithm using semantic distances between words to compute their semantic similarity, and propose a structural matching algorithm based on semantic similarity propagation. After describe our approach, we present experimental results on several real-world domains, and show that the algorithm discovers semantic mappings with a high degree of accuracy. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Cheng, W, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28895-3 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 7 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDC78 -------------------------------------------------------------------------------显示 67 条,共 136 条 作者: Zhang, ZF; Feng, DG 标题: Cryptanalysis of some signature schemes with message recovery 来源出版物: APPLIED MATHEMATICS AND COMPUTATION, 170 (1): 103-114 NOV 1 2005 语言: English 文献类型: Article 作者关键词: digital signature; cryptanalysis; message recovery KeyWords Plus: DIGITAL SIGNATURE 摘要: The notion of a self-certified public key was introduced by Girault in 1991. Recently, Tseng, Jan and Chien proposed a digital signature scheme with message recovery and some variants extended from the self-certified public key system proposed by Girault. A trusted system authority is assumed in their schemes. Chang et al. propose digital signature schemes that provide the same properties as Tseng et al.'s method without the assumption that the system authority is trustworthy. In this paper, we show that Tseng et al.'s signature schemes are existential forgable after getting a valid message-signature pair, and Chang et al.'s improved signature schemes are still not secure against an un-trusted system authority. (c) 2004 Elsevier Inc. All rights reserved. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Zhang, ZF, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 12 被引频次: 2 出版商: ELSEVIER SCIENCE INC 出版商地址: 360 PARK AVE SOUTH, NEW YORK, NY 10010-1710 USA ISSN: 0096-3003 DOI: 10.1016/j.amc.2004.10.084 29 字符的来源出版物名称缩写: APPL MATH COMPUT ISO 来源文献出版物名称缩写: Appl. Math. Comput. 来源文献页码计数: 12 学科类别: Mathematics, Applied ISI 文献传递号: 979TR -------------------------------------------------------------------------------显示 68 条,共 136 条 作者: Cheng, W; Sun, YF 编者: Wang, L; Jin, Y 标题: GSMA: A structural matching algorithm for schema matching in data warehousing 来源出版物: FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 3614: 408-411 Part 2 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Conference on Fuzzy Systems and Knowledge Discovery 会议日期: AUG 27-29, 2005 会议地点: Changsha, PEOPLES R CHINA 会议赞助商: Xiangtan Univ.; IEEE Circuits & Syst Soc.; IEEE Computat IntelligenceSoc.; IEEE Control Syst Soc.; Int Neural Network Soc.; European Neural Network Soc.; Chinese Assoc Artifiical Intelligence.; Japanese Neural Network Soc.; Int Fuzzy Syst Assoc.; Asia-Pacific Neural Network Assembly.; Fuzzy Math & Syst Assoc Chine.; Hunan Comp Federat. 摘要: Schema matching, the problem of finding semantic correspondences between elements of source and warehouse schemas, plays a key role in data warehousing. Currently, schema mapping is largely determined manually by domain experts, thus a labor-intensive process. In this paper, we propose a structural matching algorithm based on semantic similarity propagation. Experimental results on several real-world domains are presented, and show that the algorithm discovers semantic mappings with a high degree of accuracy. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Cheng, W, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 8 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28331-5 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 4 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDA17 -------------------------------------------------------------------------------显示 69 条,共 136 条 作者: Zheng, QH; Qian, YT; Yao, M 编者: Wang, L; Jin, Y 标题: Non-deterministic event correlation based on C-F model 来源出版物: FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 3614: 1107-1117 Part 2 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Conference on Fuzzy Systems and Knowledge Discovery 会议日期: AUG 27-29, 2005 会议地点: Changsha, PEOPLES R CHINA 会议赞助商: Xiangtan Univ.; IEEE Circuits & Syst Soc.; IEEE Computat IntelligenceSoc.; IEEE Control Syst Soc.; Int Neural Network Soc.; European Neural Network Soc.; Chinese Assoc Artifiical Intelligence.; Japanese Neural Network Soc.; Int Fuzzy Syst Assoc.; Asia-Pacific Neural Network Assembly.; Fuzzy Math & Syst Assoc Chine.; Hunan Comp Federat. KeyWords Plus: FAULT IDENTIFICATION; COMMUNICATION-NETWORKS 摘要: This paper proposes a non-deterministic event correlation technique for diagnosis problem of end-to-end service in network, which uses an event - fault model based on path domain of events. The technique utilizes a refined heuristic approach to create and update fault hypotheses that can explain these events received by system, and computes these hypotheses' belief by C-F model method. The result of event correlation is the hypothesis with maximum belief. Simulation shows this approach can get a high accuracy even in the case of low observability events ratio. 地址: Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci, Hangzhou, Zhejiang, Peoples R China; Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100864, Peoples R China 通讯作者地址: Zheng, QH, Zhejiang Univ, Computat Intelligence Res Lab, Coll Comp Sci, Hangzhou, Zhejiang, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 11 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28331-5 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 11 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDA17 -------------------------------------------------------------------------------显示 70 条,共 136 条 作者: Jin, H; Wang, HG; Wang, H; Wang, DL 编者: Wang, L; Jin, Y 标题: Scheduling design of controllers with fuzzy deadline 来源出版物: FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 1, PROCEEDINGS, 3613: 861-864 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Conference on Fuzzy Systems and Knowledge Discovery 会议日期: AUG 27-29, 2005 会议地点: Changsha, PEOPLES R CHINA 会议赞助商: Xiangtan Univ.; IEEE Circuits & Syst Soc.; IEEE Computat IntelligenceSoc.; IEEE Control Syst Soc.; Int Neural Network Soc.; European Neural Network Soc.; Chinese Assoc Artifiical Intelligence.; Japanese Neural Network Soc.; Int Fuzzy Syst Assoc.; Asia-Pacific Neural Network Assembly.; Fuzzy Math & Syst Assoc Chine.; Hunan Comp Federat. 摘要: Because some timing-constraints of a controller task may be not determined as a real-time system engineer thinks of, its scheduling with uncertain attributes can not be usually and simply dealt with according to classic manners used in real-time systems. The model of a controller task with fuzzy deadline and its scheduling are studied. The dedication concept and the scheduling policy of largest dedication first are proposed first. Simulation shows that the scheduling of controller tasks with fuzzy deadline can be implemented by using the proposed method, whilst the control performance coat gets guaranteed. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Jin, H, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 6 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28312-9 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 4 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BDA15 -------------------------------------------------------------------------------显示 71 条,共 136 条 作者: Sun, LM; Yan, TX; Bi, YZ; Zhu, HS 编者: Huang, DS; Zhang, XP; Huang, GB 标题: A self-adaptive energy-aware data gathering mechanism for wireless sensor networks 来源出版物: ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 3645: 588-597 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Intelligent Computing 会议日期: AUG 23-26, 2005 会议地点: Hefei, PEOPLES R CHINA 会议赞助商: Inst Intelligent Machines.; Univ Sci Technol.; IEEE Computat Intelligence Soc.; Hong Kong Computat Intelligence Chapter. 摘要: Sensor networks are composed of a large number of densely deployed sensors. The sensor nodes are self-organized and form an ad hoc network. As the energy supply to sensor nodes is limited and cannot be replenished, energy efficiency is an important design consideration for sensor networks. We design and evaluate an energy efficient routing algorithm for data querying sensor networks that propagates routing instructions and build data paths by considering both the hop count to the sink node and the minimum residual energy of that path. The proposed Dynamic Energy Aware Routing (DEAR) algorithm can effectively choose a data path with low energy consumption and high residual energy. The simulation results show that DEAR can prolong the lifetime of networks compared with Directed Diffusion, Minimum Transmission Energy routing and Energy Aware Routing. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Sun, LM, Chinese Acad Sci, Inst Software, POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 12 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28227-0 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BDC10 -------------------------------------------------------------------------------显示 72 条,共 136 条 作者: Wang, MS; Kwong, CP 标题: On multivariate polynomial matrix factorization problems 来源出版物: MATHEMATICS OF CONTROL SIGNALS AND SYSTEMS, 17 (4): 297-311 OCT 2005 语言: English 文献类型: Article 作者关键词: multidimensional systems; multivariate polynomial matrices; zero left prime; minor left prime; reduced minors; matrix factorizations KeyWords Plus: 2-D SYSTEMS-THEORY; PRIMENESS 摘要: This paper studies the multivariate polynomial matrix factorization problems which have applications to multidimensional systems theory and signal processing. We first extract an algorithm from Pommaret's proof of the Lin-Bose conjecture. Then we simplify our algorithm, and prove a theorem which gives a sufficient and necessary condition for a multivariate polynomial matrix to have an minor left prime (MLP) factorization. Examples are given to illustrate the effectiveness of this algorithm. Our results hold for any coefficient field and thus have a wide range of applications. 地址: Chinese Acad Sci, Inst Software, Informat Secur Lab, Beijing 100080, Peoples R China; Chinese Univ Hong Kong, Dept Automat & Comp Aided Engn, Shatin, Hong Kong, Peoples R China 通讯作者地址: Wang, MS, Chinese Acad Sci, Inst Software, Informat Secur Lab, POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 18 被引频次: 3 出版商: SPRINGER LONDON LTD 出 版 商 地 址 : SWEETAPPLE HOUSE CATTESHALL ROAD, GODALMING GU7 3DJ, SURREY, ENGLAND ISSN: 0932-4194 DOI: 10.1007/s00498-005-0155-6 29 字符的来源出版物名称缩写: MATH CONTROL SIGNAL SYST ISO 来源文献出版物名称缩写: Math. Control Signal Syst. 来源文献页码计数: 15 学科类别: Automation & Control Systems; Engineering, Electrical & Electronic; Mathematics, Interdisciplinary Applications ISI 文献传递号: 976GV -------------------------------------------------------------------------------- 显示 73 条,共 136 条 作者: Jiao, L; Huang, HJ; Cheung, TY 标题: Property-preserving composition by place merging 来源出版物: JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 14 (4): 793-812 AUG 2005 语言: English 文献类型: Article 作者关键词: composition; Petri nets; place merging; property preservation; verification KeyWords Plus: PETRI NETS; LIVENESS 摘 要 : Place merging is an important technique of Petri nets to composite different components/subsystems into a large system. However, it is a difficult and complex task to guarantee that the composite large system can preserve desired properties. This paper avoids the verification process by a property-preservation place-merging approach. The strategy used in this paper is to require such a composition to preserve these desirable properties (including liveness and boundedness) of the components in the resulting system. Meanwhile, this paper also investigates one kind of decompositions in terms of places, some conditions are presented under which if the large system possesses some properties, then the resulting components also preserve the desirable properties without the need of further verification. An application example is given to illustrate our method and some main results. 地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China; Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci & Informat Technol, Shenzhen, Peoples R China; City Polytech Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Jiao, L, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 25 被引频次: 3 出版商: WORLD SCIENTIFIC PUBL CO PTE LTD 出版商地址: 5 TOH TUCK LINK, SINGAPORE 596224, SINGAPORE ISSN: 0218-1266 29 字符的来源出版物名称缩写: J CIRCUITS SYSTEMS COMP ISO 来源文献出版物名称缩写: J. Circuits Syst. Comput. 来源文献页码计数: 20 学科类别: Computer Science, Hardware & Architecture; Engineering, Electrical & Electronic ISI 文献传递号: 975ZJ -------------------------------------------------------------------------------显示 74 条,共 136 条 作者: Zhang, GQ; Jiang, Y 标题: On an open problem of Amadio and Curien: The finite antichain condition 来源出版物: INFORMATION AND COMPUTATION, 202 (1): 87-103 OCT 10 2005 语言: English 文献类型: Article KeyWords Plus: CARTESIAN CLOSED CATEGORY; STABLE DOMAINS 摘要: More than a dozen years ago, Amadio [Bifinite domains: stable case, in: Lecture Notes in Computer Science, vol. 530,1991, pp. 16-33] (see Amadio and Curien, Domains and Lambda-Calculi, Cambridge Tracts in Theoretical Computer Science, vol. 46, Cambridge University Press, 1998 as well) raised the question of whether the category of stable bifinite domains of Amadio-Droste [R.M. Amadio, Bifinite domains: stable case, in: Lecture Notes in-Computer Science, vol. 530,1991, pp. 16-33; M. Droste, On stable domains, Theor. Comput. Sci. 111 (1993) 89-101; M. Droste, Cartesian closed categories of stable domains for polymorphism, Preprint, Universitat GHS Essen] is the largest cartesian closed full sub-category of the category of omega-algebraic meet-cpos with stable functions. An affirmative solution to this problem has two major steps: (1) Show that for any omega-algebraic meet-cpo D, if all higher-order stable function spaces built from D are omega-algebraic, then D is finitary (i.e., it satisfies the so-called axiom I); (2) Show that for any omega-algebraic meet-cpo D, if D violates MIinfinity, then [D -> D] violates either M or I. We solve the first part of the problem in this paper, i.e., for any omega-algebraic meet-cpo D, if the stable function space [D -> D] satisfies M., then D is finitary. Our notion of (mub, meet)-closed set, which is introduced for step 1, will also be used for treating some example cases in step 2. (c) 2005 Elsevier Inc. All rights reserved. 地址: Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhang, GQ, Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 22 被引频次: 2 出版商: ACADEMIC PRESS INC ELSEVIER SCIENCE 出版商地址: 525 B ST, STE 1900, SAN DIEGO, CA 92101-4495 USA ISSN: 0890-5401 DOI: 10.1016/j.ic.2005.06.001 29 字符的来源出版物名称缩写: INFORM COMPUT ISO 来源文献出版物名称缩写: Inf. Comput. 来源文献页码计数: 17 学科类别: Computer Science, Theory & Methods; Mathematics, Applied ISI 文献传递号: 970CB -------------------------------------------------------------------------------显示 75 条,共 136 条 作者: Liu, YQ; Zhu, HB; Liu, XH; Wu, EH 标题: Real-time simulation of physically based on-surface flow 来源出版物: VISUAL COMPUTER, 21 (8-10): 727-734 Sp. Iss. SI SEP 2005 语言: English 文献类型: Proceedings Paper 会议标题: 13th Pacific Conference on Computer Graphics and Applications 会议日期: OCT 12-14, 2005 会议地点: Macao, PEOPLES R CHINA 作者关键词: on-surface flow; Navier-Stokes equations; wetting; real time 摘要: Although many papers have been published in the field of fluid simulation, little attention has been paid to on-surface flow involving wetting and stain transportation as well as erosion and deposition phenomena. In this paper, we introduce nonzero divergence in the mass equation of Navier-Stokes equations to simulate water penetration from on-surface flow into substrate material. Also, the volume of fluid method is adopted to track the free surface. With a computation of the actual amount of absorbed water we render the wetting effects with fully dry and fully wet texture images simultaneously. Using our model, the on-surface flow that accompanies water absorption can be simulated realistically in real time with OpenGL preview rendering. Experimental results illustrate that our model can be widely applied to solve various problems related to on-surface flow. 地址: Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, Macao, Peoples R China; Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100864, Peoples R China 通讯作者地址: Liu, YQ, Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, Macao, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 16 被引频次: 8 出版商: SPRINGER 出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA ISSN: 0178-2789 DOI: 10.1007/s00371-005-0314-2 29 字符的来源出版物名称缩写: VISUAL COMPUT ISO 来源文献出版物名称缩写: Visual Comput. 来源文献页码计数: 8 学科类别: Computer Science, Software Engineering ISI 文献传递号: 964CX -------------------------------------------------------------------------------显示 76 条,共 136 条 作者: Qing, SH; Li, GC 标题: A formal model of fair exchange protocols 来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (4): 499-512 AUG 2005 语言: English 文献类型: Article 作者关键词: events; local causal relation; local temporal relation; global relation; exchanged item; security goals 摘要: Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability, etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack. Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties. 地址: Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol, Beijing 100080, Peoples R China; Beijing Zhongke Ansheng Corp Informat Technol, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Qing, SH, Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 10 被引频次: 2 出版商: SCIENCE PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1009-2757 DOI: 10.1360/122004-30 29 字符的来源出版物名称缩写: SCI CHINA SER F ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci. 来源文献页码计数: 14 学科类别: Computer Science, Information Systems ISI 文献传递号: 964FW -------------------------------------------------------------------------------显示 77 条,共 136 条 作者: Lo, SH; Wang, WX 标题: Generation of tetrahedral mesh of variable element size by sphere packing over an unbounded 3D domain 来源出版物: COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 194 (48-49): 5002-5018 2005 语言: English 文献类型: Article 作者关键词: unbounded 3D domain; tetrahedral mesh; Delaunay triangulation; frontal surface; sphere packing; descend by rotation KeyWords Plus: ADVANCING-FRONT APPROACH; DELAUNAY TRIANGULATION; NONOBTUSE TRIANGULATION; QUADRILATERAL MESH; GRID GENERATION; PLANAR DOMAINS; CIRCLE PACKING; OPTIMIZATION; ALGORITHM; BOUNDARY 摘要: This paper describes an algorithm for the generation of tetrahedral mesh of specified element size over an unbounded three-dimensional domain. Starting from an arbitrary point in space (defined as the origin) and guided by the concept of advancing front, spheres of size compatible with the specified element size are packed tightly together one by one to form a cluster of spheres of different sizes. The compactness of the cluster of spheres is achieved by packing spheres at a site closest to the origin in a densest manner with tangent but no overlapping with as many other spheres as possible. In view of these criteria, a rotational mechanism between spheres is innovated, which allows the newly inserted sphere to follow the path by rotation between existing spheres until the lowest point is reached. The centres of the packing spheres provide ideal locations for Delaunay point insertion to form a triangulation of tetrahedral elements of size compatible with the specified value. Spheres of random size distribution or of size specified by a node spacing function are packed by the proposed algorithm. In all test examples, high-quality tetrahedral elements of size consistent with the specified node spacing are generated. The process is fast and robust, and the time complexity for mesh generation is expected to be almost linear; however, in the present implementation, a quasi-linear time relationship is observed as a search for the nearest node on the front is proposed in the sphere packing process. The memory requirement has been kept to a minimum as no additional data structure other than the adjacency relationship of the tetrahedral elements as required by the Delaunay triangulation is stored. The structure of the advancing frontal surface needs not be explicitly constructed nor updated as it is simply not required in the sphere packing process. (c) 2005 Elsevier B.V. All rights reserved. 地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China 通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 46 被引频次: 4 出版商: ELSEVIER SCIENCE SA 出版商地址: PO BOX 564, 1001 LAUSANNE, SWITZERLAND ISSN: 0045-7825 DOI: 10.1016/j.cma.2004.11.022 29 字符的来源出版物名称缩写: COMPUT METHOD APPL MECH ENG ISO 来源文献出版物名称缩写: Comput. Meth. Appl. Mech. Eng. 来源文献页码计数: 17 学 科 类 别 : Engineering, Multidisciplinary; Mathematics, Interdisciplinary Applications; Mechanics ISI 文献传递号: 964EE -------------------------------------------------------------------------------显示 78 条,共 136 条 作者: He, Y; Zhang, Y; Guo, J 编者: Lu, X; Zhao, W 标题: On mitigating network partitioning in peer-to-peer massively multiplayer games 来源出版物: NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 3619: 481-490 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会 议 标 题 : 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005) 会议日期: AUG 02-04, 2005 会议地点: Zhangjiajie, PEOPLES R CHINA 会议赞助商: China Comp Federat.; IEEE Comp Soc Beijing Chapter.; Hunan Comp Soc.; IEEE TC Distributed Proc. 摘要: Recently, peer-to-peer infrastructure has been proposed to support massively multiplayer games in the literature. However, when underlying network partitions due to network outages, the game world will partition into several parallel game worlds and it is difficult and costly to merge them when the network partitions disappear. Existing approaches resort to a centralized server to arbitrate. Aiming at mitigating the effects brought by network partitions, we propose a fully distributed algorithm based on state-stack matching. Our theoretical analysis and numerical results show that our approach can resolve the merging issue at the least loss of game states with high probability. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ Toronto, Dept Elect & Comp Engn, Toronto, ON, Canada 通讯作者地址: He, Y, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 5 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28102-9 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCT45 -------------------------------------------------------------------------------显示 79 条,共 136 条 作者: Yan, TX; Bi, YZ; Sun, LM; Zhu, HS 编者: Lu, X; Zhao, W 标题: Probability based dynamic load-balancing tree algorithm for wireless sensor networks 来源出版物: NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 3619: 682-691 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会 议 标 题 : 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005) 会议日期: AUG 02-04, 2005 会议地点: Zhangjiajie, PEOPLES R CHINA 会议赞助商: China Comp Federat.; IEEE Comp Soc Beijing Chapter.; Hunan Comp Soc.; IEEE TC Distributed Proc. 摘要: Load balance can reduce hot spots, maintain network connectivity and prolong lifetime of wireless sensor networks. In large scale and randomly deployed wireless sensor networks, the energy consumption is sharply uneven among sensor nodes. We propose a new routing mechanism to achieve load balance through constructing a dynamic load-balancing tree (DLBT) in wireless sensor networks. The DLBT structure is a tree-like topology with a critical character that one node may have more than one candidates of parent node. DLBT achieves load balance by adjusting the forwarding probability to each parent candidate according to its traffic burden. We also provide a distributed algorithm to construct and maintain the DLBT structure. Simulation results show that our DLBT routing provides much higher load balance than the shortest path tree mechanism. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Yan, TX, Chinese Acad Sci, Inst Software, POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 13 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28102-9 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCT45 -------------------------------------------------------------------------------显示 80 条,共 136 条 作者: Zhou, H; Wang, YJ; Wang, Q 编者: Lu, X; Zhao, W 标题: Measuring Internet bottlenecks: Location, capacity, and available bandwidth 来 源 出 版 物 : NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 3619: 1052-1062 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会 议 标 题 : 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005) 会议日期: AUG 02-04, 2005 会议地点: Zhangjiajie, PEOPLES R CHINA 会议赞助商: China Comp Federat.; IEEE Comp Soc Beijing Chapter.; Hunan Comp Soc.; IEEE TC Distributed Proc. KeyWords Plus: DYNAMICS 摘要: The ability to measure the location, capacity and available bandwidth of bottleneck in end-to-end network path is of major importance in congestion control, streaming applications, quality-of-service, overlay network and traffic engineering. Existing algorithms either fail to measure 0 the three bottleneck properties, or generate a large amount of probing packets. In addition, they often require deployment in both end hosts. A novel technique, called BNeck, is presented in this paper. It allows end users to efficiently and accurately measure the three bottleneck properties. The key idea of BNeck is that the per-link dispersion of probing packet train can be applied to measure the properties of congested links. The accuracy and efficiency of BNeck have been verified with elaborately designed simulation. The simulation result indicates that various applications can adopt BNeck to probe for the three bottleneck properties without loss of performance. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, Key Lab Comp Sci, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Zhou, H, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 10 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28102-9 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 11 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCT45 -------------------------------------------------------------------------------显示 81 条,共 136 条 作者: Wu, FG; Sun, FC; Sun, ZQ; Zheng, CW 标题: A neuro-fuzzy controller for networked control systems via a discrete-time jump fuzzy system approach 来 源 出 版 物 : DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 1: 417-421 Sp. Iss. SI 2005 语言: English 文献类型: Proceedings Paper 会 议 标 题 : 4th International Conference on Engineering Applications and Computational Algorithms 会议日期: JUL 27-29, 2005 会议地点: Guelph, CANADA 会议赞助商: DCDIS. 会议主办方: Univ Guelph KeyWords Plus: OUTPUT-FEEDBACK CONTROL; H-INFINITY-CONTROL; LINEAR-SYSTEMS; NONLINEAR-SYSTEMS; CONTROL DESIGN; LMI APPROACH; STABILITY; STABILIZABILITY; PARAMETERS 摘要: The network delay and packets dropout in the networked control systems (NCSs) can degrade the system performance or stability. Aiming at the stochastic but bounded delay and packets dropout in the NCSs, the discrete-time jump fuzzy system is proposed, which implements the modeling of the networked control system with stochastic but bounded delay and packets dropout. Based on this model, a neuro-fuzzy controller is designed with three parts: a guaranteed cost state-feedback controller, an adaptive neuro-fuzzy inference system (ANFIS) predictor and a fuzzy controller. Simulation example is carried out to the correctness and the validity of the proposed theory. 地址: Tsing Hua Univ, Dept Comp Sci & Technol, Natl Key Lab Intelligent Technol & Syst, Beijing 100084, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Wu, FG, Tsing Hua Univ, Dept Comp Sci & Technol, Natl Key Lab Intelligent Technol & Syst, Beijing 100084, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 24 被引频次: 0 出版商: WATAM PRESS 出版商地址: C/O DCDIS JOURNAL, 317 KAREN PLACE, WATERLOO, ONTARIO N2L 6K8, CANADA ISSN: 1492-8760 29 字符的来源出版物名称缩写: DYN CONT DISCR IMP SYST SER B ISO 来源文献出版物名称缩写: Dyn. Contin. Discret. Impuls. Syst. Ser. B-Appl. Algorithms 来源文献页码计数: 5 学科类别: Mathematics, Applied ISI 文献传递号: 962FM -------------------------------------------------------------------------------显示 82 条,共 136 条 作者: Lo, SH; Wang, WX 标题: Generation of finite element mesh with variable size over an unbounded 2D domain 来源出版物: COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 194 (45-47): 4668-4684 2005 语言: English 文献类型: Article 作者关键词: unbounded domain; triangular mesh generation; advancing front; circle packing; neighbour tracing; boundary recovery KeyWords Plus: ADVANCING-FRONT APPROACH; BUBBLE PACKING METHOD; DELAUNAY TRIANGULATION; NONOBTUSE TRIANGULATION; QUADRILATERAL MESH; GRID GENERATION; CIRCLE PACKING; PLANAR DOMAINS; SURFACES; ALGORITHM 摘要: With the advance of the finite element, general fluid dynamic and traffic flow problems with arbitrary boundary definition over an unbounded domain are tackled. This paper describes an algorithm for the generation of finite element mesh of variable element size over an unbounded 2D domain by using the advancing front circle packing technique. Unlike the conventional frontal method, the procedure does not start from the object boundary but starts from a convenient point within an open domain. The sequence of construction of the packing circles is determined by the shortest distance from the fictitious centre in such a way that the generation front is more or less a circular loop with occasional minor concave parts due to element size variation. As soon as a circle is added to the generation front, finite elements are directly generated by properly connecting frontal segments with the centre of the new circle. In contrast to other mesh generation schemes, the domain boundary is not considered in the process of circle packing, this reduces a lot of geometrical checks for intersection with frontal segments, and a linear time complexity for mesh generation can be achieved. In case the boundary of the domain is needed, simply generate an unbounded mesh to cover the entire object. As the element adjacency relationship of the mesh has already been established in the circle packing process, insertion of boundary segments by neighbour tracing is fast and robust. Details of such a boundary recovery procedure are described, and practical meshing problems are given to demonstrate how physical objects are meshed by the unbounded meshing scheme followed by the insertion of domain boundaries. (c) 2005 Elsevier B.V. All rights reserved. 地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China 通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 34 被引频次: 3 出版商: ELSEVIER SCIENCE SA 出版商地址: PO BOX 564, 1001 LAUSANNE, SWITZERLAND ISSN: 0045-7825 DOI: 10.1016/j.cma.2004.12.011 29 字符的来源出版物名称缩写: COMPUT METHOD APPL MECH ENG ISO 来源文献出版物名称缩写: Comput. Meth. Appl. Mech. Eng. 来源文献页码计数: 17 学 科 类 别 : Engineering, Multidisciplinary; Mathematics, Interdisciplinary Applications; Mechanics ISI 文献传递号: 959QP -------------------------------------------------------------------------------显示 83 条,共 136 条 作者: Zhang, J 编者: Nieuwenhuis, R 标题: Computer search for counterexamples to Wilkie's identity 来源出版物: AUTOMATED DEDUCTION - CADE-20, PROCEEDINGS, 3632: 441-451 2005 丛书标题: LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 语言: English 文献类型: Proceedings Paper 会议标题: 20th International Conference on Automated Deduction (CADE-20) 会议日期: JUL 22-27, 2005 会议地点: Tallinn, ESTONIA KeyWords Plus: ALGEBRAS 摘要: Tarski raised the High School Problem, i.e., whether a set of 11 identities (denoted by HSI) serves as a basis for all the identities which hold for the natural numbers. It was answered by Wilkie in the negative, who gave an identity which holds for the natural numbers but cannot be derived from HSI. This paper describes some computer searching efforts which try to find a small model of HSI rejecting Wilkie's identity. The experimental results show that such a model has at least 11 elements. Some experiences are reported, and some issues are discussed. 地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100864, Peoples R China 通讯作者地址: Zhang, J, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100864, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 14 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-28005-7 29 字符的来源出版物名称缩写: LECT NOTE ARTIF INTELL 来源文献页码计数: 11 学科类别: Computer Science, Artificial Intelligence ISI 文献传递号: BCS47 -------------------------------------------------------------------------------显示 84 条,共 136 条 作者: Cooper, SB; Li, AS; Sorbi, A; Yang, Y 标题: Bounding and nonbounding minimal pairs in the enumeration degrees 来源出版物: JOURNAL OF SYMBOLIC LOGIC, 70 (3): 741-766 SEP 2005 语言: English 文献类型: Article 摘要: We show that every nonzero Delta(2)(0) e-degree bounds a minimal pair. On the other hand. there exist Sigma(2)(0) e-degrees which bound no minimal pair. 地址: Univ Leeds, Sch Math, Dept Pure Math, Leeds LS2 9JT, W Yorkshire, England; Acad Sinica, Inst Software, Beijing 100080, Peoples R China; Dipartimento Sci Matemat & Informaz Roberto Magar, I-53100 Siena, Italy; Natl Univ Singapore, Fac Sci, Dept Math, Singapore 119260, Singapore 通讯作者地址: Cooper, SB, Univ Leeds, Sch Math, Dept Pure Math, Leeds LS2 9JT, W Yorkshire, England. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 10 被引频次: 4 出版商: ASSOC SYMBOLIC LOGIC, INC 出版商地址: 124 RAYMOND AVENUE, POUGHKEEPSIE, NY 12604-0001 USA ISSN: 0022-4812 29 字符的来源出版物名称缩写: J SYMB LOGIC ISO 来源文献出版物名称缩写: J. Symb. Log. 来源文献页码计数: 26 学科类别: Mathematics ISI 文献传递号: 957WB -------------------------------------------------------------------------------显示 85 条,共 136 条 作者: Wang, ST; Zhu, JG; Chung, FL; Lin, Q; Hu, DW 标题: Theoretically optimal parameter choices for support vector regression machines with noisy input 来源出版物: SOFT COMPUTING, 9 (10): 732-741 OCT 2005 语言: English 文献类型: Article 作者关键词: regularized linear regression; support vectors; Huber loss functions; norm-r loss functions 摘要: With the evidence framework, the regularized linear regression model can be explained as the corresponding MAP problem in this paper, and the general dependency relationships that the optimal parameters in this model with noisy input should follow is then derived. The support vector regression machines Huber-SVR and Norm-r r-SVR are two typical examples of this model and their optimal parameter choices are paid particular attention. It turns out that with the existence of the typical Gaussian noisy input, the parameter mu in Huber-SVR has the linear dependency with the input noise, and the parameter r in the r-SVR has the inversely proportional to the input noise. The theoretical results here will be helpful for us to apply kernel-based regression techniques effectively in practical applications. 地址: So Yangtze Univ, Sch Informat Engn, Wuxi, Peoples R China; Nanjing Univ Sci & Tech, Dept Comp Sci & Engn, Nanjing, Peoples R China; HongKong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China; Natl Def Univ Sci & Tech, Sch Automat, Changsha, Peoples R China; Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China 通讯作者地址: Wang, ST, So Yangtze Univ, Sch Informat Engn, Wuxi, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 15 被引频次: 4 出版商: SPRINGER 出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA ISSN: 1432-7643 DOI: 10.1007/s00500-004-406-3 29 字符的来源出版物名称缩写: SOFT COMPUT ISO 来源文献出版物名称缩写: Soft Comput. 来源文献页码计数: 10 学 科 类 别 : Computer Science, Artificial Intelligence; Computer Science, Interdisciplinary Applications ISI 文献传递号: 954LZ -------------------------------------------------------------------------------显示 86 条,共 136 条 作者: Zheng, CW; Li, L; Xu, FJ; Sun, FH; Ding, MY 标题: Evolutionary route planner for unmanned air vehicles 来源出版物: IEEE TRANSACTIONS ON ROBOTICS, 21 (4): 609-620 AUG 2005 语言: English 文献类型: Article 作者关键词: evolutionary computation; route planning; unmanned air vehicles (UAVs) KeyWords Plus: NAVIGATION; ALGORITHM 摘要: Based on evolutionary computation, a novel real-timeroute planner for unmanned air vehicles is presented. In the evolutionary route planner, the individual candidates are evaluated with respect to the workspace so that the computation of the configuration space is not required. The planner incorporates domain-specific knowledge, can handle unforeseeable changes of the environment, and take into account different kinds of mission constraints such as minimum route leg length and flying altitude, maximum turning angle, and fixed approach vector to goal position. Furthermore, the novel planner can be used to plan routes both for a singled vehicle and for multiple ones. With Digital Terrain Elevation Data, the resultant routes can increase the surviving probability of the vehicles using the terrain masking effect. 地址: Chinese Acad Sci, Inst Software, Gen Software Lab, Beijing 100080, Peoples R China; Tsinghua Univ, Dept Comp Sci & Engn, State Key Lab Intelligent Technol & Syst, Beijing 100084, Peoples R China; Huazhong Univ Sci & Technol, Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China 通讯作者地址: Zheng, CW, Chinese Acad Sci, Inst Software, Gen Software Lab, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 26 被引频次: 14 出版商: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 出版商地址: 445 HOES LANE, PISCATAWAY, NJ 08855 USA ISSN: 1552-3098 DOI: 10.1109/TRO.2005.844684 29 字符的来源出版物名称缩写: IEEE TRANS ROBOT ISO 来源文献出版物名称缩写: IEEE Trans. Robot. 来源文献页码计数: 12 学科类别: Robotics ISI 文献传递号: 954LU -------------------------------------------------------------------------------显示 87 条,共 136 条 作者: Li, GH; Xu, Y; Chen, CP; Liu, ZH 标题: On connected [g, f+1]-factors in graphs 来源出版物: COMBINATORICA, 25 (4): 393-405 2005 语言: English 文献类型: Article KeyWords Plus: K-FACTORS; EXISTENCE 摘要: Let G = (V(G),E(G)) be a graph with vertex set V(G) and edge set E(G), and g and f two positive integral functions from V(G) to Z(+) - {1} such that g(v) <= f (v) <= d(G)(v) for all v G V(G), where dG (V) is the degree of the vertex v. It is shown that every graph G, including both a [g, f]-factor and a hamiltonian path, contains a connected [g, f + 1]-factor. This result also extends Kano's conjecture concerning the existence of connected [k, k + 1]-factors in graphs. 地址: Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Univ Georgia, CSBL, Dept Biochem & Mol Biol, Athens, GA 30605 USA; Chinese Acad Sci, Inst Math & Syst Sci, Beijing 100080, Peoples R China 通讯作者地址: Li, GH, Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 7 被引频次: 3 出版商: SPRINGER 出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA ISSN: 0209-9683 29 字符的来源出版物名称缩写: COMBINATORICA ISO 来源文献出版物名称缩写: Combinatorica 来源文献页码计数: 13 学科类别: Mathematics ISI 文献传递号: 955TG -------------------------------------------------------------------------------显示 88 条,共 136 条 作者: Li, AS 编者: Cooper, SB; Lowe, B; Torenvliet, L 标题: The low splitting theorem in the difference hierarchy 来源出版物: NEW COMPUTATIONAL PARADIGMS, 3526: 287-296 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st Conference on Computability in Europe (CiE 2005) 会议日期: JUN 08-12, 2005 会议地点: Amsterdam, NETHERLANDS KeyWords Plus: RECURSIVELY ENUMERABLE DEGREES; MINIMAL DEGREES; DEGREES LESS; DRE DEGREES; RE DEGREES; DENSE 摘要: It is shown that for any 2-computably enumerable Turing degrees a, l, if l' = 0', and l < a, then there are 2-computably enumerable Turing degrees x(0), x(1) such that both l < x(0), x(1) < a and x(0) boolean OR x(1) = a hold, extending the Robinson low splitting theorem for the computably enumerable degrees to the difference hierarchy. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Li, AS, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 20 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-26179-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCP14 -------------------------------------------------------------------------------显示 89 条,共 136 条 作者: Yin, XL; Zhao, XX 标题: The computations of Einstein-Kahler metric of Cartan-Hartogs domain 来源出版物: SCIENCE IN CHINA SERIES A-MATHEMATICS, 48: 365-376 Suppl. S MAY 2005 语言: English 文献类型: Article 作者关键词: Cartan-Hartogs domain; Einstein-Kdhier; holomorphic sectional curvature 摘要: In this paper, we compute the complete Einstein-Kahler metric with explicit formula for the Cartan-Hartogs domain of the fourth type in some cases. Under this metric the holomorphic sectional curvature is given, which intervenes between -2k and -1. This is the sharp estimate. 地址: Beijing Language & Culture Univ, Dept Comp Sci, Beijing 100083, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhao, XX, Beijing Language & Culture Univ, Dept Comp Sci, Beijing 100083, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 5 被引频次: 3 出版商: SCIENCE PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1006-9283 DOI: 10.1360/05za0030 29 字符的来源出版物名称缩写: SCI CHINA SER A ISO 来源文献出版物名称缩写: Sci. China Ser. A-Math. 来源文献页码计数: 12 学科类别: Mathematics, Applied; Mathematics ISI 文献传递号: 951DE -------------------------------------------------------------------------------显示 90 条,共 136 条 作者: Lo, SH; Wang, WX 标题: Generation of anisotropic mesh by ellipse packing over an unbounded domain 来源出版物: ENGINEERING WITH COMPUTERS, 20 (4): 372-383 AUG 2005 语言: English 文献类型: Article 作者关键词: unbounded domain; anisotropy; mesh generation; advancing front; ellipse packing; parametric surface KeyWords Plus: DELAUNAY TRIANGULATION; METRIC SPECIFICATIONS; PLANAR DOMAINS; SURFACES; INTERSECTION; ALGORITHM 摘要: With the advance of the finite element method, general fluid dynamic and traffic flow problems with arbitrary boundary definition over an unbounded domain are tackled. This paper describes an algorithm for the generation of anisotropic mesh of variable element size over an unbounded 2D domain by using the advancing front ellipse packing technique. Unlike the conventional frontal method, the procedure does not start from the object boundary but starts from a convenient point within an open domain. The sequence of construction of the packing ellipses is determined by the shortest distance from the fictitious centre in such a way that the generation front is more or less a circular loop with occasional minor concave parts due to element size variation. As soon as an ellipse is added to the generation front, finite elements are directly generated by properly connecting frontal segments with the centre of the new ellipse. Ellipses are packed closely and in contact with the existing ellipses by an iterative procedure according to the specified anisotropic metric tensor. The anisotropic meshes generated by ellipse packing can also be used through a mapping process to produce parametric surface meshes of various characteristics. The size and the orientation of the ellipses in the pack are controlled by the metric tensor as derived from the principal surface curvatures. In contrast to other mesh generation schemes, the domain boundary is not considered in the process of ellipse packing, this reduces a lot of geometrical checks for intersection between frontal segments. Five examples are given to show the effectiveness and robustness of anisotropic mesh generation and the application of ellipse packing to mesh generation over various curved surfaces. 地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China 通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 25 被引频次: 0 出版商: SPRINGER 出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA ISSN: 0177-0667 DOI: 10.1007/s00366-005-0317-7 29 字符的来源出版物名称缩写: ENG COMPUT ISO 来源文献出版物名称缩写: Eng. Comput. 来源文献页码计数: 12 学科类别: Computer Science, Interdisciplinary Applications; Engineering, Mechanical ISI 文献传递号: 951BE -------------------------------------------------------------------------------显示 91 条,共 136 条 作者: Wei, H; Luan, SM 标题: Ganglion-based balance design of multi-layer model and its watchfulness-keeping 来源出版物: JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 20 (4): 567-573 JUL 2005 语言: English 文献类型: Article 作者关键词: computer vision; receptive field; hierarchical neural network KeyWords Plus: VISION; SYSTEMS 摘要: An important problem of machine vision is the balance among the efficiency, accuracy and computation cost. The visual system of man can keep watchfulness to the perimeter of a visual field and subtly process information emerging in the center of the visual field at the same time. This kind of requirement assignment of computation can virtually case the demand of hardware both in quantity and complexity. Therefore designing an artificial model based on biological mechanism is an effective approach. In this paper a multi-layer neural model is designed based on the multi-scale receptive fields of ganglions in retina. The model can keep watch on the periphery part of a scene while processing the center information of the scene. And why it can-balance the hardware complexity, processing precision and computational intensity is analyzed. An experiment is done to test the model's sensitivity in watchfulness keeping and its efficiency and veracity in environment sampling. This model may provide valuable inspiration in the implementation of real-time processing and the avoidance of expensive computation cost in machine vision. 地址: Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Brain Sci Res Ctr, Dept Comp Sci,Lab Algorithm Cognit Model, Shanghai 200433, Peoples R China; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing 100080, Peoples R China 通讯作者地址: Wei, H, Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Brain Sci Res Ctr, Dept Comp Sci,Lab Algorithm Cognit Model, Shanghai 200433, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 18 被引频次: 0 出版商: SCIENCE PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1000-9000 29 字符的来源出版物名称缩写: J COMPUT SCI TECHNOL ISO 来源文献出版物名称缩写: J. Comput. Sci. Technol. 来源文献页码计数: 7 学 科 类 别 : Computer Science, Hardware & Architecture; Computer Science, Software Engineering ISI 文献传递号: 948JP -------------------------------------------------------------------------------显示 92 条,共 136 条 作者: Dai, ZD; Imamura, K; Yang, JH 编者: Helleseth, T; Sarwate, D; Song, HY; Yang, K 标题: Asymptotic behavior of normalized linear complexity of multi-sequences 来源出版物: SEQUENCES AND THEIR APPLICATIONS - SETA 2004, 3486: 129-142 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 3rd International Conference Sequences and Their Applications (SETA 2004) 会议日期: OCT 24-28, 2004 会议地点: Seoul, SOUTH KOREA KeyWords Plus: CONTINUED FRACTIONS 摘要: Asymptotic behavior of the normalized linear complexity Ls(n)/n of a multi-sequence s is studied in terms of its multidimensional continued fraction expansion, where Ls(n) is the linear complexity of the length n prefix of s and defined to be the length of the shortest multituple linear feedback shift register which generates the length n prefix of s. A formula for lim sup(n ->infinity) Ls(n)/n together with a lower bound, and a formula for lim inf(n ->infinity) Ls(n)/n together with an upper bound are given. A necessary and sufficient condition for the existence of lim(n ->infinity) Ls(n)/n is also given. 地址: Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China; Kyushu Inst Technol, Dept Comp Sci & Elect, Fukuoka 8208502, Japan; Chinese Acad Sci, Software Inst, Beijing 100080, Peoples R China 通讯作者地址: Dai, ZD, Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 9 被引频次: 8 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-26084-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 14 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCN33 -------------------------------------------------------------------------------显示 93 条,共 136 条 作者: Dai, ZD; Feng, XT; Yang, JH 编者: Helleseth, T; Sarwate, D; Song, HY; Yang, K 标题: Multi-continued fraction algorithm and generalized B-M algorithm over F-2* 来源出版物: SEQUENCES AND THEIR APPLICATIONS - SETA 2004, 3486: 339-354 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 3rd International Conference Sequences and Their Applications (SETA 2004) 会议日期: OCT 24-28, 2004 会议地点: Seoul, SOUTH KOREA KeyWords Plus: BERLEKAMP-MASSEY ALGORITHM; SHIFT-REGISTER SYNTHESIS 摘要: It is shown that the generalized Berlekamp-Massey algorithm (GBMA, in short) for solving the linear synthesis problem of a multi-sequence (r) under bar over F-2 can be obtained naturally from a special form of the multi-continued fraction algorithm, called the multi-strict continued fraction algorithm (m-SCFA, in short). Moreover, the discrepancy sequence in acting GBMA on (r) under bar is expressed explicitly by the data associated to the multi-strict continued fraction expansion C((r) under bar) which is obtained by applying m-SCFA on (r) under bar. As a consequence, a 1-1 correspondence between multi-sequences of any given length and certain multi-strict continued fractions is established. 地址: Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China; Chinese Acad Sci, Software Inst, Beijing 100049, Peoples R China 通讯作者地址: Dai, ZD, Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 7 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-26084-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 16 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCN33 -------------------------------------------------------------------------------显示 94 条,共 136 条 作者: Yang, L; Zuo, C; Wang, YG 编者: Wang, J; Liao, X; Yi, Z 标题: An effective two-stage neural network model and its application on flood loss prediction 来源出版物: ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 3498: 1010-1016 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Symposium on Neural Networks 会议日期: MAY 30-JUN 01, 2005 会议地点: Chongqing, PEOPLES R CHINA 会议赞助商: Chongqing Univ.; SW Normal Univ.; Chongqing Univ, Posts& Telecommun.; SW Agr Univ.; Chongqing Educ Coll.; Chinese Univ Hong Kong.; Asia Pacific Neural Network Assembly.; European Neural Network Soc.; IEEE Circuits & Syst Soc.; IEEE Computat Intelligence Soc.; Natl Nat Sci Fdn China.; K C Wong Educ Fdn Hong Kong. 摘要: In this study, a two-stage radial basis function neural network based model is employed to develop flood loss prediction model for insurance company. In the first stage, self-organizing map clustering is used to measuring the similarity of the input data, unlike k-means approach, number and centers of clusters can be determined dynamically and automatically. The Value-related Self Organizing Map (VSOM) is proposed to improve predicting accuracy for high loss subject. During the second stage, the weights from the hidden layer to output layer are determined by multivariate linear regression method. Simulation results show that the proposed approach can be applied successfully to build flood loss prediction models and provide higher accuracy and more direct decision support compared to current approaches. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Yang, L, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 6 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25914-7 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 7 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCN43 -------------------------------------------------------------------------------显示 95 条,共 136 条 作者: Xing, F; Guo, P 编者: Wang, J; Liao, X; Yi, Z 标题: Support vector regression for software reliability growth modeling and prediction 来源出版物: ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 1, PROCEEDINGS, 3496: 925-930 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 2nd International Symposium on Neural Networks 会议日期: MAY 30-JUN 01, 2005 会议地点: Chongqing, PEOPLES R CHINA 会议赞助商: Chongqing Univ.; SW Normal Univ.; Chongqing Univ, Posts& Telecommun.; SW Agr Univ.; Chongqing Educ Coll.; Chinese Univ Hong Kong.; Asia Pacific Neural Network Assembly.; European Neural Network Soc.; IEEE Circuits & Syst Soc.; IEEE Computat Intelligence Soc.; Natl Nat Sci Fdn China.; K C Wong Educ Fdn Hong Kong. KeyWords Plus: NETWORKS 摘要: In this work, we propose to apply support vector regression (SVR) to build software reliability growth model (SRCM). SRGM is an important aspect in software reliability engineering. Software reliability is the probability that a given software will be functioning without failure during a specified period of time in a specified environment. In order to obtain the better performance of SRGM, practical selection of parameter C for SVR is discussed in the experiments. Experimental results with the classical Sys1 and Sys3 SRGM data set show that the performance of the proposed SVR-based SRCM is better than conventional SRGMs and relative good prediction and generalization ability are achieved. 地址: Beijing Normal Univ, Dept Comp Sci, Beijing 100875, Peoples R China; Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China 通讯作者地址: Xing, F, Beijing Normal Univ, Dept Comp Sci, Beijing 100875, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 8 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25912-0 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCN38 -------------------------------------------------------------------------------显示 96 条,共 136 条 作者: Wu, P 标题: Analyzing interoperability of protocols using model checking 来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (3): 453-457 JUL 2005 语言: English 文献类型: Article 作者关键词: interoperability analysis and testing; model checking; conformance testing; protocol 摘要: In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies. 地址: Chinese Acad Sci, Grad Sch, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Wu, P, Chinese Acad Sci, Grad Sch, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China. 引用的参考文献数: 12 被引频次: 0 出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG 出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN, SHATIN, 00000, PEOPLES R CHINA ISSN: 1022-4653 29 字符的来源出版物名称缩写: CHINESE J ELECTRON ISO 来源文献出版物名称缩写: Chin. J. Electron. 来源文献页码计数: 5 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 945NP -------------------------------------------------------------------------------显示 97 条,共 136 条 作者: Zhang, M; Feng, DG 标题: A concurrency control algorithm in multi-version multilevel DBMS 来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (3): 467-471 JUL 2005 语言: English 文献类型: Article 作 者 关 键 词 : multilevel DBMS (data base management system); concurrency control; multi-version (MV); 1 copy serializable (1SR) 摘要: The conventional transaction concurrency control theory and mechanisms are challenged in the context of a multilevel DBMS (Data base management system). Not only the correctness of transaction processing, namely the serializability of the transaction histories, but also the security properties should be followed. These requirements include diminishing the timing covert channels and preventing the starving problem in high-level transactions' unlimited waiting. In this paper we present a timestamp order based concurrency control algorithm that produce serializable histories by correctly combining all the 1SR histories generated by different level schedulers. We also provide an implementation scheduler algorithm based on snapshots. This approach is free from timing covert channels and transactions of different security levels have the same privilege to execute. In addition, this approach does not require the existence of a global trusted scheduler. Instead, it can be built on enhanced untrusted traditional multi-version schedulers, with the supplement of appropriate process towards read-down operations. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Securt, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100080, Peoples R China 通讯作者地址: Zhang, M, Chinese Acad Sci, Inst Software, State Key Lab Informat Securt, Beijing 100080, Peoples R China. 引用的参考文献数: 15 被引频次: 0 出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG 出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN, SHATIN, 00000, PEOPLES R CHINA ISSN: 1022-4653 29 字符的来源出版物名称缩写: CHINESE J ELECTRON ISO 来源文献出版物名称缩写: Chin. J. Electron. 来源文献页码计数: 5 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 945NP -------------------------------------------------------------------------------显示 98 条,共 136 条 作者: Qing, SH; Wen, WP 标题: A survey and trends on Internet worms 来源出版物: COMPUTERS & SECURITY, 24 (4): 334-346 JUN 2005 语言: English 文献类型: Article 作者关键词: network security; Internet worms; scanning strategies; propagation model 摘要: With the explosive growth and increasing complexity of network applications, the threats of Internet worms against network security are more and more serious. This paper presents the concepts and research situations of Internet worms, their function component, and their execution mechanism. It also addresses the scanning strategies, propagation models, and the critical techniques of Internet worm prevention. Finally, the remaining problems and emerging trends in this area are also outlined. (C) 2004 Elsevier Ltd. All rights reserved. 地址: Chinese Acad Sci, Engn Res Ctr Informat Secur Technol, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100080, Peoples R China 通讯作者地址: Wen, WP, Chinese Acad Sci, Engn Res Ctr Informat Secur Technol, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 60 被引频次: 3 出版商: ELSEVIER ADVANCED TECHNOLOGY 出版商地址: OXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND ISSN: 0167-4048 DOI: 10.1016/j.cose.2004.10.001 29 字符的来源出版物名称缩写: COMPUT SECURITY ISO 来源文献出版物名称缩写: Comput. Secur. 来源文献页码计数: 13 学科类别: Computer Science, Information Systems ISI 文献传递号: 940RE -------------------------------------------------------------------------------显示 99 条,共 136 条 作者: Wang, WC; Li, J; Wu, EH 标题: 2D point-in-polygon test by classifying edges into layers 来源出版物: COMPUTERS & GRAPHICS-UK, 29 (3): 427-439 JUN 2005 语言: English 文献类型: Article 作者关键词: point containment; layered edges; polygon; computational geometry KeyWords Plus: GENERAL POLYHEDRA; PLANAR POLYGONS; INCLUSION TEST; COMPLEXITY; ALGORITHM 摘要: The 2D point-in-polygon test is a fundamental problem in geometry, and of importance in various applications in computer graphics and other areas. In taking advantage of the basic idea of the polygon scan conversion algorithm, a novel method for the point-in-polygon test is proposed in this paper, capable of handling simple polygons in arbitrary shapes, possibly with holes. In the preprocess of the method. the edges of the polygon are classified into layers according to the occlusion relations between the edges viewed orthogonally in a direction, called the test direction, which guarantees that the edges of a layer can be occluded by only the edges of its preceding layers. At the same time, the edges at each layer are queued up respectively along the direction vertical to the test direction because there is no occlusion relation between the edges of the same layer. As a result, based on the layers, the calculation of the segments by the line through the tested point to intersect the polygon along the test direction, and then the inclusion test of the point against the segments could be feasibly made. The method has a low storage requirement in O(n), here, n is the number of the edges of the polygon. The time complexity of its preprocess ranges from O(n) to O(n(2)), depending on the polygon shape and the test direction. And its inclusion test has a time complexity between O(log(n)) and O(n), but less than O((log(n))(2)) in most cases, depending on the construction of the layers. In the case of convex polygons and monotone polygons, the time complexity for the preprocess and the inclusion test could be O(n) and O(log(n)), respectively. On the other hand, the method is also easy to integrate with a variety of existing methods such as ray crossing methods and grid-based methods for improving the inclusion test further. Experimental results show that the method is robust and efficient in computation. (c) 2005 Elsevier Ltd, All rights reserved. 地址: Chinese Acad Sci, Key Lab Comp Sci, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Univ Macau, Fac Sci & Technol, Macao, Peoples R China 通讯作者地址: Wang, WC, Chinese Acad Sci, Key Lab Comp Sci, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 16 被引频次: 7 出版商: PERGAMON-ELSEVIER SCIENCE LTD 出版商地址: THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND ISSN: 0097-8493 DOI: 10.1016/j.cag.2005.03.001 29 字符的来源出版物名称缩写: COMPUT GRAPH-UK ISO 来源文献出版物名称缩写: Comput. Graph.-UK 来源文献页码计数: 13 学科类别: Computer Science, Software Engineering ISI 文献传递号: 940QY -------------------------------------------------------------------------------显示 100 条,共 136 条 作者: Deng, XT; Guo, GJ; Zang, WN 标题: Corrigendum to proof of Chvatal's conjecture on maximal stable sets and maximal cliques in graphs (vol 91, pg 301, 2004) 来源出版物: JOURNAL OF COMBINATORIAL THEORY SERIES B, 94 (2): 352-353 JUL 2005 语言: English 文献类型: Correction 地址: Univ Hong Kong, Dept Math, Hong Kong, Hong Kong, Peoples R China; City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China; Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zang, WN, Univ Hong Kong, Dept Math, Hong Kong, Hong Kong, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 2 被引频次: 3 出版商: ACADEMIC PRESS INC ELSEVIER SCIENCE 出版商地址: 525 B ST, STE 1900, SAN DIEGO, CA 92101-4495 USA ISSN: 0095-8956 DOI: 10.1016/j.jctb.2005.02.003 29 字符的来源出版物名称缩写: J COMB THEOR B ISO 来源文献出版物名称缩写: J. Comb. Theory Ser. B 来源文献页码计数: 2 学科类别: Mathematics ISI 文献传递号: 937TB -------------------------------------------------------------------------------显示 101 条,共 136 条 作者: Wang, GL; Qing, SH 编者: Gervasi, O; Gavrilova, ML; Kumar, V; Lagana, A; Lee, HP; Mun, Y; Taniar, D; Tan, CJK 标题: Security flaws in several group signatures proposed by Popescu 来源出版物: COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 3482: 711-718 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Science and Its Applications (ICCSA 2005) 会议日期: MAY 09-12, 2005 会议地点: Singapore, SINGAPORE 会议赞助商: Inst High Performance Comp.; Univ Perugia.; Univ Calgary.; Univ Minnesota.; Queens Univ Belfast.; Soc Ind & Appl Math.; IEE.; OptimaNumerics Ltd.; MASTER UP. 作者关键词: group signature; digital signature; information security KeyWords Plus: SCHEME 摘要: In resent years, Popescu et al. proposed several group signature schemes in [8, 9, 10, 11] that based on the Okamoto-Shiraishi assumption. Their schemes are claimed to be secure. However, we identify several security flaws in their schemes and then show that these schemes are all insecure. By exploiting those flaws, anybody (not necessarily a group member) can forge valid group signatures on arbitrary messages of his/her choice. In other words, these schemes are universally forgeable. 地址: Inst Infocomm Res, Singapore 119613, Singapore; Chinese Acad Sci, Inst Software, ERCIST, Beijing 100080, Peoples R China 通讯作者地址: Wang, GL, Inst Infocomm Res, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 13 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25862-0 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 8 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCK21 -------------------------------------------------------------------------------显示 102 条,共 136 条 作者: Ji, JF; Li, S; Wu, EH; Liu, XH 编者: Gervasi, O; Gavrilova, ML; Kumar, V; Lagana, A; Lee, HP; Mun, Y; Taniar, D; Tan, CJK 标题: Interactive transmission of highly detailed surfaces 来源出版物: COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 3482: 1167-1176 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: International Conference on Computational Science and Its Applications (ICCSA 2005) 会议日期: MAY 09-12, 2005 会议地点: Singapore, SINGAPORE 会议赞助商: Inst High Performance Comp.; Univ Perugia.; Univ Calgary.; Univ Minnesota.; Queens Univ Belfast.; Soc Ind & Appl Math.; IEE.; OptimaNumerics Ltd.; MASTER UP. 摘要: It is a challenging work for transmitting the highly detailed surfaces interactively to meet real time requirement of the large-scale model visualization from clients. In this paper, we propose a novel approach to interactive transmission of highly detailed surfaces according to the viewpoint. We firstly map the 3D surfaces onto the parameter space through surface parametrization, and the geometry images (GIM) and normal map atlas are obtained by regular re-sampling. Then the quadtree-based hierarchical representation can be constructed based on GIM. Since the hierarchical structure is regular, an efficient compression scheme can be applied to encode the structure and vertices of its nodes. The encoded nodes can be transmitted in arbitrary order, so the extreme flexibility in transmission could be achieved. By taking advantage of normal texture atlas, the rendering result of the partial transmitted model is improved greatly, and then only the geometry on the silhouette to the current viewpoint need be refined and transmitted, and so the amount of data needed to transfer each frame is greatly reduced, 地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China; Univ Macao, Dept Comp & Informat Sci, Macao, Peoples R China; Peking Univ, Sch Elect Engn & Comp Sci, Beijing, Peoples R China 通讯作者地址: Ji, JF, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 16 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25862-0 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCK21 -------------------------------------------------------------------------------显示 103 条,共 136 条 作者: Chen, YR; Sun, JC 标题: An irregular grid for the numerical solution of linear elliptic partial differential equations 来源出版物: APPLIED MATHEMATICS AND COMPUTATION, 166 (1): 84-94 JUL 6 2005 语言: English 文献类型: Article 作者关键词: irregular grid; elliptic PDEs; condition number; CG 摘要: This paper first presents a symmetrically geometric proportion grid with respect to the boundary for linear elliptic partial differential equations with the homogeneous Dirichlet conditions. Then a symmetric scaling technique is proposed for the coefficient matrix derived from the second-order centered difference discretization on the irregular grid. It is proved that the condition number of the symmetrically scaled system is bounded by a constant independent of the matrix order for one-dimensional problem. The numerical results also indicate that the same conclusion holds for a two-dimensional problem. (c) 2004 Elsevier Inc. All rights reserved. 地址: Intel China Res Ctr, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, Lab Parallel Comp, Beijing 100080, Peoples R China 通讯作者地址: Chen, YR, Intel China Res Ctr, 8F,Raycom Infotech Pk A,2 Kexueyuan S Rd, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 6 被引频次: 1 出版商: ELSEVIER SCIENCE INC 出版商地址: 360 PARK AVE SOUTH, NEW YORK, NY 10010-1710 USA ISSN: 0096-3003 DOI: 10.1016/j.amc.2004.04.055 29 字符的来源出版物名称缩写: APPL MATH COMPUT ISO 来源文献出版物名称缩写: Appl. Math. Comput. 来源文献页码计数: 11 学科类别: Mathematics, Applied ISI 文献传递号: 937UE -------------------------------------------------------------------------------显示 104 条,共 136 条 作者: Sun, H; Lin, DD 标题: Dynamic security analysis of group key agreement protocol 来源出版物: IEE PROCEEDINGS-COMMUNICATIONS, 152 (2): 134-137 APR 2005 语言: English 文献类型: Article 摘 要 : Group key agreement is a fundamental building block for increasing collaborative applications. The protocol is more complicated than peer-to-peer communication owing to its dynamic characteristics, but the research to date on group key agreement protocols (GKAP) mainly focuses on the static security and the most distinctively dynamic characteristic of GKAP is difficult to analyse by existing methods. The paper attempts to extend the strand space theory to analyse the dynamic security of GKAP. With the aid of the theory, the AT-GDH protocol is taken as an example to discuss the general conditions of the security retention in dynamic cases. A new scheme is proposed of updating the session key when some member leaves the group based on SA-GDH.2 protocol to avoid the single-point weakness. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Sun, H, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 11 被引频次: 0 出版商: IEE-INST ELEC ENG 出版商地址: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD SG1 2AY, ENGLAND ISSN: 1350-2425 DOI: 10.1049/ip-com:20045193 29 字符的来源出版物名称缩写: IEE PROC-COMMUN ISO 来源文献出版物名称缩写: IEE Proc.-Commun. 来源文献页码计数: 4 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 934ZR -------------------------------------------------------------------------------显示 105 条,共 136 条 作者: Gan, QQ; Song, GF; Xu, Y; Gao, JX; Cao, Q; Pan, XJ; Zhong, Y; Yang, GH; Zhu, XP; Chen, LH 标题: Performance analysis of very-small-aperture lasers 来源出版物: OPTICS LETTERS, 30 (12): 1470-1472 JUN 15 2005 语言: English 文献类型: Article KeyWords Plus: DATA-STORAGE 摘要: The fabrication of very-small-aperture lasers is demonstrated, and their performance is analyzed. Because of strong optical feedback caused by a gold film on the front facet of the laser, its behavior changes: The threshold current decreases, the density of light inside the laser diode and the redshift effect of the spectra are enhanced, and the laser diode's lifetime is shorter than that of common laser diodes with large driving current. (c) 2005 Optical Society of America 地址: Chinese Acad Sci, Inst Semicond, Beijing 100083, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; EO Natl Co Ltd, Guangdong 516023, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Gan, QQ, Chinese Acad Sci, Inst Semicond, POB 912, Beijing 100083, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 6 被引频次: 14 出版商: OPTICAL SOC AMER 出版商地址: 2010 MASSACHUSETTS AVE NW, WASHINGTON, DC 20036 USA ISSN: 0146-9592 29 字符的来源出版物名称缩写: OPTICS LETTERS ISO 来源文献出版物名称缩写: Opt. Lett. 来源文献页码计数: 3 学科类别: Optics ISI 文献传递号: 934EJ -------------------------------------------------------------------------------显示 106 条,共 136 条 作者: Qu, HP; Su, PR; Lin, DD; Feng, DG 编者: Lorenz, P; Dini, P 标题: A packet marking scheme for IP traceback 来源出版物: NETWORKING - ICN 2005, PT 2, 3421: 964-971 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 4th International Conference on Networking (ICN 2005) 会议日期: APR 17-21, 2005 会议地点: Reunion Isl, FRANCE 摘要: DDoS attack is a big problem to the Internet community due to its high-profile, severe damage, and the difficulty in defending against it. Several countermeasures are proposed for it in the literature, among which, Probabilistic Packet Marking (PPM) first developed by Savage et al. is promising. However, the PPM marking schemes have the limitations in two main aspects: high computation overhead and large number of false positives. In this paper, a new packet marking scheme is proposed, which is more practical because of higher precision, and computationally more efficient compared with the PPM scheme proposed by Savage. Furthermore, this scheme can achieve a more higher precision than Advanced Marking Schemes in case of the victim knowing the map of its upstream routers. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Qu, HP, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, POB 8718, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 9 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25338-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 8 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCF68 -------------------------------------------------------------------------------显示 107 条,共 136 条 作者: Su, PR; Li, DQ; Qu, HP; Feng, DG 编者: Lorenz, P; Dini, P 标题: Detecting the deviations of privileged process execution 来源出版物: NETWORKING - ICN 2005, PT 2, 3421: 980-988 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 4th International Conference on Networking (ICN 2005) 会议日期: APR 17-21, 2005 会议地点: Reunion Isl, FRANCE 摘要: Most intruders access system unauthorizedly by exploiting vulnerabilities of privileged processes. Respectively monitoring privileged processes via system call sequences is one of effective methods to detect intrusions. Based on the analysis of popular attacks, we bring forward a new intrusion detection model monitoring the system call sequences, which use locally fuzzy matching to improve the detection accuracy. And the model adopts a novel profile generation method, which could easily generate better profile. The experimental results show that both the accuracy and the efficiency have been improved. 地址: Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China 通讯作者地址: Su, PR, Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 14 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25338-6 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 9 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCF68 -------------------------------------------------------------------------------显示 108 条,共 136 条 作者: Liang, B; Liu, H; Shi, WC; Wu, YJ 编者: Deng, RH; Bao, F; Pang, HH; Zhou, JY 标题: Enforcing the principle of least privilege with a state-based privilege control model 来源出版物: INFORMATION SECURITY PRACTICE AND EXPERIENCE, 3439: 109-120 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st Information Security Practice and Experience Conference 会议日期: APR 11-14, 2005 会议地点: Singapore, SINGAPORE 会议赞助商: Inst Infocomm Res.; Singapore Management UNiv.; Sch Informat Syst.; Singapore Management Univ. 摘要: In order to provide effective support to the principle of least privilege, considering the limitation of traditional privilege mechanisms, this paper proposes a new privilege control model called State-Based Privilege Control (SBPC) and presents the design and implementation of a prototype system for SBPC called Controlled Privilege Framework (CPF) on the Linux operating system platform. SBPC decomposes the time space of a process' lifetime into a series of privilege states according to activities of the process and its need for special permissions. The privilege state is closely related to the application logic of a process. It is the privilege state transfer event that stimulates a process to transfer from one privilege state into another one. For a specified process, there is a specific set of privileges corresponding to every privilege state of the process. With the implementation of CPF, experiment results show that fine-grain and automatic privilege control can be exercised transparently to traditional applications, threats of intrusion to a system can be reduced greatly, and support to the principle of least privilege can therefore be achieved effectively. 地址: Tsing Hua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China; Venus Info Tech Inc, Beijing 100081, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Liang, B, Tsing Hua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 10 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25584-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCG09 -------------------------------------------------------------------------------显示 109 条,共 136 条 作者: Wu, YJ; Shi, WC; Liang, HL; Shang, QH; Yuan, CY; Liang, B 编者: Deng, RH; Bao, F; Pang, HH; Zhou, JY 标题: Security on-demand architecture with multiple modules support 来源出版物: INFORMATION SECURITY PRACTICE AND EXPERIENCE, 3439: 121-131 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st Information Security Practice and Experience Conference 会议日期: APR 11-14, 2005 会议地点: Singapore, SINGAPORE 会议赞助商: Inst Infocomm Res.; Singapore Management UNiv.; Sch Informat Syst.; Singapore Management Univ. 摘要: It's very important for a general-purpose operating system to have a security-tunable feature to meet different security requirements. This can be achieved by supporting diverse security modules, invoking them on demand. However, the security architectures of existing projects on Linux kernels do not support this feature or have some drawbacks in their supporting. Thus we introduce a layered architecture which consists of original kernel layer, module coordination layer and module decision layer. The architecture supports multiple modules register, resolves policy-conflicts of modules by changing their invoking order, and allow user to customize the security by enabling or disabling modules during runtime. The detailed structure and implementation in Linux based system, SECIMOS is described. The caching issue and performance are also discussed. Our practice showed the architecture helps us achieve flexible adaptation in different environments. 地址: Chinese Acad Sci, Inst Software, Beijing, Peoples R China; Chinese Acad Sci, Grad Sch, Beijing, Peoples R China 通讯作者地址: Wu, YJ, Chinese Acad Sci, Inst Software, 712,POB 1871, Beijing, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 9 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25584-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 11 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCG09 -------------------------------------------------------------------------------显示 110 条,共 136 条 作者: Tan, ZW; Liu, ZJ; Wang, MS 编者: Deng, RH; Bao, F; Pang, HH; Zhou, JY 标题: On the security of some nonrepudiable threshold proxy signature schemes 来源出版物: INFORMATION SECURITY PRACTICE AND EXPERIENCE, 3439: 374-385 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st Information Security Practice and Experience Conference 会议日期: APR 11-14, 2005 会议地点: Singapore, SINGAPORE 会议赞助商: Inst Infocomm Res.; Singapore Management UNiv.; Sch Informat Syst.; Singapore Management Univ. KeyWords Plus: SIGNERS 摘要: A (t, n) threshold proxy signature scheme enables an original signer or a group of original signers to delegate the signature authority to a proxy group of n members such that not less than t proxy signers can cooperatively sign messages on behalf of the original signer or the original signer group. In the paper, we show that Sun's and Yang et al.'s threshold proxy signature schemes are insecure against the original signer's forgery, and that Tzeng et al.'s threshold multi-proxy multi-signature scheme is vulnerable against the actual original signer group's forgery. We also show that Hsu et al.'s threshold proxy signature scheme suffers from the conspiracy of the original signer and the secret share dealer SA, and that Hwang et al.'s threshold proxy signature scheme is universally forgeable. In other words, none of the above-mentioned schemes holds the unforgeability and provides non-repudiation. 地址: CAS, AMSS, Key Lab Math Mechanizat, Beijing 100080, Peoples R China; CAS, State Key Lab Informat Secur, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Tan, ZW, CAS, AMSS, Key Lab Math Mechanizat, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 22 被引频次: 2 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25584-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCG09 -------------------------------------------------------------------------------显示 111 条,共 136 条 作者: Lin, HM 编者: Liu, Z; Araki, K 标题: A predicate spatial logic and model checking for mobile processes 来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2004, 3407: 36-36 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004) 会议日期: SEP 20-24, 2004 会议地点: Guiyang, PEOPLES R CHINA 会议赞助商: UN Univ, Int Inst Software Technol.; Guizhou Acad Sci. 地址: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100864, Peoples R China 通讯作者地址: Lin, HM, Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100864, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 0 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25304-1 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 1 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCF19 -------------------------------------------------------------------------------显示 112 条,共 136 条 作者: Ma, YL; Wei, J; Jin, BH; Liu, SH 编者: Liu, Z; Araki, K 标题: A formal framework for ontology integration based on a default extension to DDL 来源出版物: THEORETICAL ASPECTS OF COMPUTING - ICTAC 2004, 3407: 154-169 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004) 会议日期: SEP 20-24, 2004 会议地点: Guiyang, PEOPLES R CHINA 会议赞助商: UN Univ, Int Inst Software Technol.; Guizhou Acad Sci. 作者关键词: ontology integration; distributed description logics; default extension; Tableau algorithm; semantic query KeyWords Plus: SEMANTIC WEB 摘要: The information society demands complete information from multiple sources, where available information is often heterogeneous and distributed. Because of semantic heterogeneities among ontologies of different information sources, it is rather difficult to integrate these local ontologies and get completely available information. In this paper, we propose a formal framework for integration of multiple ontologies from distributed information sources. To achieve this goal, implicit default information is extensively considered. We make a default extension to distributed description logics (DDL) for ontology integration and complete information query. A complete information query based on the integrated ontologies can boil down to checking default satisfiability of complex concept in accord with the query. Default satisfiability can be detected through an adapted tableau algorithm. Based on the proposed formal framework, a prototype system is developed, which can integrate strict as well as default information from multiple distributed information sources and global semantic information query can be performed. 地址: Chinese Acad Sci, Inst Software, Technol Ctr Software Engn, Beijing 100080, Peoples R China 通讯作者地址: Ma, YL, Chinese Acad Sci, Inst Software, Technol Ctr Software Engn, POB 8718, Beijing 100080, Peoples R China. 电 子 邮 箱地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 24 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25304-1 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 16 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCF19 -------------------------------------------------------------------------------显示 113 条,共 136 条 作者: Zhou, CX; Zheng, H; Yu, W; Yao, JF; Li, YC 标题: Digital analysis technology for morphology of polymer chain coils in flow fields 来源出版物: CHINESE JOURNAL OF POLYMER SCIENCE, 23 (2): 155-158 MAR 2005 语言: English 文献类型: Proceedings Paper 会议标题: 6th International Symposium on Polymer Physics 会议日期: JUN 01-05, 2004 会议地点: Dali, PEOPLES R CHINA 会议赞助商: State Key Lab Polymer Phys & Chem.; Univ Akron.; Tohohy Univ.; Inst Charles Sadron.; Natl Nat Sci Fdn China.; Chinese Acad Sci.; Inst Chem.; CAS, Changchum Inst Appl Chem.; CAS, Polymer Div Chinese Chem Soc. 作者关键词: morphology of polymer chain; complex flows; conformation tensor; finite element method (FEM); software DAMPC KeyWords Plus: MELTS 摘要: Polymer chain coils with entanglement is a crucial scale of structures in polymer materials since their relaxation times are matching practical processing times. Based on the phenomenological model of polymer chain coils and a new finite element approach, we have designed a computer software including solver, pre- and post-processing modules, and developed a digital analysis technology for the morphology of polymer chain coils in flow fields (DAMPC). Using this technology we may simulate the morphology development of chain coils in various flow fields, such as simple shear flow, elongational flow, and any complex flow at transient or steady state. The applications made up to now show that the software predictions are comparable with experimental results. 地址: Shanghai Jiao Tong Univ, Dept Polymer Sci & Engn, Shanghai 200240, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhou, CX, Shanghai Jiao Tong Univ, Dept Polymer Sci & Engn, Shanghai 200240, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 5 被引频次: 0 出版商: SPRINGER HEIDELBERG 出版商地址: TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY ISSN: 0256-7679 29 字符的来源出版物名称缩写: CHINESE J POLYM SCI ISO 来源文献出版物名称缩写: Chin. J. Polym. Sci. 来源文献页码计数: 4 学科类别: Polymer Science ISI 文献传递号: 932MG -------------------------------------------------------------------------------显示 114 条,共 136 条 作者: Liu, N; Yan, J; Bai, F; Zhang, BY; Xi, WS; Fan, WG; Chen, Z; Ji, L; Hu, CY; Ma, WY 编者: Zhang, Y; Tanaka, K; Yu, JX; Wang, S; Li, M 标题: A similarity reinforcement algorithm for heterogeneous Web pages 来源出版物: WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005, 3399: 121-132 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 7th Asia-Pacific Web Conference 会议日期: MAR 29-APR 01, 2005 会议地点: Shanghai, PEOPLES R CHINA 会议赞助商: Natl Inst Informat & Commun Technol.; Shanghai Jiao Tong Univ.; Victoria Univ.; Natl Nat Sci Fdn China.; ARC Res Netwp=ork Enterprise Informat Infrastructure.; Microsoft Res Asia.; WISE Soc.; Database Soc China Comp Federat. 摘要: Many machine learning and data mining algorithms crucially rely on the similarity metrics. However, most early research works such as Vector Space Model or Latent Semantic Index only used single relationship to measure the similarity of data objects. In this paper, we first use an Intra- and Inter- Type Relationship Matrix (IITRM) to represent a set of heterogeneous data objects and their inter-relationships. Then, we propose a novel similarity-calculating algorithm over the Inter- and Intra- Type Relationship Matrix. It tries to integrate information from heterogeneous sources to serve their purposes by iteratively computing. This algorithm can help detect latent relationships among heterogeneous data objects. Our new algorithm is based on the intuition that the intrarelationship should affect the inter-relationship, and vice versa. Experimental results on the MSN logs dataset show that our algorithm outperforms the traditional Cosine similarity. 地址: Tsing Hua Univ, Dept Math Sci, Beijing 100084, Peoples R China; Peking Univ, Sch Math Sci, Dept Informat Sci, LMAM, Beijing, Peoples R China; Microsoft Res Asia, Beijing, Peoples R China; Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA; Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing, Peoples R China 通讯作者地址: Liu, N, Tsing Hua Univ, Dept Math Sci, Beijing 100084, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected] 引用的参考文献数: 30 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25207-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCD84 -------------------------------------------------------------------------------显示 115 条,共 136 条 作者: Che, HY; Zhang, JC; Yu, SQ; Gu, J 编者: Zhang, Y; Tanaka, K; Yu, JX; Wang, S; Li, M 标题: IWWS: A reliability-based WWW collaborative recommender system 来源出版物: WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005, 3399: 375-380 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 7th Asia-Pacific Web Conference 会议日期: MAR 29-APR 01, 2005 会议地点: Shanghai, PEOPLES R CHINA 会议赞助商: Natl Inst Informat & Commun Technol.; Shanghai Jiao Tong Univ.; Victoria Univ.; Natl Nat Sci Fdn China.; ARC Res Netwp=ork Enterprise Informat Infrastructure.; Microsoft Res Asia.; WISE Soc.; Database Soc China Comp Federat. 摘要: Recommender systems using collaborative filtering are a popular technique for reducing information overload and finding products. In this paper, we present a reliability-based WWW collaborative recommender system IWWS (Intelligent Web Wizard System), mainly aiming to attack so-called "Matchmaker" problem in collaborative filtering. The "Matchmaker" problem steins from false assumptions that users are counted only by their similarity and high similarity means good advisers. In order to find good advisers for every user, we construct a matchmaker's reliability mode based on the algorithm deriving from Hits, and apply it in IWWS. Comparative experimental results also show that IWWS contrastively improves performance. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Beijing Normal Univ, Coll Informat Sci, Beijing 100875, Peoples R China; Sci & Technol Univ, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Che, HY, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 引用的参考文献数: 10 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25207-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCD84 -------------------------------------------------------------------------------显示 116 条,共 136 条 作者: Hui, CY; Wang, YJ; Zhang, BY; Yang, Q; Wang, Q; Zhou, JH; He, R; Yan, Y 编者: Zhang, Y; Tanaka, K; Yu, JX; Wang, S; Li, M 标题: Mining quantitative associations in large database 来源出版物: WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005, 3399: 405-416 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 7th Asia-Pacific Web Conference 会议日期: MAR 29-APR 01, 2005 会议地点: Shanghai, PEOPLES R CHINA 会议赞助商: Natl Inst Informat & Commun Technol.; Shanghai Jiao Tong Univ.; Victoria Univ.; Natl Nat Sci Fdn China.; ARC Res Netwp=ork Enterprise Informat Infrastructure.; Microsoft Res Asia.; WISE Soc.; Database Soc China Comp Federat. 摘要: Association Rule Mining algorithms operate on a data matrix to derive association rule, discarding the quantities of the items, which contains valuable information. In order to make full use of the knowledge inherent in the quantities of the items, an extension named Ratio Rules [6] is proposed to capture the quantitative association. However, the approach, which is addressed in [6], is mainly based on Principle Component Analysis (PCA) and as a result, it cannot guarantee that the ratio coefficient is non-negative. This may lead to serious problems in the association rules' application. In this paper, a new method, called Principal Non-negative Sparse Coding (PNSC), is provided for learning the associations between itemsets in the form of Ratio Rules. Experiments on several datasets illustrate that the proposed method performs well for the purpose of discovering latent associations between itemsets in large datasets. 地址: Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing, Peoples R China; Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China; Peking Univ, Sch Math Sci, Dept Informat Sci, Beijing, Peoples R China 通讯作者地址: Hui, CY, Chinese Acad Sci, Inst Software, Lab Internet Software Technol, Beijing, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 19 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-25207-X 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCD84 -------------------------------------------------------------------------------显示 117 条,共 136 条 作者: Wu, WL; Feng, DG; Chen, H 编者: Handschuh, H; Hasan, MA 标题: Collision attack and pseudorandomness of reduced-round Camellia 来源出版物: SELECTED AREAS IN CRYPTOGRAPHY, 3357: 252-266 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 11th Annual International Workshop on Selected Areas in Cryptography 会议日期: AUG 09-10, 2004 会议地点: Waterloo, CANADA 会议赞助商: Mitsubishi Elect Corp.; Res Mot Ltd.; Queens Univ Kingston. 会议主办方: Univ Waterloo 作者关键词: block cipher; Camellia; data complexity; time complexity; pseudorandomness KeyWords Plus: PERMUTATIONS 摘要: Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack 6,7,8 and 9 rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The attack on 6-round of 128-bit key Camellia is more efficient than known attacks. The complexities of the attack on 7(8,9,10)-round Camellia without FL/FL-1 functions are less than that of previous attacks. Furthermore, we prove that the 4-round primitive-wise idealized Camellia is not pseudorandom permutation and the 5-round primitive-wise idealized Camellia is super-pseudorandom permutation for non-adaptive adversaries. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Wu, WL, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 15 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-24327-5 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 15 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BCB96 -------------------------------------------------------------------------------显示 118 条,共 136 条 作者: Wang, JF; Li, L; Sun, FC; Zhou, MT 标题: A probability-guaranteed adaptive timeout algorithm for high-speed network flow detection 来源出版物: COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 48 (2): 215-233 JUN 6 2005 语言: English 文献类型: Article 作者关键词: passive network measurement; flow termination decision; flow compression 摘要: Collecting network traffic is becoming a more challenging task in passive network measurement due to the rapid growth of link speed. Flow-based network traffic capture and storage provides an efficient way for high-speed network measurement. The paper concentrates on the flow detection issue which is also the premise for further flow-based traffic analysis and modeling in such challenging environment. Based on the statistical investigation of the correlations between flow size and the maximum packet interarrival time within a flow, we obtain the empirical conditional distribution functions for some popular TCP protocol-based application flows, and then propose a Probability-Guaranteed Adaptive Timeout algorithm (PGAT) for flow termination decision. The assessment criteria for flow termination decision algorithm is systematically developed. Comparisons onflow generation ratio,flow intact ratio, and meanflow extra retaining time metrics indicate that the PGAT algorithm can obtain more attractive performance than other related works. (c) 2004 Elsevier B.V. All rights reserved. 地址: Chinese Acad Sci, Inst Software, Lab Gen Software, Beijing 100080, Peoples R China; Tsing Hua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China; Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China 通讯作者地址: Wang, JF, Chinese Acad Sci, Inst Software, Lab Gen Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 21 被引频次: 1 出版商: ELSEVIER SCIENCE BV 出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS ISSN: 1389-1286 DOI: 10.1016/j.comnet.2004.11.005 29 字符的来源出版物名称缩写: COMPUT NETW ISO 来源文献出版物名称缩写: Comput. Netw. 来源文献页码计数: 19 学科类别: Computer Science, Hardware & Architecture; Computer Science, Information Systems; Engineering, Electrical & Electronic; Telecommunications ISI 文献传递号: 921ON -------------------------------------------------------------------------------显示 119 条,共 136 条 作者: Zhang, JL; Sun, L; Qu, WM; Du, L; Sun, YF 编者: Su, KY; Tsujii, J; Lee, JH; Kwong, OY 标题: A three level cache-based adaptive Chinese language model 来源出版物: NATURAL LANGUAGE PROCESSING - IJCNLP 2004, 3248: 487-492 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 1st International Joint Conference on Natural Language Processing (IJCNLP 2004) 会议日期: MAR 22-24, 2004 会议地点: Hainan Isl, PEOPLES R CHINA 摘要: Even if n-grams were proved to be very powerful and robust in various tasks involving language models, they have a certain handicap that the dependency is limited to very short local context because of the Markov assumption. This article presents an improved cache based approach to Chinese statistical language modeling. We extend this model by introducing the Chinese concept lexicon into it. The cache of the extended language model contains not only the words occurred recently but also the semantically related words. Experiments have shown that the performance of the adaptive model has been improved greatly. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhang, JL, Chinese Acad Sci, Inst Software, POB 8717, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 9 被引频次: 0 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-24475-1 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 6 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BBZ57 -------------------------------------------------------------------------------显示 120 条,共 136 条 作者: Li, SG; Li, GJ; Zhang, SQ 标题: Minimizing makespan with release times on identical parallel batching machines 来源出版物: DISCRETE APPLIED MATHEMATICS, 148 (1): 127-134 APR 30 2005 语言: English 文献类型: Article 作者关键词: polynomial time approximation scheme; identical parallel hatching machines; scheduling; makespan 摘要: We consider the problem of scheduling n jobs on m identical parallel batching machines. Each job is characterized by a release time and a processing time. Each machine can process up to B (B < n) jobs as a batch simultaneously. The processing time of a batch is equal to the largest processing time among all jobs in the batch. The objective is to minimize the maximum completion time (makespan). We present a polynomial time approximation scheme (PTAS) for this problem. (c) 2004 Elsevier B.V. All rights reserved. 地址: Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Tianjin Normal Univ, Sch Comp & Informat Engn, Tianjin 300074, Peoples R China 通讯作者地址: Li, SG, Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 9 被引频次: 6 出版商: ELSEVIER SCIENCE BV 出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS ISSN: 0166-218X DOI: 10.1016/j.dam.2004.11.004 29 字符的来源出版物名称缩写: DISCRETE APPL MATH ISO 来源文献出版物名称缩写: Discret Appl. Math. 来源文献页码计数: 8 学科类别: Mathematics, Applied ISI 文献传递号: 916HT -------------------------------------------------------------------------------显示 121 条,共 136 条 作者: Ji, QG; Qing, SH; He, YP 标题: A new formal model for privilege control with supporting POSIX capability mechanism 来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (1): 46-66 FEB 2005 语言: English 文献类型: Article 作者关键词: formal model; least privilege; role; domain; capability 摘要: In order to enforce the least privilege principle in the operating system, it is necessary for the process privilege to be effectively controlled; but this is very difficult because a process always changes as time changes. In this paper, based on the analysis on how the process privilege is generated and how it works, a hierarchy implementing the least privilege principle with three layers, i.e. administration layer, functionality control layer and performance layer, is posed. It is clearly demonstrated that to bound privilege's working scope is a critical part for controlling privilege, but this is only mentioned implicitly while not supported in POSIX capability mechanism. Based on analysis of existing control mechanism for privilege, not only an improved capability inheritance formula but also a new complete formal model for controlling process based on integrating RBAC, DTE, and POSIX capability mechanism is introduced. The new invariants in the model show that this novel privilege control mechanism is different from RBAC ' s, IDTE ' s, and POSIX ' s, and it generalizes subdomain control mechanism and makes this mechanism dynamic. 地址: Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol, Beijing 100080, Peoples R China 通讯作者地址: Ji, QG, Chinese Acad Sci, Inst Software, Engn Res Ctr Informat Secur Technol, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 25 被引频次: 1 出版商: SCIENCE CHINA PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1009-2757 DOI: 10.1360/03yf0244 29 字符的来源出版物名称缩写: SCI CHINA SER F ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci. 来源文献页码计数: 21 学科类别: Computer Science, Information Systems ISI 文献传递号: 914JL -------------------------------------------------------------------------------显示 122 条,共 136 条 作者: Wu, WL; Feng, DG 标题: Collision attack on reduced-round Camellia 来源出版物: SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 48 (1): 78-90 FEB 2005 语言: English 文献类型: Article 作者关键词: block cipher; collision attack; key; data complexity; time complexity 摘要: Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers; are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds Camellia can be recovered with 2(10) chosen plaintexts and 2(15) encryptions. The 128-bit key of 7 rounds Camellia can be recovered with 2(12) chosen plaintexts and 2(54.5) encryptions. The 128-bit key of 8 rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(112.1) encryptions. The 128-bit key of 9 rounds Camellia can be recovered with 2(113.6) chosen plaintexts and 2(121) encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(111.1) encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with 2 13 chosen plaintexts and 2 175,6 encryptions. The 256-bit key of 10 rounds Camellia can be recovered with 2(14) chosen plaintexts and 2(239.9) encryptions. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Wu, WL, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 8 被引频次: 3 出版商: SCIENCE CHINA PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1009-2757 DOI: 10.1360/03yf0293 29 字符的来源出版物名称缩写: SCI CHINA SER F ISO 来源文献出版物名称缩写: Sci. China Ser. F-Inf. Sci. 来源文献页码计数: 13 学科类别: Computer Science, Information Systems ISI 文献传递号: 914JL -------------------------------------------------------------------------------显示 123 条,共 136 条 作者: Zhou, YB; Zhang, ZF; Feng, DG 标题: Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication 来源出版物: IEEE COMMUNICATIONS LETTERS, 9 (4): 372-374 APR 2005 语言: English 文献类型: Article 作者关键词: authenticated key agreement; user authentication; mobile communication 摘要: This letter shows that the end-to-end security protocol for mobile communications with end-user identification/authentication due to Chang et al. [1] has a serious security flaw. We demonstrate this by presenting a simple but powerful impersonation attack against the protocol so that the protocol is insecure against impersonation attack. Hence, the protocol cannot achieve the claimed security. To overcome such a security flaw, a modification is presented. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China 通讯作者地址: Zhou, YB, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 3 被引频次: 1 出版商: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 出版商地址: 445 HOES LANE, PISCATAWAY, NJ 08855 USA ISSN: 1089-7798 DOI: 10.1109/LCOMM.2005.04015 29 字符的来源出版物名称缩写: IEEE COMMUN LETT ISO 来源文献出版物名称缩写: IEEE Commun. Lett. 来源文献页码计数: 3 学科类别: Telecommunications ISI 文献传递号: 912AW -------------------------------------------------------------------------------显示 124 条,共 136 条 作者: Xu, J; Zhang, ZF; Feng, DG 编者: Lim, CH; Yung, M 标题: A ring signature scheme using bilinear pairings 来源出版物: INFORMATION SECURITY APPLICATIONS, 3325: 160-169 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 5th International Workshop on Information Security Applications 会议日期: AUG 23-25, 2004 会议地点: Jeju Isl, SOUTH KOREA 会议赞助商: Korea Inst Informat Security & Cryptol.; Elect & Telecommun Res Inst.; Minist Informat & Commun. KeyWords Plus: AD-HOC GROUPS; CRYPTOSYSTEMS 摘要: The bilinear pairings such as Weil pairing or Tate pairing over elliptic curves and hyperelliptic curves have been found various applications in cryptography very recently. Ring signature is a very useful tool to provide the user's anonymity and the signer's privacy. In this paper, we propose a ring signature scheme based on the bilinear pairings, which is secure against chosen message attacks without random oracles. Moreover, we use this ring signature scheme to construct a concurrent signature scheme for fair exchange of signatures. 地址: Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 16 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-24015-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 10 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BBR79 -------------------------------------------------------------------------------显示 125 条,共 136 条 作者: Yao, G; Feng, DG 编者: Lim, CH; Yung, M 标题: A new k-anonymous message transmission protocol 来源出版物: INFORMATION SECURITY APPLICATIONS, 3325: 388-399 2005 丛书标题: LECTURE NOTES IN COMPUTER SCIENCE 语言: English 文献类型: Proceedings Paper 会议标题: 5th International Workshop on Information Security Applications 会议日期: AUG 23-25, 2004 会议地点: Jeju Isl, SOUTH KOREA 会议赞助商: Korea Inst Informat Security & Cryptol.; Elect & Telecommun Res Inst.; Minist Informat & Commun. 作者关键词: anonymous transmission; cryptographic protocol; security KeyWords Plus: PRIVACY 摘要: Public and private communication networks have a growing importance for our daily life. The globally networked society places great demand on the dissemination and sharing of person-specific data. In order to protect the anonymity of individuals to whom released the data refer, data holders often remove or encrypt explicit identifiers such as names, addresses and phone numbers. But these cannot solve the problem well. Anonymous communication protocols address the problem of concealing who communicates with whom, as in the case of letters from a secret admirer. To gain efficiency, k-anonymous message transmission is presented. Informally, a communication protocol is sender k-anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down its search to a set of k suspects. Receiver k-anonymity places a similar guarantee on the receiver: an adversary, at best, can only narrow down the possible receivers to a set of size k. In this paper, a k-anonymous transmission protocol is presented. The protocol is based on asymmetric encryption algorithm. All the members in the protocol is divided into smaller groups, and if all the members in the group perform the protocol correctly, the protocol is sender k-anonymous and receiver k-anonymous. Furthermore, as long as the asymmetric encryption algorithm is secure, our protocol is secure, too. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Yao, G, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 18 被引频次: 1 出版商: SPRINGER-VERLAG BERLIN 出版商地址: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY ISSN: 0302-9743 ISBN: 3-540-24015-2 29 字符的来源出版物名称缩写: LECT NOTE COMPUT SCI 来源文献页码计数: 12 学科类别: Computer Science, Theory & Methods ISI 文献传递号: BBR79 -------------------------------------------------------------------------------显示 126 条,共 136 条 作者: Huang, HJ; Jiao, L; Cheung, TY 标题: Property-preserving subnet reductions for designing manufacturing systems with shared resources 来源出版物: THEORETICAL COMPUTER SCIENCE, 332 (1-3): 461-485 FEB 28 2005 语言: English 文献类型: Article 作者关键词: manufacturing system; petri net; property-preserving; reduction; system design; transformation; verification KeyWords Plus: PETRI NETS; TRANSFORMATIONS; VERIFICATION; REFINEMENTS 摘要: This paper handles two problems in manufacturing system design: resource sharing and system abstraction. In a manufacturing system, resources such as robots, machines, etc. are shared by several processes. When the resources are switched from one process to another, they may need some modifications such as cleaning oil, adding equipments and so on. Previous designing methods assume that the resources have no intermediate modifications. Hence, they need to be extended to handle such kinds of resource-sharing problems. As for abstraction, modeling operations with single places in manufacturing system design is very popular. From the viewpoint of verification, the objective is to verify whether the reduced model has the same desirable properties as the original one. This paper presents three kinds of property-preserving subnet reduction methods. For each reduction method, conditions are presented for ensuring that the properties liveness, boundedness and reversibility are preserved. Applications of these reduction methods to handling the above resource sharing and system abstraction problems are illustrated with an example from the manufacturing system. (c) 2005 Elsevier B.V. All rights reserved. 地址: Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci & Informat Technol, Shenzhen 518055, Peoples R China; Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China 通讯作者地址: Huang, HJ, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci & Informat Technol, Shenzhen 518055, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 35 被引频次: 6 出版商: ELSEVIER SCIENCE BV 出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS ISSN: 0304-3975 DOI: 10.1016/j.tcs.2004.12.010 29 字符的来源出版物名称缩写: THEOR COMPUT SCI ISO 来源文献出版物名称缩写: Theor. Comput. Sci. 来源文献页码计数: 25 学科类别: Computer Science, Theory & Methods ISI 文献传递号: 905OQ -------------------------------------------------------------------------------显示 127 条,共 136 条 作者: Deng, XT; Feng, HD; Li, GJ; Shi, BY 标题: A PTAS for semiconductor burn-in scheduling 来源出版物: JOURNAL OF COMBINATORIAL OPTIMIZATION, 9 (1): 1-13 FEB 2005 语言: English 文献类型: Article 作者关键词: approximation algorithm; batch processing; release date; geometric rounding; time stretching KeyWords Plus: BATCH PROCESSING SYSTEM; COMPLETION-TIME 摘要: In this paper a polynomial time approximation scheme, PTAS for short, is presented for the problem of scheduling jobs in a batch processing system. Each job has a pre-defined release date, which indicates when the job is available, and a pre-defined burn-in time, which is the least time needed for processing the job. At one time, at most B jobs can be processed together, where B is a pre-given number. No preemption is permitted. 地址: Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China; City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China 通讯作者地址: Li, GJ, Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 9 被引频次: 0 出版商: SPRINGER 出版商地址: VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS ISSN: 1382-6905 DOI: 10.1007/s10878-005-5480-7 29 字符的来源出版物名称缩写: J COMB OPTIM ISO 来源文献出版物名称缩写: J. Comb. Optim. 来源文献页码计数: 13 学科类别: Computer Science, Interdisciplinary Applications; Mathematics, Applied ISI 文献传递号: 899QG -------------------------------------------------------------------------------显示 128 条,共 136 条 作者: Lin, HM 标题: Predicate mu-calculus for mobile ambients 来源出版物: JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 20 (1): 95-104 JAN 2005 语言: English 文献类型: Article 作者关键词: model checking; mobile ambients; spatial logic; mu-calculus; fixpoints 摘要: Ambient logics have been proposed to describe properties for mobile agents which may evolve over time as well as space. This paper takes a predicate-based approach to extending an ambient logic with recursion, yielding a predicate mu-calculus in which fixpoint formulas are formed using predicate variables. An algorithm is developed for model checking finite-control mobile ambients against formulas of the logic, providing the first decidability result for model checking a spatial logic with recursion. 地址: Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Lin, HM, Chinese Acad Sci, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 14 被引频次: 1 出版商: SCIENCE CHINA PRESS 出版商地址: 16 DONGHUANGCHENGGEN NORTH ST, BEIJING 100717, PEOPLES R CHINA ISSN: 1000-9000 29 字符的来源出版物名称缩写: J COMPUT SCI TECHNOL ISO 来源文献出版物名称缩写: J. Comput. Sci. Technol. 来源文献页码计数: 10 学 科 类 别 : Computer Science, Hardware & Architecture; Computer Science, Software Engineering ISI 文献传递号: 897VK -------------------------------------------------------------------------------显示 129 条,共 136 条 作者: Chang, DX; Feng, DZ; Zheng, WX; Li, L 标题: A fast recursive total least squares algorithm for adaptive IIR filtering 来源出版物: IEEE TRANSACTIONS ON SIGNAL PROCESSING, 53 (3): 957-965 MAR 2005 语言: English 文献类型: Article 作者关键词: adaptive filtering; fast gain vector; IIR filtering; Rayleigh quotient KeyWords Plus: SPECTRAL ESTIMATION; SYSTEM-IDENTIFICATION; FREQUENCY ESTIMATION; MONIC NORMALIZATION; HARMONIC RETRIEVAL; SIGNAL-DETECTION; NEURAL NETWORKS; NOISE; EFFICIENT 摘要: This paper develops a new fast recursive total least squares (N-RTLS) algorithm to recursively compute the total least squares (TLS) solution for adaptive infinite-impulse-response (IIR) filtering. The new algorithm is based on the minimization of the constraint Rayleigh quotient in which the first entry of the parameter vector is fixed to the negative one. The highly computational efficiency of the proposed algorithm depends on the efficient computation of the gain vector and the adaptation of the Reyleigh quotient. Using the shift structure of the input data vectors, a fast algorithm for computing the gain vector is established, which is referred to as the fast gain vector (FGV) algorithm. The computational load of the FGV algorithm is smaller than that of the fast Kalman algorithm. Moreover, the new algorithm is numerically stable since it does not use the well-known matrix inversion lemma. The computational complexity of the new algorithm per iteration is also O(L). The global convergence of the new algorithm is studied. The performances of the relevant algorithms are compared via simulations. 地址: Xidian Univ, Natl Lab Radar Signal Proc, Xian 710071, Peoples R China; Univ Western Sydney, Sch QMMS, Sydney, NSW, Australia; Chinese Acad Sci, Inst Software, E Govt Ctr, Beijing, Peoples R China 通讯作者地址: Chang, DX, Xidian Univ, Natl Lab Radar Signal Proc, Xian 710071, Peoples R China. 电 子 邮 箱 地 址 : [email protected]; [email protected]; [email protected]; [email protected] 引用的参考文献数: 45 被引频次: 0 出版商: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 出版商地址: 445 HOES LANE, PISCATAWAY, NJ 08855 USA ISSN: 1053-587X DOI: 10.1109/TSP.2004.842180 29 字符的来源出版物名称缩写: IEEE TRANS SIGNAL PROCESS ISO 来源文献出版物名称缩写: IEEE Trans. Signal Process. 来源文献页码计数: 9 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 898DN -------------------------------------------------------------------------------显示 130 条,共 136 条 作者: Chang, L; Lu, JA; Deng, XM 标题: A new two-dimensional discrete chaotic system with rational fraction and its tracking and synchronization 来源出版物: CHAOS SOLITONS & FRACTALS, 24 (4): 1135-1143 MAY 2005 语言: English 文献类型: Article 摘要: This letter reports the finding of a novel two-dimensional discrete chaotic system. The new system is based on the recently proposed one-dimensional discrete chaotic system with rational fraction [J.-A. Lu, X. Wu, J. Lu, L. Kang. A new discrete chaotic system with rational fraction and its dynamical behaviors. Chaos, Solitons Fractals 2004; 22: 311]. We studied the dynamical behavior and investigated its tracking and synchronization. Sufficient conditions for tracking and synchronization are deduced. Finally, numerical simulations are provided for illustration and verification. (C) 2004 Elsevier Ltd. All rights reserved. 地址: Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China; Chinese Acad Sci, Inst Automat, Natl Lab Pattern Recognit, Beijing 100080, Peoples R China; Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China 通讯作者地址: Lu, JA, Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China. 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 9 被引频次: 1 出版商: PERGAMON-ELSEVIER SCIENCE LTD 出版商地址: THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND ISSN: 0960-0779 DOI: 10.1016/j.chaos.2004.09.089 29 字符的来源出版物名称缩写: CHAOS SOLITON FRACTAL ISO 来源文献出版物名称缩写: Chaos Solitons Fractals 来源文献页码计数: 9 学 科 类别 : Mathematics, Interdisciplinary Applications; Physics, Multidisciplinary; Physics, Mathematical ISI 文献传递号: 899CO -------------------------------------------------------------------------------显示 131 条,共 136 条 作者: Sun, JC; Li, HY 标题: Generalized Fourier transform on an arbitrary triangular domain 来源出版物: ADVANCES IN COMPUTATIONAL MATHEMATICS, 22 (3): 223-248 APR 2005 语言: English 文献类型: Article 作者关键词: arbitrary triangle; eigen-decomposition; generalized Fourier transform; generalized Fourier series; convergence; error estimates KeyWords Plus: ORTHOGONAL POLYNOMIALS; EQUILATERAL TRIANGLE; WEIGHT-FUNCTIONS; SIMPLEX; EIGENVALUES; SERIES 摘要: In this paper, we construct generalized Fourier transform on an arbitrary triangular domain via barycentric coordinates and PDE approach. We start with a second-order elliptic differential operator for an arbitrary triangle which has the so-called generalized sine (TSin) and generalized cosine (TCos) systems as eigenfunctions. The orthogonality and completeness of the systems are then proved. Some essential convergence properties of the generalized Fourier series are discussed. Error estimates are obtained in Sobolev norms. Especially, the generalized Fourier transforms for some elementary polynomials and their convergence are investigated. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 电子邮箱地址: [email protected]; [email protected] 引用的参考文献数: 23 被引频次: 6 出版商: SPRINGER 出版商地址: 233 SPRING STREET, NEW YORK, NY 10013 USA ISSN: 1019-7168 DOI: 10.1007/s10444-003-7667-8 29 字符的来源出版物名称缩写: ADV COMPUT MATH ISO 来源文献出版物名称缩写: Adv. Comput. Math. 来源文献页码计数: 26 学科类别: Mathematics, Applied ISI 文献传递号: 894NS -------------------------------------------------------------------------------显示 132 条,共 136 条 作者: Wu, CK 标题: On the independence of Boolean functions 来 源 出 版 物 : INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 82 (4): 415-420 APR 2005 语言: English 文献类型: Article 作者关键词: cryptography Boolean function; independence 摘要: Boolean functions are widely used because they can be used to precisely describe logical circuits. Properties of Boolean functions with respect to their applications to cryptography have been studied but relationship between Boolean functions are rarely studied. This paper studies the independent-v of Boolean functions, gives necessary and sufficient conditions for judging whether two given Boolean functions are independent. Some enumeration formulae are given. 地址: Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Wu, CK, Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 3 被引频次: 0 出版商: TAYLOR & FRANCIS LTD 出版商地址: 4 PARK SQUARE, MILTON PARK, ABINGDON OX14 4RN, OXON, ENGLAND ISSN: 0020-7160 DOI: 10.1080/00207160412331291035 29 字符的来源出版物名称缩写: INT J COMPUT MATH ISO 来源文献出版物名称缩写: Int. J. Comput. Math. 来源文献页码计数: 6 学科类别: Mathematics, Applied ISI 文献传递号: 893WN -------------------------------------------------------------------------------显示 133 条,共 136 条 作者: Cao, TJ; Lin, DD; Xue, R 标题: A randomized RSA-based partially blind signature scheme for electronic cash 来源出版物: COMPUTERS & SECURITY, 24 (1): 44-49 FEB 2005 语言: English 文献类型: Article 作者关键词: partially blind signatures; electronic cash; privacy; randomization; RSA 摘要: Blind signature schemes can yield a signature and message pair whose information does not teak to the signer. However, when blind signatures are used to design e-cash schemes, there are two problems. One is the unlimited growth of the bank's database which keeps all spent e-cashes for preventing double spending. Another problem is that the signer must assure himself that the message contains accurate information such as the face value of the e-cash without seeing it. Partially blind signatures can cope with these problems. In partially blind signatures, the signer can explicitly include some agreed common information such as the expiration date and the face value in the blind signature. Randomized signature schemes can withstand one-more-forgery under the chosen plaintext attack. Based on RSA cryptosystem Fan-Chen-Yeh proposed a randomized blind signature scheme and Chien-Jan-Tseng also proposed a randomized partially blind signature scheme. But, the attacker can remove the randomizing factor from the messages to be signed in these two schemes. The attacker can also change the common information of Chien-Jan-Tseng's partially blind signature. In this paper, we propose a secure randomized RSA-based partially blind signature scheme, and show that the proposed scheme satisfies the blindness and unforgeabitity properties. We also analyse the computation cost of the proposed scheme. (C) 2005 Elsevier Ltd. All rights reserved. 地址: Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China; China Univ Min & Technol, Sch Comp Sci & Technol, Zuzhou 221008, Peoples R China 通讯作者地址: Cao, TJ, Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China. 电子邮箱地址: [email protected]; [email protected]; [email protected] 引用的参考文献数: 9 被引频次: 7 出版商: ELSEVIER ADVANCED TECHNOLOGY 出版商地址: OXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND ISSN: 0167-4048 DOI: 10.1016/j.cose.2004.05.008 29 字符的来源出版物名称缩写: COMPUT SECURITY ISO 来源文献出版物名称缩写: Comput. Secur. 来源文献页码计数: 6 学科类别: Computer Science, Information Systems ISI 文献传递号: 896TL -------------------------------------------------------------------------------显示 134 条,共 136 条 作者: Zhang, XF; Liang, HL; Sun, YF 标题: Dynamic enforcement of the Strict integrity policy 来源出版物: CHINESE JOURNAL OF ELECTRONICS, 14 (1): 49-53 JAN 2005 语言: English 文献类型: Article 作者关键词: information system security; information integrity; Strict integrity policy; Biba's model 摘要: The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting information integrity, but the static integrity labels of both subjects and objects increase compatibility cost of applications and might prevent some operations that are indeed harmless. In order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in DESIP, which are used to confine dynamically the range of objects a subject could be allowed to access. The new rules of access control in DESIP are given for each kind of access mode (observe, modify and invoke) together with the proofs of their validity. Comparison between SIP and DESIP shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a similar way as it is controlled by SIP and DESIP is more compatible than SIP. 地址: Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China 通讯作者地址: Zhang, XF, Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China. 引用的参考文献数: 11 被引频次: 0 出版商: TECHNOLOGY EXCHANGE LIMITED HONG KONG 出版商地址: 26-28 AU PUI WAN ST, STE 1102, FO TAN INDUSTRIAL CENTRE, FO TAN, SHATIN, 00000, PEOPLES R CHINA ISSN: 1022-4653 29 字符的来源出版物名称缩写: CHINESE J ELECTRON ISO 来源文献出版物名称缩写: Chin. J. Electron. 来源文献页码计数: 5 学科类别: Engineering, Electrical & Electronic ISI 文献传递号: 892MN -------------------------------------------------------------------------------显示 135 条,共 136 条 作者: Lo, SH; Wang, WX 标题: Finite element mesh generation over intersecting curved surfaces by tracing of neighbours 来源出版物: FINITE ELEMENTS IN ANALYSIS AND DESIGN, 41 (4): 351-370 JAN 2005 语言: English 文献类型: Article 作者关键词: triangular surface intersection; neighbour tracing; local meshing KeyWords Plus: TRIANGULATION; ALGORITHM; ROBUST 摘要: The use of discrete data to represent engineering structures as derivatives from intersecting components requires algorithms to perform Boolean operations between groups of triangulated surfaces. In the intersection process, an accurate and efficient method for the determination of intersection lines is a crucial step for large scale and complex surface intersections. Given the node numbers at the vertices of the triangles, the neighbour relationship is first established. A background grid is employed to limit the scope of searching for candidate triangles that may intersect. This will drastically reduce the time of geometrical check for intersections between triangles, making the surface intersection and mesh generation a quasi-linear process with respect to the number of elements involved. The intersection lines are determined by the robust algorithm based on tracing the neighbours of intersecting triangles. In the determination of intersection between two triangles, four fundamental cases are identified and treated systematically to enhance robustness and reliability. In this paper, the consistent treatment of mesh generation along intersection lines is emphasized. The procedure ensures that all mesh generation operations are carried out on the surface concerned without leaving the surface so that elements generated will always be on the surface. Five examples on a great variety of surface and mesh characteristics are given to illustrate the efficiency and robustness of the algorithm. (C) 2004 Elsevier B.V. All rights reserved. 地址: Univ Hong Kong, Dept Civil Engn, Hong Kong, Hong Kong, Peoples R China; Chinese Acad Sci, Inst Software, Intelligence Engn Lab, Beijing, Peoples R China 通讯作者地址: Lo, SH, Univ Hong Kong, Dept Civil Engn, Pokfulam Rd, Hong Kong, Hong Kong, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 26 被引频次: 1 出版商: ELSEVIER SCIENCE BV 出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS ISSN: 0168-874X DOI: 10.1016/j.finel.2004.07.002 29 字符的来源出版物名称缩写: FINITE ELEM ANAL DESIGN ISO 来源文献出版物名称缩写: Finite Elem. Anal. Des. 来源文献页码计数: 20 学科类别: Mathematics, Applied; Mechanics ISI 文献传递号: 885JN -------------------------------------------------------------------------------显示 136 条,共 136 条 作者: Li, SG; Li, GJ; Wang, XL; Liu, QM 标题: Minimizing makespan on a single batching machine with release times and non-identical job sizes 来源出版物: OPERATIONS RESEARCH LETTERS, 33 (2): 157-164 MAR 2005 语言: English 文献类型: Article 作者关键词: approximation algorithms; scheduling; batch processing; makespan; release times KeyWords Plus: PROCESSING MACHINE 摘要: We consider the problem of scheduling jobs with release times and non-identical job sizes on a single batching machine; our objective is to minimize makespan. We present an approximation algorithm with worst-case ratio 2 + epsilon, where epsilon > 0 can be made arbitrarily small. (C) 2004 Elsevier B.V. All rights reserved. 地址: Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China; Shandong Univ, Sch Math & Syst Sci, Jinan 250100, Peoples R China; Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China; Yantai Normal Univ, Sch Comp Sci & Technol, Yantai 264025, Peoples R China 通讯作者地址: Li, SG, Yantai Univ, Dept Math & Informat Sci, Yantai 264005, Peoples R China. 电子邮箱地址: [email protected] 引用的参考文献数: 11 被引频次: 10 出版商: ELSEVIER SCIENCE BV 出版商地址: PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS ISSN: 0167-6377 DOI: 10.1016/j.orl.2004.04.009 29 字符的来源出版物名称缩写: OPER RES LETT ISO 来源文献出版物名称缩写: Oper. Res. Lett. 来源文献页码计数: 8 学科类别: Operations Research & Management Science ISI 文献传递号: 873XH
© Copyright 2026 Paperzz