期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Extension of Subjective Logic for Time-Related Trust 被引量:3
1
作者 HUANGChen-lin HUHua-ping 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期56-60,共5页
To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction... To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction, disjunction and negation for traditional logic anddiscounting and consensus operators that are evidential operators specially designed for thepropagation and computation of trust relationships. With the extension of subjective logic fortime-related trust, our time-related trust modelis suitable to model the dynamic trust relationshipin practice. Finally an example of reputation assessment is offered to demonstrate the usage of ourtrust model. 展开更多
关键词 trust model lime-related trust relationship time-related trust model subjective logic
在线阅读 下载PDF
Co-Evolution Optimization of Anchored Row Piles for Deep Foundation Pit 被引量:3
2
作者 周东 吴恒 +2 位作者 李陶声 韦日钰 陈秋莲 《Journal of China University of Mining and Technology》 2001年第2期123-131,共9页
The thinking of co evolution is applied to the optimization of retaining and protecting structure for deep foundation excavation, and the system of optimization of anchored row piles for deep foundation pit has been a... The thinking of co evolution is applied to the optimization of retaining and protecting structure for deep foundation excavation, and the system of optimization of anchored row piles for deep foundation pit has been already developed successfully. For the co evolution algorithm providing an evolutionary mechanism to simulate ever changing problem space, it is an optimization algorithm that has high performance, especially applying to the optimization of complicated system of retaining and protecting for deep foundation pit. It is shown by many engineering practices that the co evolution algorithm has obvious optimization effect, so it can be an important method of optimization of retaining and protecting for deep foundation pit. Here the authors discuss the co evolution model, object function, all kinds of constraint conditions and their disposal methods, and several key techniques of system realization. 展开更多
关键词 genetic algorithm co evolution OPTIMIZATION anchored row piles deep foundation pit
在线阅读 下载PDF
An automatic scheme to construct Snort rules from honeypots data 被引量:1
3
作者 LiXiaoyong LiuDongxi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期466-470,共5页
A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen.... A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme. 展开更多
关键词 signature constructing intrusion detection SNORT honeypot.
在线阅读 下载PDF
H_∞ Optimal Model Reduction for Singular Fast Subsystems
4
作者 WANGJing ZHANGQing-Ling +1 位作者 LIUWan-Quan ZHOUYue 《自动化学报》 EI CSCD 北大核心 2005年第4期638-641,共4页
In this paper, H∞ optimal model reduction for singular fast subsystems will be inves-tigated. First, error system is established to measure the error magnitude between the original andreduced systems, and it is demon... In this paper, H∞ optimal model reduction for singular fast subsystems will be inves-tigated. First, error system is established to measure the error magnitude between the original andreduced systems, and it is demonstrated that the new feature for model reduction of singular systemsis to make H∞ norm of the error system finite and minimal. The necessary and su?cient conditionis derived for the existence of the H∞ suboptimal model reduction problem. Next, we give an exactand practicable algorithm to get the parameters of the reduced subsystems by applying the matrixtheory. Meanwhile, the reduced system may be also impulsive. The advantages of the proposedalgorithm are that it is more ?exible in a straight-forward way without much extra computation, andthe order of the reduced systems is as minimal as possible. Finally, one illustrative example is givento illustrate the e?ectiveness of the proposed model reduction approach. 展开更多
关键词 for MODEL FAST systems MODEL matrix the First and FAST NORM mini Next more The is to new GET may are one be it
在线阅读 下载PDF
NOVEL QUANTUM-INSPIRED GENETIC ALGORITHM BASED ON IMMUNITY
5
作者 LiYing ZhaoRongchun +1 位作者 ZhangYanning JiaoLicheng 《Journal of Electronics(China)》 2005年第4期371-378,共8页
A novel algorithm, the Immune Quantum-inspired Genetic Algorithm (IQGA), is proposed by introducing immune concepts and methods into Quantum-inspired Genetic Algorithm (QGA). With the condition of preserving QGA's... A novel algorithm, the Immune Quantum-inspired Genetic Algorithm (IQGA), is proposed by introducing immune concepts and methods into Quantum-inspired Genetic Algorithm (QGA). With the condition of preserving QGA's advantages, IQGA utilizes the characteristics and knowledge in the pending problems for restraining the repeated and ineffective operations during evolution, so as to improve the algorithm efficiency. The experimental results of the knapsack problem show that the performance of IQGA is superior to the Conventional Genetic Algorithm (CGA), the Immune Genetic Algorithm (IGA) and QGA. 展开更多
关键词 Genetic Algorithm(GA) Quantum-inspired Genetic Algorithm(QGA) Immune operator Knapsack problem
在线阅读 下载PDF
Testable model specification via statechart schema
6
作者 CAIGuo-yong GUTian-long CHIOUPengLam 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2003年第3期254-258,共5页
XML is an important technology for Internet-based data exchange with far reaching capabilities be-yond for just data exchange. The paper describes the first results of a project that aims to explore the applicabil-ity... XML is an important technology for Internet-based data exchange with far reaching capabilities be-yond for just data exchange. The paper describes the first results of a project that aims to explore the applicabil-ity of XML technology for web-based software engineering with the emphasis on collaborative software testing in-volving the use of statechart. The paper presents the approach of building the statechart schema with XML Sche-ma. It also describes the use of the schema in a web-based collaborative software testing CASE environment. 展开更多
关键词 XML STATECHART test specification
在线阅读 下载PDF
Algebra model and security analysis for cryptographic protocols 被引量:8
7
作者 HUAIJinpeng LIXianxian 《Science in China(Series F)》 2004年第2期199-220,共22页
More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and an... More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participants knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met. 展开更多
关键词 cryptographic protocol formal analysis information security algebra system.
原文传递
A novel constant degree and constant congestion DHT scheme for peer-to-peer networks 被引量:7
8
作者 LIDongsheng LUXicheng 《Science in China(Series F)》 2005年第4期421-436,共16页
Degree, diameter and congestion are important measures of distributed hash table (DHT) schemes for peer-to-peer networks. Many proposed DHT schemes are based on some traditional interconnection topologies and the Kaut... Degree, diameter and congestion are important measures of distributed hash table (DHT) schemes for peer-to-peer networks. Many proposed DHT schemes are based on some traditional interconnection topologies and the Kautz graph is a topology with good properties such as optimal network diameter. In this paper, FissionE, a novel DHT scheme based on the Kautz graph, is proposed. FissionE is the first constant degree and O(logN) diameter DHT scheme with (1+o(1))-congestion. FissionE shows that the DHT scheme with constant degree and constant congestion can achieve O(logN) diameter, which is better than the lower bound ? (N1/d) conjectured before. The average degree of FissionE is 4 and the diameter is 2*log2N, and the average routing path length is about log2N. The average path length of FissionE is shorter than CAN or Koorde with the same degree when the P2P network is large scale. 展开更多
关键词 peer-to-peer network DHT scheme Kautz graph constant degree congestion.
原文传递
Forecasting the Efficiency of Test Generation Algorithms for Combinational Circuits 被引量:2
9
作者 徐拾义 TukwasibweJustafFrank 《Journal of Computer Science & Technology》 SCIE EI CSCD 2000年第4期326-337,共12页
In this era of VLSI circuits, testability is truly a very crucial issue.To generate a test set for a given circuit, choice of an algorithm from a number ofexisting test generation algorithms to apply is bound to vary ... In this era of VLSI circuits, testability is truly a very crucial issue.To generate a test set for a given circuit, choice of an algorithm from a number ofexisting test generation algorithms to apply is bound to vary from circuit to circuit.In this paper, the Genetic Algorithm is used in order to construct an accurate modelfor some existing test generation algorithms that are being used everywhere in theworld. Some objective quantitative measures are used as an effective tool in makingsuch choice. Such measures are so important to the analysis of algorithms that theybecome one of the subjects of this work. 展开更多
关键词 TESTABILITY genetic algorithm forecasting test generation
原文传递
Phase Correlation Based Iris Image Registration Model 被引量:3
10
作者 Jun-ZhouHuang Tie-NiuTan +1 位作者 LiMa Yun-HongWang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第3期419-425,共7页
Iris recognition is one of the most reliable personal identification methods. In iris recognition systems, image registration is an important component. Accurately registering iris images leads to higher recognition r... Iris recognition is one of the most reliable personal identification methods. In iris recognition systems, image registration is an important component. Accurately registering iris images leads to higher recognition rate for an iris recognition system. This paper proposes a phase correlation based method for iris image registration with sub-pixel accuracy. Compared with existing methods, it is insensitive to image intensity and can compensate to a certain extent the non-linear iris deformation caused by pupil movement. Experimental results show that the proposed algorithm has an encouraging performance. 展开更多
关键词 phase correlation image registration iris recognition BIOMETRICS
原文传递
Incremental Maintenance of Quotient Cube Based on Galois Lattice 被引量:2
11
作者 Cui-PingLi Kum-HoeTung ShanWang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第3期302-308,共7页
Data cube computation is a well-known expensive operation and has been studied extensively. It is often not feasible to compute a complete data cube due to the huge storage requirement. Recently proposed quotient cube... Data cube computation is a well-known expensive operation and has been studied extensively. It is often not feasible to compute a complete data cube due to the huge storage requirement. Recently proposed quotient cube addressed this fundamental issue through a partitioning method that groups cube cells into equivalent partitions. The effectiveness and efficiency of the quotient cube for cube compression and computation have been proved. However, as changes are made to the data sources, to maintain such a quotient cube is non-trivial since the equivalent classes in it must be split or merged. In this paper, incremental algorithms are designed to update existing quotient cube efficiently based on Galois lattice. Performance study shows that these algorithms are efficient and scalable for large databases. 展开更多
关键词 Galois lattice quotient cube incremental maintenance
原文传递
A Cost Effective Fault—Tolerant Scheme for RAIDs 被引量:1
12
作者 方粮 卢锡城 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第2期230-234,共5页
The rapid progress in mass storage technology has made it possible for designersto implement large data storage systems for a variety of applications. One of the efficient waysto build large storage systems is to use ... The rapid progress in mass storage technology has made it possible for designersto implement large data storage systems for a variety of applications. One of the efficient waysto build large storage systems is to use RAIDs as basic storage modules. In general, the datacan be recovered in RAIDs only when one error occurs. But in large RAIDs systems, the faultprobability will increase when the number of disks increases, and the use of disks with big storagecapacity will cause the recovering time to prolong, thus the probability of the second disk's faultwill increase. Therefore, it is necessary to develop methods to recover data when two or more errorshave occurred. In this paper, a fault tolerant scheme is proposed based on extended Reed-Solomoncode, a recovery procedure is designed to correct up to two errors which is implemented by softwareand hardware together, and the scheme is verified by computer simulation. In this scheme, only tworedundant disks are used to recover up to two disks' fault. The encoding and decoding methods,and the implementation based on software and hardware are described. The application of thescheme in software RAIDs that are built in cluster computers are also described. Compared withthe existing methods such as EVENODD and DH, the proposed scheme has distinct improvementin implementation and redundancy. 展开更多
原文传递
An Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks
13
作者 JingZheng JinshuSu KanYang 《Journal of Systems Science and Information》 2004年第1期167-174,共8页
In mobile ad hoc networks (MANET), nodes move freely and the distribution of access requests changes dynamically. Replica allocation in such a dynamic environment is a significant challenge. In this paoer, a dynamic a... In mobile ad hoc networks (MANET), nodes move freely and the distribution of access requests changes dynamically. Replica allocation in such a dynamic environment is a significant challenge. In this paoer, a dynamic adaptive replica allocation algorithm that can adapt to the nodes motion is proposed to minimize the communication cost of object access. When changes occur in the access requests of the object or the network topology, each replica node collects access requests from its neighbors and makes decisions locally to expand replica to neighbors or to relinquish the replica. The algorithm dynamically adapts the replica allocation scheme to a local optimal one. Simulation results show that our algorithms efficiently reduce the communication cost of object access in MANET environment. 展开更多
关键词 移动ADHOC网络 MANET 自适应分配算法 读写模型 稳定邻近值
原文传递
Efficient Non—Repudiation Multicast Source Authentication Schemes
14
作者 李先贤 怀进鹏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第6期820-829,共10页
In secure multicast communication, packet source authentication is a bot-tleneck problem due to the dynamic property of the multicast group, unreliability of datatransmission and the large number of data packets. This... In secure multicast communication, packet source authentication is a bot-tleneck problem due to the dynamic property of the multicast group, unreliability of datatransmission and the large number of data packets. This paper proposes a novel authentica-tion scheme called B-MSAS (Balance Multicast Source Authentication Scheme) that can beused to solve this problem, in which a new message authentication technique is introduced.This scheme dramatically reduces the signature size overhead and raises the signature rate. Itprovides the non-repudiation service, high loss resistance, and can easily be scaled up to poten-tially millions of receivers, and hence has a sweeping applicability. It should have applicationsto many practical problems. 展开更多
原文传递
An algorithm Based on Tabu Search for Satisfiability Problem
15
作者 黄文奇 张德富 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第3期340-346,共7页
In this paper,a computationally effective algorithm based on tabu search for solving the satisfiability problem(TSSAT)is proposed.Some novel and efficient heuristic strategies for generating candidate neighborhood of ... In this paper,a computationally effective algorithm based on tabu search for solving the satisfiability problem(TSSAT)is proposed.Some novel and efficient heuristic strategies for generating candidate neighborhood of the curred assignment and selecting varibables to be flipped are presented. Especially,the aspiration criterion and tabu list tructure of TSSAT are different from those of traditional tabu search.Computational experiments on a class of problem insteances show that,TSSAT,in a reasonable amount of computer time ,yields better results than Novelty which is currently among the fastest known.Therefore TSSAT is feasible and effective. 展开更多
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部