首页 > 最新文献

2009 Second International Workshop on Knowledge Discovery and Data Mining最新文献

英文 中文
A Novel Region-based Image Annotation Using Multi-instance Learning 基于多实例学习的区域图像标注
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.89
Xiaohong Hu, Xu Qian, Xinming Ma, Ziqiang Wang
In this paper, we formulate image annotation as a semi-supervised learning problem under multi-instance learning framework. A novel graph based semi-supervised learning approach to image annotation using multiple instances is presented, which extends the conventional semi-supervised learning to multi-instance setting by introducing the adaptive geometric relationship between two bags of instances. The experiments over Corel images have shown that this approach outperforms other methods and is effective for image annotation.
本文将图像标注表述为多实例学习框架下的半监督学习问题。提出了一种新的基于图的多实例图像标注半监督学习方法,通过引入实例间的自适应几何关系,将传统的半监督学习扩展到多实例设置。在Corel图像上的实验表明,该方法优于其他方法,是一种有效的图像标注方法。
{"title":"A Novel Region-based Image Annotation Using Multi-instance Learning","authors":"Xiaohong Hu, Xu Qian, Xinming Ma, Ziqiang Wang","doi":"10.1109/WKDD.2009.89","DOIUrl":"https://doi.org/10.1109/WKDD.2009.89","url":null,"abstract":"In this paper, we formulate image annotation as a semi-supervised learning problem under multi-instance learning framework. A novel graph based semi-supervised learning approach to image annotation using multiple instances is presented, which extends the conventional semi-supervised learning to multi-instance setting by introducing the adaptive geometric relationship between two bags of instances. The experiments over Corel images have shown that this approach outperforms other methods and is effective for image annotation.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129869892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unifying Density-Based Clustering and Outlier Detection 统一基于密度的聚类和离群点检测
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.127
Yunxin Tao, D. Pi
Density-based clustering and density-based outlier detection have been extensively studied in the data mining. However, Existing works address density-based clustering or density-based outlier detection solely. But for many scenarios, it is more meaningful to unify density-based clustering and outlier detection when both the clustering and outlier detection results are needed simultaneously. In this paper, a novel algorithm named DBCOD that unifies density-based clustering and outlier detection is proposed. In order to discover density-based clusters and assign to each outlier a degree of being an outlier, a novel concept called neighborhood-based local density factor (NLDF) is employed. The experimental results on different shape, large-scale, and high-dimensional databases demonstrate the effectiveness and efficiency of our method.
基于密度的聚类和基于密度的离群点检测在数据挖掘中得到了广泛的研究。然而,现有的工作只涉及基于密度的聚类或基于密度的离群点检测。但在很多场景下,当同时需要聚类和离群点检测结果时,统一基于密度的聚类和离群点检测更有意义。本文提出了一种将基于密度的聚类和离群点检测相结合的DBCOD算法。为了发现基于密度的聚类,并为每个离群值分配离群值的程度,采用了基于邻域的局部密度因子(NLDF)的新概念。在不同形状、大规模和高维数据库上的实验结果证明了该方法的有效性和高效性。
{"title":"Unifying Density-Based Clustering and Outlier Detection","authors":"Yunxin Tao, D. Pi","doi":"10.1109/WKDD.2009.127","DOIUrl":"https://doi.org/10.1109/WKDD.2009.127","url":null,"abstract":"Density-based clustering and density-based outlier detection have been extensively studied in the data mining. However, Existing works address density-based clustering or density-based outlier detection solely. But for many scenarios, it is more meaningful to unify density-based clustering and outlier detection when both the clustering and outlier detection results are needed simultaneously. In this paper, a novel algorithm named DBCOD that unifies density-based clustering and outlier detection is proposed. In order to discover density-based clusters and assign to each outlier a degree of being an outlier, a novel concept called neighborhood-based local density factor (NLDF) is employed. The experimental results on different shape, large-scale, and high-dimensional databases demonstrate the effectiveness and efficiency of our method.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application 隐私保护的三种新方法及其应用
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.34
Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Yonglong Luo, Fan Dong
Privacy-preserving Data Mining aims at securely extracting knowledge from two or more parties' private data. Secure Multi-party Computation is the paramount approach to it. In this paper, we study Privacy-preserving Add and Multiply Exchanging Technology and present three new different approaches to Privacy-preserving Add to Multiply Protocol. After that, we analyze and compare the three different approaches about the communication overheads, the computation efforts and the security. In addition, we extend Privacy-preserving Add to Multiply Protocol to Privacy-preserving Adding to Scalar Product Protocol, which is more secure and more useful in the high security situations of Privacy-preserving Data Mining. Meantime, we present a solution for the new protocol.
保护隐私的数据挖掘旨在从双方或多方的私有数据中安全地提取知识。安全多方计算是最重要的方法。本文研究了保护隐私的加乘交换技术,提出了三种不同的保护隐私的加乘协议的新方法。然后,从通信开销、计算量和安全性三个方面对三种不同的方法进行了分析和比较。此外,我们将隐私保护乘法相加协议扩展为隐私保护标量乘积相加协议,该协议在隐私保护数据挖掘的高安全情况下更安全、更有用。同时,对新协议提出了一种解决方案。
{"title":"Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application","authors":"Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Yonglong Luo, Fan Dong","doi":"10.1109/WKDD.2009.34","DOIUrl":"https://doi.org/10.1109/WKDD.2009.34","url":null,"abstract":"Privacy-preserving Data Mining aims at securely extracting knowledge from two or more parties' private data. Secure Multi-party Computation is the paramount approach to it. In this paper, we study Privacy-preserving Add and Multiply Exchanging Technology and present three new different approaches to Privacy-preserving Add to Multiply Protocol. After that, we analyze and compare the three different approaches about the communication overheads, the computation efforts and the security. In addition, we extend Privacy-preserving Add to Multiply Protocol to Privacy-preserving Adding to Scalar Product Protocol, which is more secure and more useful in the high security situations of Privacy-preserving Data Mining. Meantime, we present a solution for the new protocol.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128709781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An Efficient Viterbi Decoder for Digital Mobile Multimedia Broadcasting Receiver 数字移动多媒体广播接收机的高效维特比解码器
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.196
Hongli Zhu, G. Gao, Gang Bi
In the design of Viterbi Decoder of punctured convolutional codes, the SST method is used to reduce power consumption in this paper. Moreover, the punctured vector table is optimized by hard wire logic, thus reducing the area required by the system. Effective operation of adjustment is used to reduce the word length of path metric memory. At the same time, this algorithm can also help reduce operation load by controlling the highest order of path metric memory, thereby reducing the scale of hardware.
在穿孔卷积码的维特比解码器设计中,本文采用了SST方法来降低功耗。此外,穿孔矢量表通过硬线逻辑进行了优化,从而减少了系统所需的面积。采用有效的调整操作来减小路径度量存储器的字长。同时,该算法还可以通过控制路径度量内存的最高阶来减少操作负载,从而减小硬件的规模。
{"title":"An Efficient Viterbi Decoder for Digital Mobile Multimedia Broadcasting Receiver","authors":"Hongli Zhu, G. Gao, Gang Bi","doi":"10.1109/WKDD.2009.196","DOIUrl":"https://doi.org/10.1109/WKDD.2009.196","url":null,"abstract":"In the design of Viterbi Decoder of punctured convolutional codes, the SST method is used to reduce power consumption in this paper. Moreover, the punctured vector table is optimized by hard wire logic, thus reducing the area required by the system. Effective operation of adjustment is used to reduce the word length of path metric memory. At the same time, this algorithm can also help reduce operation load by controlling the highest order of path metric memory, thereby reducing the scale of hardware.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"31 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Tree Segmentation-based Ontology Mapping 基于树分割的本体映射研究
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.135
Liansheng Li, Lihui Huang, Qinghua Guan, Dezhi Xu
Ontology mapping is a core task to achieve interoperability among the distributed and heterogeneous ontologies. The quality of ontology mapping is still not good due to the inconsideration of semantic information of the ontology. This paper proposes an ontology mapping method based on tree segmentation. It first divides the ontology into a set of sub-trees with different granularities according to the structure of the ontologies, then use Sub-tree Mapping Algorithm to map them. Preliminary experiments demonstrate that the proposed mapping method performs well in both precision and recall compared with the current mapping methods.
本体映射是实现分布式和异构本体互操作的核心任务。由于没有考虑本体的语义信息,本体映射的质量仍然不高。提出了一种基于树分割的本体映射方法。首先根据本体的结构将本体划分为一组不同粒度的子树,然后使用子树映射算法对其进行映射。初步实验表明,与现有的映射方法相比,所提出的映射方法在查全率和查全率方面都有较好的提高。
{"title":"Research on Tree Segmentation-based Ontology Mapping","authors":"Liansheng Li, Lihui Huang, Qinghua Guan, Dezhi Xu","doi":"10.1109/WKDD.2009.135","DOIUrl":"https://doi.org/10.1109/WKDD.2009.135","url":null,"abstract":"Ontology mapping is a core task to achieve interoperability among the distributed and heterogeneous ontologies. The quality of ontology mapping is still not good due to the inconsideration of semantic information of the ontology. This paper proposes an ontology mapping method based on tree segmentation. It first divides the ontology into a set of sub-trees with different granularities according to the structure of the ontologies, then use Sub-tree Mapping Algorithm to map them. Preliminary experiments demonstrate that the proposed mapping method performs well in both precision and recall compared with the current mapping methods.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Blog Based Personal Knowledge Management 基于博客的个人知识管理研究
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.166
Gang Li, Yi Li
Personal knowledge management is an increasingly important subject in the field of knowledge management, and it has its own characteristics distinguished from organizational knowledge management. The PKM systems are required to manage personal tacit knowledge efficiently and to low down its threshold for the use for the mass people, which recent knowledge management systems cannot make. Blog, the typical web2.0 application, gives an effective approach for this problem to support PKM. A blog based PKM system is deemed to be possible and to meet the urgent needs for PKM of individuals.
个人知识管理是知识管理领域中一个日益重要的课题,它与组织知识管理有其不同的特点。知识管理系统需要有效地管理个人隐性知识,降低隐性知识为大众使用的门槛,这是现有知识管理系统无法做到的。Blog作为典型的web2.0应用程序,为这个问题提供了支持PKM的有效方法。以部落格为基础的个人知识管理系统是可行的,也能满足个人知识管理的迫切需求。
{"title":"A Study on Blog Based Personal Knowledge Management","authors":"Gang Li, Yi Li","doi":"10.1109/WKDD.2009.166","DOIUrl":"https://doi.org/10.1109/WKDD.2009.166","url":null,"abstract":"Personal knowledge management is an increasingly important subject in the field of knowledge management, and it has its own characteristics distinguished from organizational knowledge management. The PKM systems are required to manage personal tacit knowledge efficiently and to low down its threshold for the use for the mass people, which recent knowledge management systems cannot make. Blog, the typical web2.0 application, gives an effective approach for this problem to support PKM. A blog based PKM system is deemed to be possible and to meet the urgent needs for PKM of individuals.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127210375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Association Classification Based on Compactness of Rules 基于规则紧密度的关联分类
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.160
Q. Niu, Shixiong Xia, Lei Zhang
Associative classification has high classification accuracy and strong flexibility. However, it still suffers from overfitting since the classification rules satisfied both minimum support and minimum confidence are returned as strong association rules back to the classifier. In this paper, we propose a new association classification method based on compactness of rules, it extends Apriori Algorithm¿which considers the interestingness, importance, overlapping relationships among rules. At last, experimental results shows that the algorithm has better classification accuracy in comparison with CBA and CMAR are highly comprehensible and scalable.
关联分类具有分类精度高、灵活性强的特点。然而,由于满足最小支持度和最小置信度的分类规则作为强关联规则返回给分类器,因此它仍然存在过拟合的问题。本文提出了一种基于规则紧密度的关联分类方法,它扩展了Apriori算法,该算法考虑了规则之间的兴趣度、重要性和重叠关系。最后,实验结果表明,该算法与CBA相比具有更好的分类精度,CMAR具有较高的可理解性和可扩展性。
{"title":"Association Classification Based on Compactness of Rules","authors":"Q. Niu, Shixiong Xia, Lei Zhang","doi":"10.1109/WKDD.2009.160","DOIUrl":"https://doi.org/10.1109/WKDD.2009.160","url":null,"abstract":"Associative classification has high classification accuracy and strong flexibility. However, it still suffers from overfitting since the classification rules satisfied both minimum support and minimum confidence are returned as strong association rules back to the classifier. In this paper, we propose a new association classification method based on compactness of rules, it extends Apriori Algorithm¿which considers the interestingness, importance, overlapping relationships among rules. At last, experimental results shows that the algorithm has better classification accuracy in comparison with CBA and CMAR are highly comprehensible and scalable.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Bicluster Algorithm and Used in Market Analysis 双聚类算法及其在市场分析中的应用
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.224
Shuyong Liu, Yan Chen, Mingyuan Yang, Rui Ding
The premise of the enterprise that implements the product family architecture is the analysis to the sailed products history data, carrying on accuracy demarcation of the customer sets and products sets. But, the traditional cluster methods consist in simultaneous one partitioning of the set of products or the set of customers. In this paper we review the most widely used and successful biclustering techniques and use bicluster consist in simultaneous partitioning of the set of products and the set of customers. The bicluster algorithm is discussed. The results of the improved bicluster algorithm used in the product family architecture analysis show that, compared with traditional cluster methods, the quality of clustering results is enhanced obviously, the mining expression models are better, and the data possess a strong consistency with fluctuation on the condition.
企业实施产品族架构的前提是对所航行的产品历史数据进行分析,对客户集和产品集进行准确的划分。但是,传统的聚类方法是同时对产品集或客户集进行一次划分。本文回顾了应用最广泛和最成功的双聚类技术,并将双聚类应用于产品集和客户集的同时划分。讨论了双聚类算法。将改进的双聚类算法应用于产品族架构分析的结果表明,与传统聚类方法相比,聚类结果的质量明显提高,挖掘表达式模型更好,在条件下数据具有较强的波动性一致性。
{"title":"Bicluster Algorithm and Used in Market Analysis","authors":"Shuyong Liu, Yan Chen, Mingyuan Yang, Rui Ding","doi":"10.1109/WKDD.2009.224","DOIUrl":"https://doi.org/10.1109/WKDD.2009.224","url":null,"abstract":"The premise of the enterprise that implements the product family architecture is the analysis to the sailed products history data, carrying on accuracy demarcation of the customer sets and products sets. But, the traditional cluster methods consist in simultaneous one partitioning of the set of products or the set of customers. In this paper we review the most widely used and successful biclustering techniques and use bicluster consist in simultaneous partitioning of the set of products and the set of customers. The bicluster algorithm is discussed. The results of the improved bicluster algorithm used in the product family architecture analysis show that, compared with traditional cluster methods, the quality of clustering results is enhanced obviously, the mining expression models are better, and the data possess a strong consistency with fluctuation on the condition.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on the Adoption of Electronic Commerce Based on Customer's Behavior 基于顾客行为的电子商务应用研究
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.129
Yuantao Jiang, Yuqin Sun
Since the inception of the Internet in the mid-1990s, e-commerce has grown at a very rapid rate. Firms had realized that they could be pushed to the world stage of the knowledge-based economic by e-commerce. So, most of firms are stepping up to the adoption of those technologies for upgrading their businesses. Regarding the significant role of customers, the study of their behaviors influence on the adoption of e-commerce by the firms becomes a main stream in scholastic path. This paper aims to study the four customer behaviors which influence the adoption of e-commerce technologies by firms. The study results showed that the customer behaviors influence the adoption of e-commerce by firms.
自20世纪90年代中期互联网出现以来,电子商务以非常快的速度增长。企业已经意识到,电子商务可以把它们推向知识经济的世界舞台。因此,大多数公司正在加紧采用这些技术来升级他们的业务。鉴于消费者的重要作用,研究其行为对企业采用电子商务的影响成为学术界的主流。本文旨在研究影响企业采用电子商务技术的四种顾客行为。研究结果表明,顾客行为对企业采用电子商务有影响。
{"title":"Research on the Adoption of Electronic Commerce Based on Customer's Behavior","authors":"Yuantao Jiang, Yuqin Sun","doi":"10.1109/WKDD.2009.129","DOIUrl":"https://doi.org/10.1109/WKDD.2009.129","url":null,"abstract":"Since the inception of the Internet in the mid-1990s, e-commerce has grown at a very rapid rate. Firms had realized that they could be pushed to the world stage of the knowledge-based economic by e-commerce. So, most of firms are stepping up to the adoption of those technologies for upgrading their businesses. Regarding the significant role of customers, the study of their behaviors influence on the adoption of e-commerce by the firms becomes a main stream in scholastic path. This paper aims to study the four customer behaviors which influence the adoption of e-commerce technologies by firms. The study results showed that the customer behaviors influence the adoption of e-commerce by firms.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comment to the Intelligent Functions of Different Weight Ciphers 论不同权重密码的智能功能
Pub Date : 2009-01-23 DOI: 10.1109/WKDD.2009.18
Lan Luo, Zhiguang Qin, Shijie Zhou
For different kinds of scale networks, the different weight ciphers should be designed for adapting various operation environments. In wireless networks or RFID environment, the lightweight ciphers or ultra-lightweight ciphers have been paid more and more attention. At Internet environment, there exist some block cipher algorithms used in top layer but not published block ciphers announce to only design for the other layers. The standardized security protocols of block cipher are oriented to the public level which is seldom considered based on different secure situation in openness Internet environment. And in trusted platform, some modules still need heavy ciphers.  So this paper’s approach is that it needs precise cryptographic system according to different networks and different functions. The scalable and flexible block cipher application is another approach to currently secure standard and the lightweight block cipher design should be paid more attention. In order to expending networks member number easily, some intelligent functions are combined in the design.
对于不同规模的网络,需要设计不同权重的密码以适应不同的运行环境。在无线网络或RFID环境下,轻量级密码或超轻量级密码越来越受到人们的关注。在互联网环境下,存在一些只在顶层使用的分组密码算法,而没有公开的分组密码声明只针对其他层设计。分组密码的标准化安全协议是面向公共层面的,很少考虑到开放的互联网环境下不同的安全情况。而在可信平台上,一些模块仍然需要大量的密码。因此本文的方法是根据不同的网络和不同的功能需要精确的密码系统。可扩展和灵活的分组密码应用是当前安全标准的另一途径,轻量级分组密码设计应得到重视。为了方便扩展网络成员数,在设计中结合了一些智能功能。
{"title":"A Comment to the Intelligent Functions of Different Weight Ciphers","authors":"Lan Luo, Zhiguang Qin, Shijie Zhou","doi":"10.1109/WKDD.2009.18","DOIUrl":"https://doi.org/10.1109/WKDD.2009.18","url":null,"abstract":"For different kinds of scale networks, the different weight ciphers should be designed for adapting various operation environments. In wireless networks or RFID environment, the lightweight ciphers or ultra-lightweight ciphers have been paid more and more attention. At Internet environment, there exist some block cipher algorithms used in top layer but not published block ciphers announce to only design for the other layers. The standardized security protocols of block cipher are oriented to the public level which is seldom considered based on different secure situation in openness Internet environment. And in trusted platform, some modules still need heavy ciphers.  So this paper’s approach is that it needs precise cryptographic system according to different networks and different functions. The scalable and flexible block cipher application is another approach to currently secure standard and the lightweight block cipher design should be paid more attention. In order to expending networks member number easily, some intelligent functions are combined in the design.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116840279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Second International Workshop on Knowledge Discovery and Data Mining
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1