首页 > 最新文献

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)最新文献

英文 中文
On Testing Multi-threaded Java Programs 关于测试多线程Java程序
Xufang Gong, Yancheng Wang, Ying Zhou, Bixin Li
It is in general more difficult to test a concurrent program than a sequential program, as different programming language provide different implementations of concurrency mechanism. For instance, Java language implements concurrency by using multi-thread. Therefore, we should have corresponding way to test multithreaded Java programs. In this article, an approach of reachability testing based on extended synchronization sequence is proposed to test Java multithread programs: a kind of Java multi-thread flow diagram is constructed at first, all extended synchronization sequences are computed based on some prefixes secondly, and the deterministic testing is performed based on extended synchronization sequence finally. The validity of the approach is showed by some cases analysis.
通常,测试并发程序比测试顺序程序更困难,因为不同的编程语言提供了不同的并发机制实现。例如,Java语言通过使用多线程实现并发性。因此,我们应该有相应的方法来测试多线程Java程序。本文提出了一种基于扩展同步序列的可达性测试方法来测试Java多线程程序:首先构造一种Java多线程流程图,然后根据一些前缀计算所有扩展同步序列,最后基于扩展同步序列进行确定性测试。算例分析表明了该方法的有效性。
{"title":"On Testing Multi-threaded Java Programs","authors":"Xufang Gong, Yancheng Wang, Ying Zhou, Bixin Li","doi":"10.1109/SNPD.2007.165","DOIUrl":"https://doi.org/10.1109/SNPD.2007.165","url":null,"abstract":"It is in general more difficult to test a concurrent program than a sequential program, as different programming language provide different implementations of concurrency mechanism. For instance, Java language implements concurrency by using multi-thread. Therefore, we should have corresponding way to test multithreaded Java programs. In this article, an approach of reachability testing based on extended synchronization sequence is proposed to test Java multithread programs: a kind of Java multi-thread flow diagram is constructed at first, all extended synchronization sequences are computed based on some prefixes secondly, and the deterministic testing is performed based on extended synchronization sequence finally. The validity of the approach is showed by some cases analysis.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Bitmap Filtering: An Efficient Speedup Method for XML Structural Matching 位图过滤:一种有效的XML结构匹配加速方法
F. Shao, Gang Chen, Lihua Yu, Yijun Bei, Jinxiang Dong
With the proliferation of XML data on the internet, there is a large demand for efficient techniques in XML structural matching. We propose a novel filtering method, which is based on two auxiliary bitmaps named suffix bitmap and prefix bitmap, to accelerate XML structural matching. For each node in the XML document, the suffix bitmap captures in a compact format the tag name list of suffix subtree, and the prefix bitmap captures the tag name list of prefix path respectively. During the structural matching, most of unmatched node candidates can be filtered efficiently by comparing the respective bitmaps. We integrate the bitmap filtering into two categories of structural matching algorithms which are navigation-based algorithms and join-based algorithms. The experimental results demonstrate that the bitmap filtering can improve significantly the performance of XML structural matching.
随着internet上XML数据的激增,对高效的XML结构匹配技术提出了很大的需求。提出了一种基于后缀位图和前缀位图的辅助过滤方法,以加快XML结构匹配的速度。对于XML文档中的每个节点,后缀位图分别以压缩格式捕获后缀子树的标记名称列表,前缀位图捕获前缀路径的标记名称列表。在结构匹配过程中,通过比较各自的位图,可以有效地过滤掉大部分不匹配的候选节点。我们将位图滤波分为两类结构匹配算法,即基于导航的算法和基于连接的算法。实验结果表明,位图滤波能显著提高XML结构匹配的性能。
{"title":"Bitmap Filtering: An Efficient Speedup Method for XML Structural Matching","authors":"F. Shao, Gang Chen, Lihua Yu, Yijun Bei, Jinxiang Dong","doi":"10.1109/SNPD.2007.376","DOIUrl":"https://doi.org/10.1109/SNPD.2007.376","url":null,"abstract":"With the proliferation of XML data on the internet, there is a large demand for efficient techniques in XML structural matching. We propose a novel filtering method, which is based on two auxiliary bitmaps named suffix bitmap and prefix bitmap, to accelerate XML structural matching. For each node in the XML document, the suffix bitmap captures in a compact format the tag name list of suffix subtree, and the prefix bitmap captures the tag name list of prefix path respectively. During the structural matching, most of unmatched node candidates can be filtered efficiently by comparing the respective bitmaps. We integrate the bitmap filtering into two categories of structural matching algorithms which are navigation-based algorithms and join-based algorithms. The experimental results demonstrate that the bitmap filtering can improve significantly the performance of XML structural matching.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Alert Verification Based on Attack Classification in Collaborative Intrusion Detection 协同入侵检测中基于攻击分类的警报验证
Min Xiao, Debao Xiao
The traditional intrusion detection system has the disadvantages of alert flooding and high false positive due to weak collaboration-awareness. The collaborative intrusion detection mechanism is advocated to overcome shortcomings of traditional IDS and alert verification and correlation are two important techniques to perform collaborative mechanisms. The goal of alert verification is to distinguish the false positives from true positives or confirm the confidence of the alert by integrating context information of protected network with alerts. In this paper, we present an alert verification scheme based on attack classification to achieve the objectives of low cost and high efficiency of verification process.
传统的入侵检测系统由于协作意识较弱,存在报警泛滥、误报率高的缺点。协作入侵检测机制是为了克服传统入侵检测方法的不足而提出的,警报验证和关联是实现协作机制的两种重要技术。警报验证的目标是通过将被保护网络的上下文信息与警报相结合,区分假阳性和真阳性,或确认警报的置信度。本文提出了一种基于攻击分类的警报验证方案,以实现验证过程的低成本和高效率。
{"title":"Alert Verification Based on Attack Classification in Collaborative Intrusion Detection","authors":"Min Xiao, Debao Xiao","doi":"10.1109/SNPD.2007.216","DOIUrl":"https://doi.org/10.1109/SNPD.2007.216","url":null,"abstract":"The traditional intrusion detection system has the disadvantages of alert flooding and high false positive due to weak collaboration-awareness. The collaborative intrusion detection mechanism is advocated to overcome shortcomings of traditional IDS and alert verification and correlation are two important techniques to perform collaborative mechanisms. The goal of alert verification is to distinguish the false positives from true positives or confirm the confidence of the alert by integrating context information of protected network with alerts. In this paper, we present an alert verification scheme based on attack classification to achieve the objectives of low cost and high efficiency of verification process.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network 基于多跳网络的蜂窝网络与认知无线电相结合的扩展移动管理挑战
Xiuhua Fu, Wen’an Zhou, Junli Xu, Junde Song
The combination of cellular networks with wireless ad-hoc networks composed of cognitive radio (CR) enabled terminals can not only address the inherent capacity and coverage limitations, but also increase the spectrum utilization as a result of opportunistic spectrum usage characterized by cognitive radio. In this paper, the network environment is referred to as CR-MANET, including location management, network handoff, spectrum handoff where the traditional concept of mobility management is largely extended. After several anticipatory challenges facing the CR-MANET being brought forward in this paper, an appropriate model for cooperative and cross-layer design is proposed. Finally, the main open research issues for efficient spectrum handoff and network mobility management are analyzed detail, which include spectrum handoff and performance optimization, location areas management, location update and paging, network handoff and QoS guarantee.
蜂窝网络与由认知无线电(CR)终端组成的无线自组织网络相结合,不仅可以解决固有的容量和覆盖限制,而且由于以认知无线电为特征的机会性频谱使用,可以提高频谱利用率。本文将网络环境称为CR-MANET,包括位置管理、网络切换、频谱切换,对传统的移动性管理概念进行了很大的扩展。在提出CR-MANET面临的几个挑战的基础上,提出了一种合适的协同跨层设计模型。最后,详细分析了高效频谱切换与网络移动性管理的主要开放性研究问题,包括频谱切换与性能优化、位置区域管理、位置更新与寻呼、网络切换与QoS保障。
{"title":"Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network","authors":"Xiuhua Fu, Wen’an Zhou, Junli Xu, Junde Song","doi":"10.1109/SNPD.2007.172","DOIUrl":"https://doi.org/10.1109/SNPD.2007.172","url":null,"abstract":"The combination of cellular networks with wireless ad-hoc networks composed of cognitive radio (CR) enabled terminals can not only address the inherent capacity and coverage limitations, but also increase the spectrum utilization as a result of opportunistic spectrum usage characterized by cognitive radio. In this paper, the network environment is referred to as CR-MANET, including location management, network handoff, spectrum handoff where the traditional concept of mobility management is largely extended. After several anticipatory challenges facing the CR-MANET being brought forward in this paper, an appropriate model for cooperative and cross-layer design is proposed. Finally, the main open research issues for efficient spectrum handoff and network mobility management are analyzed detail, which include spectrum handoff and performance optimization, location areas management, location update and paging, network handoff and QoS guarantee.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence 一种基于群体智能的自动目标检测后处理算法
Chen Zhuo, Liu Xiangshuang, Zhu Xiaodong
Presently, most target detection post-processing algorithms are short of self-adapting, which make them have many limitations in automatic target detection from the digital images. Therefore this paper provides a new type of automatic target detection post-processing algorithm (CASI) which adopts clustering algorithm based on swarm intelligence to post-process the detected target pixels. Because of the characteristics of self-organization, robustness, expandability and simplicity, CASI can self-adaptively restore the target pixels, divide them into different targets and delete the false alarm targets. Experimental results conform that the target detection post-processing effect of this new type of algorithm is much better than the ones of morphological transformation in common use.
目前,大多数目标检测后处理算法缺乏自适应能力,这使得它们在从数字图像中自动检测目标方面存在许多局限性。为此,本文提出了一种新型的自动目标检测后处理算法(CASI),该算法采用基于群体智能的聚类算法对检测到的目标像素进行后处理。CASI具有自组织、鲁棒性、可扩展性和简单性等特点,能够自适应地恢复目标像素,将目标像素划分为不同的目标,并删除虚警目标。实验结果表明,该算法的目标检测后处理效果明显优于常用的形态学变换算法。
{"title":"An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence","authors":"Chen Zhuo, Liu Xiangshuang, Zhu Xiaodong","doi":"10.1109/SNPD.2007.142","DOIUrl":"https://doi.org/10.1109/SNPD.2007.142","url":null,"abstract":"Presently, most target detection post-processing algorithms are short of self-adapting, which make them have many limitations in automatic target detection from the digital images. Therefore this paper provides a new type of automatic target detection post-processing algorithm (CASI) which adopts clustering algorithm based on swarm intelligence to post-process the detected target pixels. Because of the characteristics of self-organization, robustness, expandability and simplicity, CASI can self-adaptively restore the target pixels, divide them into different targets and delete the false alarm targets. Experimental results conform that the target detection post-processing effect of this new type of algorithm is much better than the ones of morphological transformation in common use.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coal Thickness Prediction Based on Support Vector Machine Regression 基于支持向量机回归的煤厚预测
ZhengWei Li, Shixiong Xia, Niuqiang, Zhanguo Xia
A novel method based on support vector machine for coal thickness prediction through seismic attribute technology is proposed in this paper. Based on SVM which embodies the structural risk minimization principle, the proposed method is more generalized in performance and accurate than artificial neural network which embodies the embodies risk minimization principle. In order to improve prediction accuracy, grid search and cross-validation are integrated in this paper to select SIM parameter. Error analysis of predicting coal thickness is carried out to prove that SIM could achieve greater accuracy than the BP neural network.
提出了一种基于支持向量机的基于地震属性技术的煤层厚度预测方法。该方法基于体现结构风险最小化原则的支持向量机,比体现风险最小化原则的人工神经网络在性能上具有更强的泛化性和准确性。为了提高预测精度,本文采用网格搜索和交叉验证相结合的方法选择SIM参数。通过对煤厚预测的误差分析,证明了该方法比BP神经网络具有更高的预测精度。
{"title":"Coal Thickness Prediction Based on Support Vector Machine Regression","authors":"ZhengWei Li, Shixiong Xia, Niuqiang, Zhanguo Xia","doi":"10.1109/SNPD.2007.226","DOIUrl":"https://doi.org/10.1109/SNPD.2007.226","url":null,"abstract":"A novel method based on support vector machine for coal thickness prediction through seismic attribute technology is proposed in this paper. Based on SVM which embodies the structural risk minimization principle, the proposed method is more generalized in performance and accurate than artificial neural network which embodies the embodies risk minimization principle. In order to improve prediction accuracy, grid search and cross-validation are integrated in this paper to select SIM parameter. Error analysis of predicting coal thickness is carried out to prove that SIM could achieve greater accuracy than the BP neural network.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Cluster-Cluster Design for Sensor Network with Guaranteed Capacity and Fault Tolerance 具有保证容量和容错的传感器网络最优集群设计
B. Zeng, Jun Wei, Tao Hu
Sensor networks have recently gained a lot of attention from the research community. To ensure scalability sensor networks are often partitioned into clusters, each managed by a cluster head. Since sensors self organize in the form of clusters within a hierarchal wireless sensor network, it is necessary for a sensor node to perform target tracking cooperating with a set of sensors that belong to another cluster. The increased flexibility allows for efficient and optimized use of sensor nodes. While most of the previous research focused on the optimal communication of sensors in one cluster, very little attention has been paid to the efficiency of cooperation among the clusters. This paper proposes a heuristic algorithm of designing optimal structure across clusters to allow the inter-cluster flow of communication and resource sharing under reliability constraints. Such a guarantee simultaneously provides fault tolerance against node failures and high capacity through multi-path routing.
传感器网络最近受到了研究界的广泛关注。为了确保可伸缩性,传感器网络通常被划分为集群,每个集群由一个集群头管理。由于传感器在分层无线传感器网络中以簇的形式自组织,因此传感器节点需要与属于另一个簇的一组传感器协同进行目标跟踪。增加的灵活性允许有效和优化传感器节点的使用。以往的研究大多集中在一个集群中传感器的最优通信,而很少关注集群之间的合作效率。本文提出了一种启发式算法来设计集群间的最优结构,在可靠性约束下实现集群间的通信流和资源共享。这种保证同时提供了对节点故障的容错能力和通过多路径路由的高容量。
{"title":"Optimal Cluster-Cluster Design for Sensor Network with Guaranteed Capacity and Fault Tolerance","authors":"B. Zeng, Jun Wei, Tao Hu","doi":"10.1109/SNPD.2007.225","DOIUrl":"https://doi.org/10.1109/SNPD.2007.225","url":null,"abstract":"Sensor networks have recently gained a lot of attention from the research community. To ensure scalability sensor networks are often partitioned into clusters, each managed by a cluster head. Since sensors self organize in the form of clusters within a hierarchal wireless sensor network, it is necessary for a sensor node to perform target tracking cooperating with a set of sensors that belong to another cluster. The increased flexibility allows for efficient and optimized use of sensor nodes. While most of the previous research focused on the optimal communication of sensors in one cluster, very little attention has been paid to the efficiency of cooperation among the clusters. This paper proposes a heuristic algorithm of designing optimal structure across clusters to allow the inter-cluster flow of communication and resource sharing under reliability constraints. Such a guarantee simultaneously provides fault tolerance against node failures and high capacity through multi-path routing.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115427975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Reputation System with Privacy and Incentive 具有隐私和激励的声誉系统
Yang Bo, Zhou Min, Li Guohuan
Reputation systems are designed for reducing the risk entailed in interactions among total strangers in electronic marketplaces. Such systems can be used to collect and aggregate feedback on the past behavior of participants in electronic transactions, so as to derive reputation scores assumed to predict likely future behavior. Privacy and incentive are mainly concerns in secure reputation systems for feedback providers to providing rating. In this paper, a reputation system is proposed, in which, feedback providers ' privacy can be achieved through anonymous technique by using smart card, incentive for feedback provider to provide rating can be achieved through discount token technique by using hash chain.
信誉系统的设计是为了降低电子市场中陌生人之间互动所带来的风险。这样的系统可以用来收集和汇总关于电子交易参与者过去行为的反馈,从而得出信誉分数,以预测未来可能的行为。在安全信誉系统中,隐私和激励是反馈提供者提供评级的主要问题。本文提出了一种信誉系统,其中反馈提供者的隐私可以通过智能卡匿名技术实现,反馈提供者提供评级的激励可以通过哈希链的折扣令牌技术实现。
{"title":"A Reputation System with Privacy and Incentive","authors":"Yang Bo, Zhou Min, Li Guohuan","doi":"10.1109/SNPD.2007.91","DOIUrl":"https://doi.org/10.1109/SNPD.2007.91","url":null,"abstract":"Reputation systems are designed for reducing the risk entailed in interactions among total strangers in electronic marketplaces. Such systems can be used to collect and aggregate feedback on the past behavior of participants in electronic transactions, so as to derive reputation scores assumed to predict likely future behavior. Privacy and incentive are mainly concerns in secure reputation systems for feedback providers to providing rating. In this paper, a reputation system is proposed, in which, feedback providers ' privacy can be achieved through anonymous technique by using smart card, incentive for feedback provider to provide rating can be achieved through discount token technique by using hash chain.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123912938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Distributed Parallel Algorithm For Nonlinear OptimizationWithout Derivatives 无导数非线性优化的分布式并行算法
Congying Han, G. He, Huanqing Cui, Xuping Zhang
This paper formulates a pattern search method for nonlinear programming. A distributed parallel algorithm is given based on the pattern search method by distributing the direction to every processor. Promising experimental results of the distributed parallel pattern method are obtained on a sixteen-machines cluster system by running the environment MPI.
本文提出了一种非线性规划的模式搜索方法。提出了一种基于模式搜索的分布式并行算法,将方向分配到各个处理器。通过运行MPI环境,在一个16机集群系统上进行了分布式并行模式方法的实验,获得了良好的实验结果。
{"title":"Distributed Parallel Algorithm For Nonlinear OptimizationWithout Derivatives","authors":"Congying Han, G. He, Huanqing Cui, Xuping Zhang","doi":"10.1109/SNPD.2007.105","DOIUrl":"https://doi.org/10.1109/SNPD.2007.105","url":null,"abstract":"This paper formulates a pattern search method for nonlinear programming. A distributed parallel algorithm is given based on the pattern search method by distributing the direction to every processor. Promising experimental results of the distributed parallel pattern method are obtained on a sixteen-machines cluster system by running the environment MPI.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Perfect Concurrent Signature Protocol 完美并发签名协议
Zhenjie Huang, Rufen Huang, Xuanzhi Lin
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from any third party's point of view until the release of a secret, known as the keystone. Once the keystone is released, both signatures become binding to their respective signers concurrently. Later, a stronger notion called perfect concurrent signatures with two concrete schemes was proposed by Susilo, Mu and Zhang. In perfect concurrent signatures, although both signers are known to be trustworthy, the two signatures are still ambiguous to any third party. Unfortunately, Susilo et al.'s schemes are unfair. In this paper, we first show that in their schemes the initial signer can cheat the matching signer by carefully choosing some communication value and then propose fair perfect concurrent signature protocol to fix our attacks.
并发签名的概念是由Chen, Kudla和Paterson在他们2004年发表在Eurocrypt上的开创性论文中引入的,该论文允许两个实体以这样一种方式产生两个签名,每个签名的签名者从任何第三方的角度来看都是模糊的,直到一个被称为keystone的秘密被释放。一旦keystone被释放,两个签名将同时绑定到各自的签名者。后来,Susilo, Mu和Zhang提出了一个更强的概念,即具有两个具体方案的完美并发签名。在完美并发签名中,尽管已知两个签名者都是可信的,但两个签名对任何第三方来说仍然是不明确的。不幸的是,Susilo等人的方案是不公平的。在本文中,我们首先证明了在他们的方案中,初始签名者可以通过精心选择一些通信值来欺骗匹配签名者,然后提出了公平完善的并发签名协议来修复我们的攻击。
{"title":"Perfect Concurrent Signature Protocol","authors":"Zhenjie Huang, Rufen Huang, Xuanzhi Lin","doi":"10.1109/SNPD.2007.366","DOIUrl":"https://doi.org/10.1109/SNPD.2007.366","url":null,"abstract":"The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from any third party's point of view until the release of a secret, known as the keystone. Once the keystone is released, both signatures become binding to their respective signers concurrently. Later, a stronger notion called perfect concurrent signatures with two concrete schemes was proposed by Susilo, Mu and Zhang. In perfect concurrent signatures, although both signers are known to be trustworthy, the two signatures are still ambiguous to any third party. Unfortunately, Susilo et al.'s schemes are unfair. In this paper, we first show that in their schemes the initial signer can cheat the matching signer by carefully choosing some communication value and then propose fair perfect concurrent signature protocol to fix our attacks.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124266259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1