首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Cloud Model-Based Multi-objective Estimation of Distribution Algorithm with Preference Order Ranking 基于云模型的偏好排序分布多目标估计算法
Ying Gao, Waixi Liu
Estimation of distribution algorithms(EDAs) are a class of evolutionary optimization algorithms. In this paper, EDAs scheme are extended to multi-objective optimization problems by using preference order and cloud model. In the algorithm, three digital characteristics from the current population are firstly estimated by backward cloud generator. Afterwards, forward cloud generator used to generate current offsprings population according to three digital characteristics. The population with the current population and current offsprings population is sorted based on preference order, and the best individuals are selected to form the next population. The proposed algorithm is tested to compare with some other algorithms using a set of benchmark functions. The experimental results show that the algorithm is effective on the benchmark functions.
分布估计算法(EDAs)是一类进化优化算法。本文利用偏好顺序和云模型,将EDAs方案扩展到多目标优化问题。该算法首先利用后向云发生器估计当前种群的三个数字特征。然后利用正向云发生器根据三个数字特征生成当前子代种群。根据偏好顺序对当前种群和当前后代种群组成的种群进行排序,选择最优个体组成下一个种群。利用一组基准函数对该算法进行了测试,并与其他算法进行了比较。实验结果表明,该算法在基准函数上是有效的。
{"title":"Cloud Model-Based Multi-objective Estimation of Distribution Algorithm with Preference Order Ranking","authors":"Ying Gao, Waixi Liu","doi":"10.1109/INCoS.2013.71","DOIUrl":"https://doi.org/10.1109/INCoS.2013.71","url":null,"abstract":"Estimation of distribution algorithms(EDAs) are a class of evolutionary optimization algorithms. In this paper, EDAs scheme are extended to multi-objective optimization problems by using preference order and cloud model. In the algorithm, three digital characteristics from the current population are firstly estimated by backward cloud generator. Afterwards, forward cloud generator used to generate current offsprings population according to three digital characteristics. The population with the current population and current offsprings population is sorted based on preference order, and the best individuals are selected to form the next population. The proposed algorithm is tested to compare with some other algorithms using a set of benchmark functions. The experimental results show that the algorithm is effective on the benchmark functions.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System 云存储系统中一种多用户可搜索对称加密方案
Yaling Zhang, Zhipeng Jia, Shangping Wang
How to effectively achieve key-sharing and access authorization is an urgent need of cloud storage. Focused on this issue, we propose a new multi-user searchable symmetric encryption scheme. The new scheme is a conjunction of single user searchable symmetric encryption scheme and identifier-based encryption algorithm, a new data structure is designed to fit our purpose. The new scheme provides the confidentiality of keyword to be searched, and achieves the access controllability of the files, and is a multi user searchable scheme, it has the property of unforgeability of the search trapdoor, and is of dynamic addition and revocation of authorized user.
如何有效地实现密钥共享和访问授权是云存储的迫切需求。针对这一问题,我们提出了一种新的多用户可搜索对称加密方案。该方案结合了单用户可搜索对称加密方案和基于标识符的加密算法,设计了一种新的数据结构。新方案提供了被搜索关键字的保密性,实现了文件的访问可控性,是一种多用户可搜索方案,具有搜索陷门的不可伪造性,并具有动态添加和撤销授权用户的功能。
{"title":"A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System","authors":"Yaling Zhang, Zhipeng Jia, Shangping Wang","doi":"10.1109/INCoS.2013.155","DOIUrl":"https://doi.org/10.1109/INCoS.2013.155","url":null,"abstract":"How to effectively achieve key-sharing and access authorization is an urgent need of cloud storage. Focused on this issue, we propose a new multi-user searchable symmetric encryption scheme. The new scheme is a conjunction of single user searchable symmetric encryption scheme and identifier-based encryption algorithm, a new data structure is designed to fit our purpose. The new scheme provides the confidentiality of keyword to be searched, and achieves the access controllability of the files, and is a multi user searchable scheme, it has the property of unforgeability of the search trapdoor, and is of dynamic addition and revocation of authorized user.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114980095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Network Design Problem by Link Protection to Keep Small Increase of Path Length during Link Failures 基于链路保护的网络设计问题,以保证链路故障时路径长度的小幅增长
Kyosuke Nishida, H. Miwa
Many actual networks face the risk that the quality of service drastically degrades when the length of paths increases by link failure. To get rid of this risk, it is necessary to design a network so that the maximum increase ratio of path length by link failure is small for all paths. Therefore, the critical links whose failures significantly degrade the performance must be protected by rapid recovery so that the failures cannot be detected over the IP layer. The number of protected links must be small to restrict the investment cost for facilities and operational cost for Internet service providers. In this paper, we formulate this link protection problem and prove that the problem is NP-hard. In addition, we propose a polynomial-time algorithm to solve the problem that the number of simultaneous link failures is restricted to one.
许多实际网络都面临着由于链路故障导致路径长度增加而导致服务质量急剧下降的风险。为了消除这种风险,有必要设计一个网络,使所有路径的链路故障导致的路径长度的最大增加比较小。因此,对于故障严重影响性能的关键链路,必须采用快速恢复保护,使IP层无法检测到故障。受保护链路的数量必须小,以限制设施的投资成本和互联网服务提供商的运营成本。在本文中,我们提出了这个链路保护问题,并证明了这个问题是np困难的。此外,我们提出了一种多项式时间算法来解决同时链路故障数限制为1的问题。
{"title":"Network Design Problem by Link Protection to Keep Small Increase of Path Length during Link Failures","authors":"Kyosuke Nishida, H. Miwa","doi":"10.1109/INCoS.2013.159","DOIUrl":"https://doi.org/10.1109/INCoS.2013.159","url":null,"abstract":"Many actual networks face the risk that the quality of service drastically degrades when the length of paths increases by link failure. To get rid of this risk, it is necessary to design a network so that the maximum increase ratio of path length by link failure is small for all paths. Therefore, the critical links whose failures significantly degrade the performance must be protected by rapid recovery so that the failures cannot be detected over the IP layer. The number of protected links must be small to restrict the investment cost for facilities and operational cost for Internet service providers. In this paper, we formulate this link protection problem and prove that the problem is NP-hard. In addition, we propose a polynomial-time algorithm to solve the problem that the number of simultaneous link failures is restricted to one.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133997238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Construction of Proxy Signature Using Chameleon Hash Function 一种基于变色龙哈希函数的代理签名新构造
Yannan Li, Qi Xia, Jianbing Ni, Yong Yu
Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of novel proxy signature scheme, in which the proxy signing efficiency is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption. Our construction makes use a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature, which dramatically reduces the computation cost of the proxy signer. Our analysis demonstrates that the new scheme achieves all the desirable properties that a secure proxy signature scheme should provide.
代理签名是一种功能强大的加密原语,用于委派签名权力。本文提出了一种新的代理签名方案,该方案具有较高的代理签名效率。具体来说,我们从DL假设出发,描述了一种新的高效代理签名方案。我们的构造在委托阶段使用无暴露的变色龙哈希函数,代理签名者只需要找到一个冲突就可以生成一个有效的代理签名,这大大降低了代理签名者的计算成本。我们的分析表明,新方案实现了安全代理签名方案应该提供的所有理想属性。
{"title":"A New Construction of Proxy Signature Using Chameleon Hash Function","authors":"Yannan Li, Qi Xia, Jianbing Ni, Yong Yu","doi":"10.1109/INCoS.2013.73","DOIUrl":"https://doi.org/10.1109/INCoS.2013.73","url":null,"abstract":"Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of novel proxy signature scheme, in which the proxy signing efficiency is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption. Our construction makes use a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature, which dramatically reduces the computation cost of the proxy signer. Our analysis demonstrates that the new scheme achieves all the desirable properties that a secure proxy signature scheme should provide.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132841013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Permanent Magnet Synchronous Linear Motor Position Control Based on Fuzzy Neural Network 基于模糊神经网络的永磁同步直线电机位置控制
Li Cailin, W. Dongmei
A position servo control system based on fuzzy neural network (FNN) is proposed to make the permanent magnet synchronous linear motor(PMLSM) to track the given locus precisely. In the proposed system, Back-Propagation (BP) neural network algorithm based on dynamic structure is employed to change the nodes of hidden layer in learning process and improve the system control effect. The experimental results show the position servo system has a small overshot and good position precision.
提出了一种基于模糊神经网络(FNN)的位置伺服控制系统,使永磁同步直线电机(PMLSM)精确跟踪给定轨迹。该系统采用基于动态结构的BP (Back-Propagation)神经网络算法,在学习过程中改变隐层节点,提高系统控制效果。实验结果表明,该位置伺服系统具有较小的超调量和良好的位置精度。
{"title":"The Permanent Magnet Synchronous Linear Motor Position Control Based on Fuzzy Neural Network","authors":"Li Cailin, W. Dongmei","doi":"10.1109/INCOS.2013.112","DOIUrl":"https://doi.org/10.1109/INCOS.2013.112","url":null,"abstract":"A position servo control system based on fuzzy neural network (FNN) is proposed to make the permanent magnet synchronous linear motor(PMLSM) to track the given locus precisely. In the proposed system, Back-Propagation (BP) neural network algorithm based on dynamic structure is employed to change the nodes of hidden layer in learning process and improve the system control effect. The experimental results show the position servo system has a small overshot and good position precision.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fault and Intrusion Tolerance of Complex Networks: A Controllability View 复杂网络的容错与入侵:可控性观点
Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong
Recent researches about the fault and intrusion tolerance of the complex networks take the topology or functions of the networks as benchmark. This paper shows a novel framework of the fault and intrusion tolerance of complex networks in a controllability view, which takes the number of driver nodes as standard. The result, the SF networks have a better fault tolerance than the ER networks, is consistent with the result considered with available researches. But the SF networks and ER networks have poor intrusion tolerance. The reason is that it is more difficult to fully control the real SF networks than to fully control the real ER networks, so it is easier to thoroughly destroy the controllability of the real SF networks than the real ER networks.
目前关于复杂网络容错和入侵的研究都是以网络的拓扑结构或功能为基准的。本文从可控性的角度提出了一种以驱动节点数量为标准的复杂网络容错入侵框架。结果表明,SF网络比ER网络具有更好的容错能力,与已有研究结果一致。但SF网络和ER网络的入侵容忍度较差。原因在于,完全控制真实的SF网络比完全控制真实的ER网络更困难,因此比真实的ER网络更容易彻底破坏真实的SF网络的可控性。
{"title":"Fault and Intrusion Tolerance of Complex Networks: A Controllability View","authors":"Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong","doi":"10.1109/INCoS.2013.97","DOIUrl":"https://doi.org/10.1109/INCoS.2013.97","url":null,"abstract":"Recent researches about the fault and intrusion tolerance of the complex networks take the topology or functions of the networks as benchmark. This paper shows a novel framework of the fault and intrusion tolerance of complex networks in a controllability view, which takes the number of driver nodes as standard. The result, the SF networks have a better fault tolerance than the ER networks, is consistent with the result considered with available researches. But the SF networks and ER networks have poor intrusion tolerance. The reason is that it is more difficult to fully control the real SF networks than to fully control the real ER networks, so it is easier to thoroughly destroy the controllability of the real SF networks than the real ER networks.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ID-Based Signcryption with Restrictive Unsigncryption 基于id的签名加密和限制反签名加密
Fei Tang, Changlu Lin, Hongda Li
We introduce a novel cryptographic primitive, the Signcryption with Restrictive Unsigncryption (SRU), which means that the sender sign crypts a message and sends the cipher text to a receiver, however, the sender embeds some restrictive conditions into this cipher text. Hence the receiver cannot completely unsigncrypt the cipher text and obtain the original message unless the cipher text is authorized by a third party who is appointed by the sender. Based on this property, the SRU scheme can be applied to many scenarios, such as, digital will, scheduled payment, sealed-bid auction, and so on. We present the formal definitions and security models for the SRU scheme in the identity-based setting, and also construct a concrete ID-SRU scheme using bilinear pairings. Our proposed scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman (BDH) assumption.
本文提出了一种新颖的密码原语——带限制取消密码的签名密码(SRU),即发送方对消息进行加密并将密文发送给接收方,但是发送方在该密文中嵌入一些限制条件。因此,接收方不能完全解除密文的签名并获得原始消息,除非密文得到发送方指定的第三方的授权。基于这一特性,SRU方案可以应用于许多场景,如数字遗嘱、计划付款、密封竞价拍卖等。给出了基于身份的SRU方案的形式化定义和安全模型,并利用双线性对构造了一个具体的ID-SRU方案。在双线性Diffie-Hellman (BDH)假设下,我们提出的方案在随机预言模型下是安全的。
{"title":"ID-Based Signcryption with Restrictive Unsigncryption","authors":"Fei Tang, Changlu Lin, Hongda Li","doi":"10.1109/INCoS.2013.90","DOIUrl":"https://doi.org/10.1109/INCoS.2013.90","url":null,"abstract":"We introduce a novel cryptographic primitive, the Signcryption with Restrictive Unsigncryption (SRU), which means that the sender sign crypts a message and sends the cipher text to a receiver, however, the sender embeds some restrictive conditions into this cipher text. Hence the receiver cannot completely unsigncrypt the cipher text and obtain the original message unless the cipher text is authorized by a third party who is appointed by the sender. Based on this property, the SRU scheme can be applied to many scenarios, such as, digital will, scheduled payment, sealed-bid auction, and so on. We present the formal definitions and security models for the SRU scheme in the identity-based setting, and also construct a concrete ID-SRU scheme using bilinear pairings. Our proposed scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman (BDH) assumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid System for Authentication Service 身份验证服务的混合系统
Yongqiang Zhang, Qiang Liu, Haibo Tian
This paper studies a hybrid system of the public key infrastructure (PKI) and the identity based cryptosystem (IBC). In the hybrid system, an organization runs a private key generator (PKG) and requests a certificate authority to vouch the binding of the PKG's parameters and the organization's distinguished name. Then an authentication scenario is considered where a member of an organization is authenticated by an application server. The whole design pays attention to scalability and adopts caches and password-based protocols for a scalable service and an easy deployment.
本文研究了一个公钥基础设施(PKI)和基于身份的密码系统(IBC)的混合系统。在混合系统中,组织运行一个私钥生成器(PKG),并请求证书颁发机构担保PKG参数与组织专有名称的绑定。然后考虑一个身份验证场景,其中组织的成员由应用程序服务器进行身份验证。整个设计注重可扩展性,采用缓存和基于密码的协议来实现可扩展性和易于部署。
{"title":"A Hybrid System for Authentication Service","authors":"Yongqiang Zhang, Qiang Liu, Haibo Tian","doi":"10.1109/INCoS.2013.156","DOIUrl":"https://doi.org/10.1109/INCoS.2013.156","url":null,"abstract":"This paper studies a hybrid system of the public key infrastructure (PKI) and the identity based cryptosystem (IBC). In the hybrid system, an organization runs a private key generator (PKG) and requests a certificate authority to vouch the binding of the PKG's parameters and the organization's distinguished name. Then an authentication scenario is considered where a member of an organization is authenticated by an application server. The whole design pays attention to scalability and adopts caches and password-based protocols for a scalable service and an easy deployment.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Construction of PVPKE in the Standard Model Based on Factoring Assumption 基于因子分解假设的标准模型中PVPKE的构建
Xu An Wang, Jinting Nie, Yi Ding, Junru Hu
Recently, we introduced an interesting cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in constructing of chosen cipher text secure proxyre-encryption (PRE) and chosen cipher text secure threshold public key encryption (TPKE) [32]. Recently Hofheiz and Kiltz[16] proposed a practical chosen cipher text secure encryption from factoring assumption in the signed quadratic residues group(HK09 scheme). In this paper, we try to modify the HK09 scheme to meet the requirements of PVPKE, that is, how to publicly verify the cipher text's validity. Towards this goal, we propose three schemes and roughly analysis its feature and security. We believe our results will be useful to guide a final good result.
最近,我们引入了一种有趣的密码原语:CCA Secure Public verifiable Public Key Encryption Without pair In the Standard Model (PVPKE),并讨论了其在构建所选密文安全代理加密(PRE)和所选密文安全阈值公钥加密(TPKE)中的应用[32]。最近Hofheiz和Kiltz[16]提出了一种实用的选择密文安全加密方案(HK09方案)。在本文中,我们尝试修改HK09方案以满足PVPKE的要求,即如何公开验证密文的有效性。为此,我们提出了三种方案,并对其特性和安全性进行了粗略分析。我们相信我们的研究结果将有助于指导最终的良好结果。
{"title":"Toward Construction of PVPKE in the Standard Model Based on Factoring Assumption","authors":"Xu An Wang, Jinting Nie, Yi Ding, Junru Hu","doi":"10.1109/INCoS.2013.129","DOIUrl":"https://doi.org/10.1109/INCoS.2013.129","url":null,"abstract":"Recently, we introduced an interesting cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in constructing of chosen cipher text secure proxyre-encryption (PRE) and chosen cipher text secure threshold public key encryption (TPKE) [32]. Recently Hofheiz and Kiltz[16] proposed a practical chosen cipher text secure encryption from factoring assumption in the signed quadratic residues group(HK09 scheme). In this paper, we try to modify the HK09 scheme to meet the requirements of PVPKE, that is, how to publicly verify the cipher text's validity. Towards this goal, we propose three schemes and roughly analysis its feature and security. We believe our results will be useful to guide a final good result.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123253038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of Large Graphs Using GPU Computing 使用GPU计算实现大图形的可视化
T. Ježowicz, M. Kudelka, J. Platoš, V. Snás̃el
Graphs may be used to visualize relationships between objects. Relations are represented by edges and objects are called nodes. When graph is drawn, one can easily see and understand the basic structure of data. Many different applications can be found in social network analysis, computer networks, scientific literature analysis, etc. However drawing large graphs (thousands or a millions of nodes), is still challenging problem. There exist many different algorithms for drawing graphs. Each algorithm has specific behavior and different applications and limits. Some algorithms are focused on quality while others are more suitable for large graphs. This paper aims to speed up the computation using GPU, so larger graphs can be visualized in acceptable time, or visualization can be done even in real-time.
图形可以用来可视化对象之间的关系。关系由边表示,对象称为节点。当绘制图形时,人们可以很容易地看到和理解数据的基本结构。许多不同的应用可以在社会网络分析,计算机网络,科学文献分析等中找到。然而,绘制大型图(数千或数百万个节点)仍然是一个具有挑战性的问题。存在许多不同的绘图算法。每种算法都有特定的行为和不同的应用和限制。一些算法专注于质量,而另一些算法更适合于大型图。本文旨在利用GPU加快计算速度,使更大的图形可以在可接受的时间内可视化,甚至可以实时可视化。
{"title":"Visualization of Large Graphs Using GPU Computing","authors":"T. Ježowicz, M. Kudelka, J. Platoš, V. Snás̃el","doi":"10.1109/INCoS.2013.126","DOIUrl":"https://doi.org/10.1109/INCoS.2013.126","url":null,"abstract":"Graphs may be used to visualize relationships between objects. Relations are represented by edges and objects are called nodes. When graph is drawn, one can easily see and understand the basic structure of data. Many different applications can be found in social network analysis, computer networks, scientific literature analysis, etc. However drawing large graphs (thousands or a millions of nodes), is still challenging problem. There exist many different algorithms for drawing graphs. Each algorithm has specific behavior and different applications and limits. Some algorithms are focused on quality while others are more suitable for large graphs. This paper aims to speed up the computation using GPU, so larger graphs can be visualized in acceptable time, or visualization can be done even in real-time.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115432455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1