2009 International Conference on Computer and Communications Security最新文献

筛选
英文 中文
MOMS-HDEA: A Multi-Objective Multi-State Hybrid Differential Evolution Algorithm for System Reliability Optimization Design Problems 系统可靠性优化设计问题的多目标多状态混合差分进化算法
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.47
Zeng Hui, Zhu Jixiang, L. Yuanxiang, Yin Weiqin
{"title":"MOMS-HDEA: A Multi-Objective Multi-State Hybrid Differential Evolution Algorithm for System Reliability Optimization Design Problems","authors":"Zeng Hui, Zhu Jixiang, L. Yuanxiang, Yin Weiqin","doi":"10.1109/ICCCS.2009.47","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.47","url":null,"abstract":"A new custom evolutionary algorithm was developed and implemented to solve multiple objective multi-state reliability optimization design problems. This new algorithm uses the universal moment gene-rating function approach to evaluate the different re-liability or availability indices of the system which have various levels of performance ranging from per-fectly functioning to completely failed. And each com-ponent in sub-system has different performance levels, cost, weight, and reliability. Genetic algorithms are suited for solving reliability design problems because of their appropriate for high-dimension stochastic problems with many nonlinearities or discontinuities. The developed algorithm, MOMS-HDEA, combined the differential evolution algorithm with multi-parent crossover operator satisfying the ergodic and fast properties in searching simultaneously. Experiment also shows that the algorithm gets better Pareto-front solutions.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-photorealistic Rendering for 3D Mesh Models 非逼真的3D网格模型渲染
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.42
Siyou Lin
{"title":"Non-photorealistic Rendering for 3D Mesh Models","authors":"Siyou Lin","doi":"10.1109/ICCCS.2009.42","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.42","url":null,"abstract":"Non-Photorealistic Rendering (NPR) for 3D mesh models has made considerable progress in recent years and it has become a hot topic in computer graphics and other related fields. This paper presents an overview of the key techniques in non-photorealistic rendering for 3D mesh models, such as line drawings based on geometric and visual features, the surface brightness and stylized shadow setting. We introduce popular methods dealing with these problems and point out the characteristics of these methods and their deficiencies. Discussion is given and future work is addressed at the end of the paper.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"84 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emergency Treatment for Civil Aviation Departure Information System 民航离场信息系统应急处理
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.32
Yue Ren-tian, Zhao Yifei, Xie Yue, Song Weiwei
{"title":"Emergency Treatment for Civil Aviation Departure Information System","authors":"Yue Ren-tian, Zhao Yifei, Xie Yue, Song Weiwei","doi":"10.1109/ICCCS.2009.32","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.32","url":null,"abstract":"There are several sudden failures in Chinese civil aviation departure information system. Emergency treatment and rapid recovery for the system have important significance for efficient operation of civil aviation. Based on several pairs of fault analysis for the departure information system, the network devices and host system's security response disposal plan and the computer virus emergency response plan are proposed. The conclusions are drawn that the departure system security emergency management can reduce the losses and resume the system rapidly.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115347459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Anomaly Detection Algorithm 一种新的异常检测算法
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.15
Kui Zhang
{"title":"A Novel Anomaly Detection Algorithm","authors":"Kui Zhang","doi":"10.1109/ICCCS.2009.15","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.15","url":null,"abstract":"A novel anomaly detection algorithm is proposed and based on the danger model. The danger model is built on a sensitive tissue (ST) which consists of a population of sensitive cells (SCs) that are abstracted from computer system, and such cells are very sensitive to cellular damages. ST plays a role as an interface between problems and immune cells for danger recognition and estimation. This novel anomaly detection algorithm is different from the existing ones for the introduction to a novel component—sensitive tissue in the danger model.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125823161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research on the Analysis of Image Sequence Model 图像序列模型分析的研究
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.50
Zhang Tiejun, Z. Zhiwei
{"title":"The Research on the Analysis of Image Sequence Model","authors":"Zhang Tiejun, Z. Zhiwei","doi":"10.1109/ICCCS.2009.50","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.50","url":null,"abstract":"The analysis of image acquiesce model is brought forward to the automation examine system in the subject. The results show that thinking form the information science break a new ground for controlling and distinction of complicated system.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128703556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About Hermitian Positive Definite Solutions of a Type of Nonlinear Matrix Equations 一类非线性矩阵方程的厄米正定解
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.37
C. Tan
{"title":"About Hermitian Positive Definite Solutions of a Type of Nonlinear Matrix Equations","authors":"C. Tan","doi":"10.1109/ICCCS.2009.37","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.37","url":null,"abstract":"Let be an nonsingular matrix. In image processing, we must solve a system of linear equations[1], however, the solving of the System can be transformed to the solving of the equations . In this paper, we study the Hermitian positive definite solutions of the matrix equation . We give an equivalent equation of when the matrix equation has a Hermitian positive definite solution.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123899232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridge for Connecting Two CPU Systems in a SoC 在SoC中连接两个CPU系统的桥接器
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.21
Liu Jia, Li Zheying, Li Jinping, Z. Yanping
{"title":"Bridge for Connecting Two CPU Systems in a SoC","authors":"Liu Jia, Li Zheying, Li Jinping, Z. Yanping","doi":"10.1109/ICCCS.2009.21","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.21","url":null,"abstract":"The connection bridge is addressed for connecting different circuit part include two CPU system in a SoC. With the discussion about the performance of circuitry components, the circuitry components are classified into two types, one is called host transmission component, and the other is called slave transmission component. The classification is the fundamental for connection bridge design. By this classification, a connection bridge was designed in this paper. The connection bridge designed in the paper connect two CPU system and three others digital circuitry components together and make the CPU connected with three digital circuitry directly as a part of the CPU system. The architecture and logic function of the connection bridge is analyzed in detail and simulated. The simulation results demonstrate that the connection bridge can not only supply the connection of two CPU and three common components, include RAM, ADC and DAC, but also increased the running speed and system performance.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay Tolerant Vehicular Network in Intelligent Transportation System 智能交通系统中的容延迟车辆网络
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.28
Tianle Zhang, Chunlu Wang, Zongwei Luo
{"title":"Delay Tolerant Vehicular Network in Intelligent Transportation System","authors":"Tianle Zhang, Chunlu Wang, Zongwei Luo","doi":"10.1109/ICCCS.2009.28","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.28","url":null,"abstract":"RFID enabled wireless sensor networks are attracting intensive interests of intelligent transportation applications. This paper proposes a dynamic infrastructure for vehicular communications built upon the RFID enabled delay tolerant wireless sensor networks named Mobile Relay Network (MRN) for the communication in the intelligent transportation system. A group-sequence based routing protocol is developed to support the MRN. Based on the MRN, the Ubiquitous Intelligence for Data Query (UIDQ) service platform is proposed to provide information access, relay, search and delivery among the drivers on the move. The computing results validate the UIDQ scheme.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient and Secure Protocol for Low-cost RFID Systems 一种低成本RFID系统的高效安全协议
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.14
Feng Zhao, Huiyun Li, Fengqi Yu
{"title":"An Efficient and Secure Protocol for Low-cost RFID Systems","authors":"Feng Zhao, Huiyun Li, Fengqi Yu","doi":"10.1109/ICCCS.2009.14","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.14","url":null,"abstract":"Radio frequency identification (RFID) technology is as an automated identification technology and has become pervasive in our lives. However, RFID systems are known vulnerable to counterfeiting and clandestine tracking. The traditional cryptographic operations are too costly to be used for low-cost RFID tag. In this paper, we present an efficient and secure protocol. Our protocol is secure against counterfeiting by means of a shared secret key between each tag and the backend database, and is secure against tracking through changing the tag’s response each time to queries. The protocol can also resist the desynchronization attack. This protocol only demands hardware support of a Pseudo-Random Number Generation (PRNG) and a Cyclic Redundancy Check (CRC) to achieve high security, which makes the protocol easy to implement.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116905464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Improved Ant Colony Algorithm in Integrated Circuit Routing 改进蚁群算法在集成电路布线中的应用
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.16
H. Liying, T. Hongmei, Sun Zhijie, Zhang Cunshan, Zhao Hongdong
{"title":"Application of Improved Ant Colony Algorithm in Integrated Circuit Routing","authors":"H. Liying, T. Hongmei, Sun Zhijie, Zhang Cunshan, Zhao Hongdong","doi":"10.1109/ICCCS.2009.16","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.16","url":null,"abstract":"As VLSI fabrication technology developing to VDSM and the magnitude increasing rapidly¿a more effective optimized algorithm is requited to realize circuit routing in the physical design. In this paper, through optimizing the basic ant colony algorithm based on ant colony system, a better solution is found. It can improve the problem of excessive search time using the basic ant colony to solve traveling salesman problem (TSP). The improved algorithm has fast convergence capability and strong optimization ability. Using the improved ant colony algorithm to solve the multiterminal net routing problem around the obstacles, a better total connection length is achieved. The experimental results show that the improved ant colony algorithm is an effective way to solve difficult NP wire problems.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"80 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信