2008 International Symposium on Computer Science and Computational Technology最新文献

筛选
英文 中文
An Axiomatic Characterization of Fuzzy Formal Contexts Based on T-implication Operators 基于t蕴涵算子的模糊形式上下文的公理化表征
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.218
Xiaoxue Song, Wenxiu Zhang
{"title":"An Axiomatic Characterization of Fuzzy Formal Contexts Based on T-implication Operators","authors":"Xiaoxue Song, Wenxiu Zhang","doi":"10.1109/ISCSCT.2008.218","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.218","url":null,"abstract":"In this paper, the fuzzy concept based on T-implication operators is studied by the axiomatic approach. An operators-oriented characterization of the fuzzy concept is proposed, that is, the fuzzy intent-extent operator and the fuzzy extent-intent operator based on T-implication operators are defined by axioms. The axiom sets of the fuzzy concept operators guarantee the existence of fuzzy relations which produce the same operators.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116576006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Watermark Scheme Based on Contourlet Transform 基于Contourlet变换的自适应水印方案
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.174
Feng Wei, Tong Ming, Ji Hong-bing
{"title":"An Adaptive Watermark Scheme Based on Contourlet Transform","authors":"Feng Wei, Tong Ming, Ji Hong-bing","doi":"10.1109/ISCSCT.2008.174","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.174","url":null,"abstract":"Based on the convergence and stability of the new mean shift fast algorithm, an adaptive watermark algorithm in contourlet domain based on mean shift texture features clustering is proposed in this paper. Through the texture recognition method based on gray co-occurrence matrix, watermark is embedded into the coefficients in contourlet domain, which makes the capability of the watermark more covert, anti-noise attack and robust. During the clustering, three texture features including energy, entropy and contrast were selected for mean shift fast clustering algorithm. Strong regional textures of host images are extracted directly, accurately and efficiently, and the embedding intensity can be gain automatically then. The experiment shows that this algorithm has the strong robustness to Gauss low pass filter, Wiener filter, median filtering, Salt and pepper noise, Gaussian noise, JPEG compression, shear attack etc. It is a blind detection, and adapt to various of images.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Fuzzy Evaluation Method of E-business Website Based on Rough Set 基于粗糙集的电子商务网站模糊评价方法研究
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.185
Jun Ma, Huiling Shi, Fengyi Zou
{"title":"Research on Fuzzy Evaluation Method of E-business Website Based on Rough Set","authors":"Jun Ma, Huiling Shi, Fengyi Zou","doi":"10.1109/ISCSCT.2008.185","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.185","url":null,"abstract":"In order to overcome the subjective limitation in existing evaluation methods, based on determination of the evaluation indicator weight by using rough set theory, a new fuzzy synthesized evaluation method of e-business website is proposed. It reduces subjective influence and increases the objectivity of evaluation result. An example shows the effectiveness and practicality of this evaluation method.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hardware Implement of Bus Bridge Based on Single CPU and Dual Bus Architecture 基于单CPU双总线结构的总线桥的硬件实现
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.106
Tiedong Wang, Fengjing Shao, Rencheng Sun, He Huang
{"title":"A Hardware Implement of Bus Bridge Based on Single CPU and Dual Bus Architecture","authors":"Tiedong Wang, Fengjing Shao, Rencheng Sun, He Huang","doi":"10.1109/ISCSCT.2008.106","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.106","url":null,"abstract":"Single CPU dual bus architecture is a new kind of architecture aimed at reducing the security vulnerability of Von Neumann architecture, and it has been proved theoretically reasonable. In this paper, a bus bridge is implemented to bridge CPU and dual bus. The experiment is done and the result has proved that the architecture based on single CPU and dual bus is reasonable and effective.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116765863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
R-Binder: Application of Using Service Binder in R-OSGi R-Binder:在R-OSGi中使用Service Binder的应用
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.242
Zhiyu Feng, Linpeng Huang
{"title":"R-Binder: Application of Using Service Binder in R-OSGi","authors":"Zhiyu Feng, Linpeng Huang","doi":"10.1109/ISCSCT.2008.242","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.242","url":null,"abstract":"OSGi is a famous technique based on the concept Service-Oriented Component Model. As far as the application of OSGi is concerned, Service Dependency management and Distribution are two issues that have to be taken into consideration. The Service Binder is a mechanism that adds automatic service dependency management into OSGi, and R-OSGi is a distributed middleware layer on the top of OSGi that allows multiple peers with local OSGi frameworks to be federated in a way they behave like one large OSGi framework. This paper introduces the application of R-Binder, which combines the Service Binder and R-OSGi together and takes the advantage of both the Service Binder and R-OSGi. Using Service Binder in the R-OSGi, R-Binder extends the Service Dependency management of the Service Binder to distributed environment, and also take the advantage of R-OSGi (such as transparency, Non-Invasiveness, Consistent Behavior and so on) in distribution. The paper also discusses the advantage of applying Service Binder in R-OSGi Deployment Tool (RDT).","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131188046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulation and Analysis of MFlood Protocol in Wireless Network 无线网络中MFlood协议的仿真与分析
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.87
Runcai Huang, Y. Zhuang, Qiying Cao
{"title":"Simulation and Analysis of MFlood Protocol in Wireless Network","authors":"Runcai Huang, Y. Zhuang, Qiying Cao","doi":"10.1109/ISCSCT.2008.87","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.87","url":null,"abstract":"NS2 is an object-oriented simulation tool to simulate and analyze network elements; it is also a powerful tool to develop new protocol and scheme. In the paper, we analyze the features and models of wireless network in details; discuss the simulation process and implementation of wireless network on the basis of NS2. Also, AODV protocol and self-defined MFlood protocol in wireless network are simulated respectively and the simulation details of each protocol are introduced. NAM is used to display the process of simulation. Tools such as Gnuplot and Gawk are used to produce plot data files and icons to clarify the communication process. Finally, the comparative studies are presented according to the simulation results.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131232432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Class Loader Firmware on Java SoC Java SoC上的类加载器固件
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.199
Hua-Ning Wang, Wei-Wei Dai, H. Tan, Zhi-Rui Chen
{"title":"Class Loader Firmware on Java SoC","authors":"Hua-Ning Wang, Wei-Wei Dai, H. Tan, Zhi-Rui Chen","doi":"10.1109/ISCSCT.2008.199","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.199","url":null,"abstract":"Java is one of the most popular programming architectures because of its platform-independence. A Java processor called “JOP” accelerates the speed of Java applications by executing Java bytecode instructions directly instead of by software emulation. However, instructions in Java executable file need to be resolved before executed. JOP finishes this resolving procedure in the Java application compiling stage and generates a memory image of Java run-time environment from Java class files. As the result of that, one of Java’s outstanding features — platform-independence is lost. This paper gives a design of Java class loader firmware which is integrated with Java processor into a System-on-Chip (SoC) and builds up a whole embedded Java platform which runs as a traditional Java Virtual Machine (JVM). The class loader firmware is essentially a resolved Java program which can be executed directly by Java processor. It offers service of loading and resolving other Java executable files for Java applications at run-time and makes these files really executable for a Java processor.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115155091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese Partial Parsing with Modal Finite-State Approach 基于模态有限状态方法的汉语部分解析
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.10
Yiqiang Zhao, Junfang Zeng, Yiping Yang
{"title":"Chinese Partial Parsing with Modal Finite-State Approach","authors":"Yiqiang Zhao, Junfang Zeng, Yiping Yang","doi":"10.1109/ISCSCT.2008.10","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.10","url":null,"abstract":"A novel finite-state approach with the practical use of modal operators for Chinese partial parsing is presented in this paper. The traditional rule-based partial parsing approaches make use of regular grammar to approximate the context free or simplified context sensitive grammar with some loss of descriptive ability. Until now, how to solve the non-categorical problem within rule-based paradigm has not been reported, except for adding probability to grammars. In the approach presented in this paper, basic modal operators, necessity and possibility, are introduced into classic regular grammar. The technique of using such grammar to partially parse the free Chinese text is also discussed in detail. The experimental results suggest that the proposed approach can achieve Chinese partial parsing well and give a considerable performance improvement compared to traditional finite-state approach. A new application in natural language processing of modal logic is revealed through this paper.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ajax Applied in Environment Monitoring System Based on WSN Ajax在基于WSN的环境监测系统中的应用
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.327
Wei Han, K. Fang, Xiaohui Li, L. Zhang
{"title":"Ajax Applied in Environment Monitoring System Based on WSN","authors":"Wei Han, K. Fang, Xiaohui Li, L. Zhang","doi":"10.1109/ISCSCT.2008.327","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.327","url":null,"abstract":"This article puts forward a method to access the data and analyzed results from the monitoring system of environment based on WSN with the B/S mode. It resolves the problem of low speed of page refresh with Ajax. The experiment shows that the partial refresh feature of Ajax can make it possible for the users to get access to the data and analyzed results easily through the browser, and experience a smarter response just like window programs.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Performance Analysis of Fast EAP Re-authentication Protocol 快速EAP重认证协议的性能分析
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.164
Qing Xu, C. Wan, A. Hu
{"title":"The Performance Analysis of Fast EAP Re-authentication Protocol","authors":"Qing Xu, C. Wan, A. Hu","doi":"10.1109/ISCSCT.2008.164","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.164","url":null,"abstract":"With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication protocol is only twentieth of that in the EAP-TLS protocol.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"59 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信