2008 International Conference on Advanced Computer Theory and Engineering最新文献

筛选
英文 中文
A New (t,n)-Threshold Secret Sharing Scheme 一种新的(t,n)阈值秘密共享方案
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.139
Chunming Tang, Z. Yao
{"title":"A New (t,n)-Threshold Secret Sharing Scheme","authors":"Chunming Tang, Z. Yao","doi":"10.1109/ICACTE.2008.139","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.139","url":null,"abstract":"In a traditional (t,n)-threshold secret sharing scheme, the secret key K can be shared only one time for this reason that one of participants, who participates in reconstruction of K, may be dishonest and probably leaks K. In this paper, based on multiprover zero-knowledge arguments and secure multiparty computation protocol, we will construct a (t,n)-threshold secret sharing scheme in which the secret key K will be shared forever if at most t-1 participants are dishonest and discrete logarithm problem is hard.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Research of Customer Service System Based on Knowledge Management 基于知识管理的客户服务系统研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.42
Guozheng Wang, H. Wu
{"title":"Research of Customer Service System Based on Knowledge Management","authors":"Guozheng Wang, H. Wu","doi":"10.1109/ICACTE.2008.42","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.42","url":null,"abstract":"A framework of knowledge-based customer service system is presented in order to enhance the efficiency of enterprise customer service and to share the information within the enterprise. In the framework, the system is organized into five layers which include content layer, knowledge description layer, application layer, service layer and access control layer. The efficiency is improved because regular knowledge is structured organized, and it is easy to obtain accurate information through a XML query. The knowledge access control mode is presented based on RBC model. The system has been applied to Hangzhou haisheng limited company.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134013112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Clustering Methods in Data Mining: A Comparative Case Analysis 数据挖掘中的模糊聚类方法:比较案例分析
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.199
G. Raju, B. Thomas, S. Tobgay, T. S. Kumar
{"title":"Fuzzy Clustering Methods in Data Mining: A Comparative Case Analysis","authors":"G. Raju, B. Thomas, S. Tobgay, T. S. Kumar","doi":"10.1109/ICACTE.2008.199","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.199","url":null,"abstract":"The conventional clustering algorithms in data mining like k-means algorithm have difficulties in handling the challenges posed by the collection of natural data which is often vague and uncertain. The modeling of imprecise and qualitative knowledge, as well as handling of uncertainty at various stages is possible through the use of fuzzy sets. Fuzzy logic is capable of supporting to a reasonable extent, human type reasoning in natural form by allowing partial membership for data items in fuzzy subsets. Integration of fuzzy logic in data mining has become a powerful tool in handling natural data. In this paper we introduce the concept of fuzzy clustering and also the benefits of incorporating fuzzy logic in data mining. Finally this paper provides a comparative analysis of two fuzzy clustering algorithms namely fuzzy c-means algorithm and adaptive fuzzy clustering algorithm.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Research on Parameter Optimization of the Boolean Kernel Function 布尔核函数参数优化研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.81
Han Feng, Du Yingshuang, Cui Kebin, Zhang Shumao
{"title":"Research on Parameter Optimization of the Boolean Kernel Function","authors":"Han Feng, Du Yingshuang, Cui Kebin, Zhang Shumao","doi":"10.1109/ICACTE.2008.81","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.81","url":null,"abstract":"It is significant to choose super parameter of the kernel function in non-liner SVM for the constructed classifier. As to the boolean kernel function, the research is comparatively less than other kernel function in the internal and international country, and the selection of its parameter is mainly through handwork. This paper researched and analyzed some main measure to choosing parameter of kernel function, discussed the optimizing principle of parameter, which to minimize the RM bound. In the paper, it proposed an abbreviated algorithm by adopting constant iterative step length to optimize the parameter, aiming at super parameter of the boolean kernel function KMDNF, which implemented automatic selection.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telecollaboration for eBusiness Sustainability 电子商务可持续性的远程协作
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.207
V. Mahadevan
{"title":"Telecollaboration for eBusiness Sustainability","authors":"V. Mahadevan","doi":"10.1109/ICACTE.2008.207","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.207","url":null,"abstract":"eBusiness is not a new phenomenon and many of the eBusiness technologies are readily available for mid-sized and large organisations. However, \"telecollaboration (TC) for eBusiness sustainability\" is a new concept for workplace managers that include a wide array of interconnected business concepts, and activities involved in evaluating the collaborative opportunities whilst managing the eBusiness transition. This paper begins with a discussion on the importance of managing eBusiness transition, and the reason why the investigation of TC for business sustainability is unique. This is followed by proposing intuitive methodological framework which promotes the previous research on TC to describe and shape scholarly inquiry into eBusiness/TC interface management challenges. Finally, this paper opens up new avenues for spirited debates on moving towards a deep sense of what eBusiness/TC interface key management activities that the workplace managers want to take advantage during the innovative use of experiential TC for business sustainability.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123773621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronized Control of Aggregated Reservation States for Resource Management in Diffserv Networks 差分网络中资源管理的聚合保留状态同步控制
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.52
Chengbo Huang, Yongsheng Liang, Yilong Xu
{"title":"Synchronized Control of Aggregated Reservation States for Resource Management in Diffserv Networks","authors":"Chengbo Huang, Yongsheng Liang, Yilong Xu","doi":"10.1109/ICACTE.2008.52","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.52","url":null,"abstract":"Resource management in differentiated services (RMD) is a simple, scalable signaling method for resource reservation within a differentiated services domain. However, the algorithms used in RMD reservation-based mode cannot accurately maintain the aggregated reservation state. In this paper we present a synchronized control mechanism that can accurately control the aggregated reservation state. Our approach includes a clock synchronization paradigm and the proposed implementation architecture within the router. The solutions of integrating our approach into RMD reservation-based mode are also given. The simulation result demonstrates that our approach can control the aggregated reservation state accurately.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125911515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on the Security of the New Generation E-Commerce Model 新一代电子商务模式的安全性研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.75
L. Yunhe, Wu Shanyu
{"title":"Study on the Security of the New Generation E-Commerce Model","authors":"L. Yunhe, Wu Shanyu","doi":"10.1109/ICACTE.2008.75","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.75","url":null,"abstract":"The e-commerce system of the third generation based on the Mobile Agent is the integration of the technology of software, communications and distribution system, which overcomes shortcomings of the traditional e-commerce technology and has great application prospect. However, its security is also an issue can not be ignored. The lack of security will cause the malicious agent to spread without restriction on Internet or cause it to be invaded by the malicious host, so that business activities shall be involved into chaos. As there is a similarity, relatively mature security technology, between the protection for the host from the invasion of the malicious agent and the traditional distributed system, and there are some shortcomings in the technology for protecting the Mobile Agent from the malicious host, from the sociological point of view and with the main purpose of protecting the Mobile Agent from the malicious host, a credit model (host credibility assessing the credit relation) is proposed in the paper to resolve the security issue of the e-commerce system based on the Mobile Agent technology.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"49 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Class Ordering Tool – A Tool for Class Ordering in Integration Testing 类排序工具——集成测试中的类排序工具
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.110
J. Jaroenpiboonkit, T. Suwannasart
{"title":"Class Ordering Tool – A Tool for Class Ordering in Integration Testing","authors":"J. Jaroenpiboonkit, T. Suwannasart","doi":"10.1109/ICACTE.2008.110","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.110","url":null,"abstract":"The presence of cyclic dependency calls in integration testing is a major problem to determine an order of classes to be tested. We proposed an approach to solve this problem. Hence, this paper proposes a class ordering tool (CO Tool) for integration testing based on our approach for finding a test order using object-oriented slicing technique. Our approach breaks cycles by slicing classes for partial testing, whereas many researchers delete relationships to break cycles and create stub to represent interactions of testing between classes. Therefore, the benefit of our approach is to decrease the cost of implementing test stubs.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Chaos in Orthogonal Frequency Divison Multiplexing Technique 正交频分复用技术中的混沌
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.172
Y. Suansook, K. Paithoonwattanakit
{"title":"Chaos in Orthogonal Frequency Divison Multiplexing Technique","authors":"Y. Suansook, K. Paithoonwattanakit","doi":"10.1109/ICACTE.2008.172","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.172","url":null,"abstract":"In this paper we studied the chaotic property that can arise in transmission technique that mostly use in high-speed bidirectional wireless data transfer and mobile data transfer. The spectrum of OFDM carrier in frequency domain is a sinc function, which is Fourier transform of the rectangular pulse. The transmission sensitivity that caused from small change in an initial condition of a system could be explained by a divergent rate of the Lyapunov exponent of OFDM spectrum. The corresponding bifurcation diagram of the Lyapunov exponent is presented. The chaotic behavior of the function was also discussed.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122621007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on the Color Reproduction Based on the BP Neural Network Algorithm 基于BP神经网络算法的色彩再现研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.151
Xiaozhao Xu, Xinfeng Zhang, Yi'na Cai, Lan-sun Shen, Chang-Jiang Liu
{"title":"Research on the Color Reproduction Based on the BP Neural Network Algorithm","authors":"Xiaozhao Xu, Xinfeng Zhang, Yi'na Cai, Lan-sun Shen, Chang-Jiang Liu","doi":"10.1109/ICACTE.2008.151","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.151","url":null,"abstract":"This paper proposes an algorithm of BP neural network, which reproduces a color image under D65 light conditions by using a pair of images (one with no D65 light source, and the other with D65 light source). The result of reproduction image which used a fluorescent lamp as an unknown light source is presented. This algorithm successfully removes the effect of the unknown light source color and achieves color constancy at a practical computational cost. The experiment results show that the validity of the proposed algorithm.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123338034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信