2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing最新文献

筛选
英文 中文
The Design and Implementation of C-like Language Interpreter 类c语言解释器的设计与实现
Xiaohong Xiao, You Xu
{"title":"The Design and Implementation of C-like Language Interpreter","authors":"Xiaohong Xiao, You Xu","doi":"10.1109/IPTC.2011.33","DOIUrl":"https://doi.org/10.1109/IPTC.2011.33","url":null,"abstract":"This paper designs and implements a C-like language interpreter using C++ based on the idea of modularity. The whole system can be divided into three modules, namely, lexical analyzer, syntactic analyzer and evaluation of expression. During the design, token is being used. The design puts great emphasis towards code reusability and extensibility, which makes it easy to embed the code into other C++ programs. The final testing result shows that the implemented interpreter realizes almost all the interpretation functions of C-like language, including the interpretation of interface function call. It can also be used as script engine of games to control game logic through text, and games can be modified during running without recompiling the source code. Moreover, it has good portability. It can successfully run on different operating systems like Windows XP, MAC OS X 10.6.1, and iPhone OS 3.0.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment 电子商务环境下基于云理论的信任评估新模型
Hongyun Cai, Z. Li, Junfeng Tian
{"title":"A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment","authors":"Hongyun Cai, Z. Li, Junfeng Tian","doi":"10.1109/IPTC.2011.42","DOIUrl":"https://doi.org/10.1109/IPTC.2011.42","url":null,"abstract":"To solve the subjective and uncertainly about trust in e-commerce system, a new trust model based on multidimensional trust cloud is proposed, which is on the basis of the past research on cloud model. History evaluation data is regard as the quantitative universe of discourse, trust cloud of entities' property is based on the weighted backward generation cloud algorithm, so the history behavior of an entity can be reflected very well through three numerical characteristics of cloud model. The results of experiments show that the model proposed in the paper can reflect a seller's property more accurately and can provide a favorable reference for a buyer entity in e-commerce.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133550929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The EEG Signal Process Based on EEMD 基于EEMD的脑电信号处理
Xiao-jun Zhu, Shi-qin Lv, L. Fan, Xue-li Yu
{"title":"The EEG Signal Process Based on EEMD","authors":"Xiao-jun Zhu, Shi-qin Lv, L. Fan, Xue-li Yu","doi":"10.1109/IPTC.2011.67","DOIUrl":"https://doi.org/10.1109/IPTC.2011.67","url":null,"abstract":"Hilbert Huang Transform (HHT), which is based on EMD (Empirical Mode Decomposition) and Hilbert transform method, is a new signal analysis method. It suits for analyzing the non-linear and non-stationary signals, such as EEG signal particularly. The traditional EMD method has the Mode Mixing problem. Therefore a new method basing on Ensemble Empirical Mode Decomposition (EEMD) for processing the signal has been approached in this paper. This method can effectively ensure the integrity of signal's mapping in the different regions through adding random white noise component into the original data, and overcome the mode mixing problem of traditional EMD decomposition.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130524334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Improved Computer Notary System Protocols 改进的计算机公证系统协议
Zhang Chao-yang
{"title":"An Improved Computer Notary System Protocols","authors":"Zhang Chao-yang","doi":"10.1109/IPTC.2011.71","DOIUrl":"https://doi.org/10.1109/IPTC.2011.71","url":null,"abstract":"Computer notary system is an arbitrator or a notary public in the digital signature system, the process of arbitration, whether the signature is A communication sent to U, or U data are issued to B, after two and a signature encrypted password handling, you can ensure the security of communications. However, there is a signature of the arbitration serious problem: an intermediary can be replaced counterfeit information, and the agreement can not resist the replay attack. Article in the back of improved vulnerability of the agreement, and analyzes a new protocol security.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Application of MapReduce in the Cloud Computing MapReduce在云计算中的应用
Gaizhen Yang
{"title":"The Application of MapReduce in the Cloud Computing","authors":"Gaizhen Yang","doi":"10.1109/IPTC.2011.46","DOIUrl":"https://doi.org/10.1109/IPTC.2011.46","url":null,"abstract":"Hadoop provides a sophisticated framework for cloud platform programmers, which, MapReduce is a programming model for large-scale data sets of parallel computing. By MapReduce distributed processing framework, we are not only capable of handling large-scale data, and can hide a lot of tedious details, scalability is also wonderful. This paper analyzes the Hadoop architecture and MapReduce Working principle, described how to perform a MapReduce job in the cloud platform, how to write Mapper and Reducer classes, and how to use the object, proposed a program based on the MapReduce framework that enables distributed programming, Comparison results show that use of MapReduce architecture simplifies distributed programming.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility Analysis 基于AODV和DSDV的高效节能自适应路由协议(EPSAR):仿真与可行性分析
A. Jangra, N. Goel, Priyanka
{"title":"Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility Analysis","authors":"A. Jangra, N. Goel, Priyanka","doi":"10.1109/IPTC.2011.13","DOIUrl":"https://doi.org/10.1109/IPTC.2011.13","url":null,"abstract":"Mobile ad hoc network especially follows multihopping mechanism for routing to make a path from source to destination. If we have a sound and solid routing path that would be efficient, reliable and adaptable to the different scenarios of network too by following the next hop mechanism and also should be the farthest node with in the cluster then we could achieve better performance by the network. This paper gives more emphasis on the same phenomenon by simulating the protocol EPSAR over ADOV (reactive) and DSDV (proactive) existing protocol and also elaborates the mobility issue. This paper also presents the couple of simulations of EPSAR over multiple network (i.e. grows in terms of number of node) and also examines the performance and the feasibility of EPSAR by considering the different network parameters i.e. Data Packet sent, Delivery Ratio and End-to-End Delay.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116197224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Network Security Mechanisms Research 网络安全机制研究
Kuobin Dai
{"title":"Network Security Mechanisms Research","authors":"Kuobin Dai","doi":"10.1109/IPTC.2011.65","DOIUrl":"https://doi.org/10.1109/IPTC.2011.65","url":null,"abstract":"With the rapid development of computer networks, network security has become a hot topic of concern to people, not just a simple network security threat network needs normal people, but also the pursuit of networking technology in innovative source of power. To address this issue, this article on network security solution to the problem definition and further discussion, and propose how to establish network security management.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130272779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of SCM System Based on the Internet of Things on EPC 基于EPC的物联网SCM系统研究
Ying Xue
{"title":"Research of SCM System Based on the Internet of Things on EPC","authors":"Ying Xue","doi":"10.1109/IPTC.2011.59","DOIUrl":"https://doi.org/10.1109/IPTC.2011.59","url":null,"abstract":"Recently the research on the technology of the internet of things has become the hot spot, and how to lead it into the management system is the most difficult. The use of EPC system in the SCM system is the hot spot in the supply chain araa presently. This article has raised a conception and the basic framework of the Internet of Tings, and focused on the analysis to the Internet of Things especially the Chang Xiang SCMS, then clarify the application of principles of the EPC system in the SCM, finally interpret the details of the construction of the system and describe the implementation of the system.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IPv4 to IPv6 Transition Research Based on the Campus Network 基于校园网的IPv4到IPv6转换研究
Kuobin Dai
{"title":"IPv4 to IPv6 Transition Research Based on the Campus Network","authors":"Kuobin Dai","doi":"10.1109/IPTC.2011.58","DOIUrl":"https://doi.org/10.1109/IPTC.2011.58","url":null,"abstract":"Over the past 20 years, IPv4 network development for the computer to make a great contribution, however, gradually revealed its flaws. IPv6 to replace IPv4 with its inevitability. However, because these two protocols are very different. And the transition to equipment and software with updates and upgrades, and how to minimize the cost to achieve the campus network from IPv4 to IPv6 transition is the key. This article focuses on the excessive cost of programs and methods to achieve the minimum.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128310040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web Services 适合Web服务的拜占庭容错算法的形式化规范
Wei Zhou, Liu Chen
{"title":"Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web Services","authors":"Wei Zhou, Liu Chen","doi":"10.1109/IPTC.2011.16","DOIUrl":"https://doi.org/10.1109/IPTC.2011.16","url":null,"abstract":"A Byzantine Fault Tolerant Algorithm suiting web services is proposed considering the features of web services. There are significant differences between the algorithm and the Castro and Liskov's well-known practical Byzantine fault tolerance method. First, we have to create replicas on both sides of communicating web services, while in CLBFT's method, replicas are created only on the server side. Second, due to the autonomous behavior of web services, we have to synchronize the timing of the receiving of messages among replicas. The I/O automata model of the algorithm is presented, and it's correctness is formally specified and verified.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信