Linked e-resources

Details

Preface; Conference Organization; Contents; Data Mining Techniques and Its Applications; An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme; 1 Introduction; 2 Background Knowledge; 2.1 Partially Ordered Hierarchy; 2.2 Bilinear Pairings; 2.3 Discrete Logarithm (DL) Problem in Elliptic Curve; 3 Proposed Scheme; 3.1 System Setup Phase; 3.2 User Subscribing Phase; 3.3 Encryption Key Derivation Phase; 4 Security Analysis; 5 Performance Analysis and Comparisons; 6 Conclusions; References; Quaternion Principal Component Analysis for Multi-modal Fusion; 1 Introduction

2 Propose Algorithm2.1 Multi-feature Extraction; 2.2 Quaternion Based Multi-modal Fusion; 3 Results and Analysis; 4 Conclusions; References; A Novel Load Balance Algorithm for Cloud Computing; 1 Introduction; 2 Related Works; 3 Our Proposed Method; 3.1 Parameter Settings; 3.2 Mathematical Model; 3.3 Tasks Scheduling Algorithm; 4 Experimental Results; 5 Conclusion; References; Interference Avoidance Function Research of Spread Spectrum System Using Composite Sequence; 1 Introduction; 2 Pseudo Random Sequence; 2.1 The Generation of m Sequences; 2.2 Walsh Sequences; 3 Composite Sequences

4 The Composite Sequence of Narrowband Interference Avoidance System4.1 MATLAB Simulation; 5 Conclusion; References; An Adaptive Kelly Betting Strategy for Finite Repeated Games; 1 Introduction; 2 Preliminaries; 2.1 Kelly Criterion; 2.2 KL Divergence; 3 On the Relation of Kelly Criterion on Theory and Practice; 4 Learning from Probability Before Time Step; 5 Conclusion and the Future Work; References; A Sanitization Approach of Privacy Preserving Utility Mining; 1 Introduction; 2 Related Work; 3 Preliminaries and Problem Statement; 4 Proposed Sanitization Algorithm; 5 Experimental Evaluation

5.1 Runtime5.2 Database Structure Similarity; 5.3 Database Utility Similarity; 5.4 Itemsets Utility Similarity; 6 Conclusion; References; Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments; 1 Introduction; 1.1 Motivations and Our Contributions; 2 Review of Choi's Scheme and Its SecurityWeakness; 2.1 Security Weakness; 3 Kuo et. al. 's Scheme Revisited; 4 Security Analysis on Kuo et. al.'s Scheme; 5 Conclusion; References; A Modeling Method of Virtual Terrain Environment; 1 Introduction

2 Analysis of Terrain Environment Element2.1 Altitude Data; 2.2 Texture Data; 2.3 Cultural Characteristic Data; 2.4 3D Model File; 3 Terrain Environment Data Representation Based on SEDRIS; 3.1 Data Representation Model DRM; 3.2 Data Coding EDCS; 4 Terrain Environment Data Based on SEDRIS; 5 Conclusions; References; Method of Founding Focusing Matrix for Two-Dimensional Wideband Signals; 1 Introduction; 2 Array Signal Model; 3 Principle of the New Method; 3.1 RSS Method; 3.2 Proposed Method; 4 Simulations; 5 Conclusions; References

Browse Subjects

Show more subjects...

Statistics

from
to
Export