![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Multi-scale Cross-restoration Framework for Electrocardiogram Anomaly Detection
Electrocardiogram (ECG) is a widely used diagnostic tool for detecting heart conditions. Rare cardiac diseases may be underdiagnosed using traditional ECG analysis, considering that no training dataset can exh...
-
Chapter and Conference Paper
Registration Based Few-Shot Anomaly Detection
This paper considers few-shot anomaly detection (FSAD), a practical yet under-studied setting for anomaly detection (AD), where only a limited number of normal images are provided for each category at training...
-
Chapter and Conference Paper
Molecular Simulation of Displacement of Methane by Injection Gases in Shale
Displacement methane (CH4) by injection gases is regarded as an effective way to exploit shale gas and sequestrate carbon dioxide (CO2). In our work, the displacement of CH4 by injection gases is studied by using...
-
Chapter and Conference Paper
Multi-agent Negotiation Model for Resource Allocation in Grid Environment
Due to the resources in the Grid are heterogeneous and geographically distributed, the management of resources and application scheduling in large-scale distributed Grid environment is a complex undertaking. I...
-
Chapter and Conference Paper
Grid-Enabled Medical Image Processing Application System Based on OGSA-DAI Techniques
Grid-enabled Medical Image Processing Application System (MIP-Grid) based on OGSA-DAI techniques aims at providing high performance medical image process services in a large distributed grid computing environm...
-
Chapter and Conference Paper
Multiagent-based Web Services Environment for E-commerce
The use of Web services on the World Wide Web is expanding rapidly, as the need for application-to-application communication and interoperability grows on distributed computing systems. It is essential to find...
-
Chapter and Conference Paper
Routing Algorithm Using SkipNet and Small-World for Peer-to-Peer System
In this paper, we design a new routing algorithm using SkipNet and Small-World for peer-to-peer system. The algorithm divides the routing space into two layers, SkipNet layer and Small-World layer. In the Skip...
-
Chapter and Conference Paper
An Identity-Based Model for Grid Security Infrastructure
In this paper, we propose a grid security infrastructure based on identity cryptography. We mainly discuss the grid security authentication and authorization architecture by using Tate Pairing. We propose a pr...
-
Chapter and Conference Paper
An Identity-Based Grid Security Infrastructure Model
Grid security is a wide topic, touching many of the core issues in information security. It is an area that has been overlooked by the established grid community. In this paper, We explore some roles of identi...
-
Chapter and Conference Paper
ID-based Secure Group Communication in Grid Computing
The security requirements especially for secure group communication are discussed in grid circumstance. When several processes generated by a user want to communicate securely, they have to share a secret key ...
-
Chapter and Conference Paper
Certificate-Based Authentication and Authorization Architecture in Digital Library
In this paper, we design and implement a certificate-based authentication and authorization architecture in digital library. Our certificate-based authentication architecture consists of resource server, direc...
-
Chapter and Conference Paper
Fair Tracing Without Trustees for Multiple Banks
In this paper we present a multiple bank electronic cash system based on group blind signature scheme, which offers a new kind of tracing mechanism. It provides conditional anonymity both for the customers and...