![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
292 Result(s)
-
Chapter and Conference Paper
The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks
At the 1990 EuroCrypt Conference, Niemi proposed a new publickey cryptosystem based on modular knapsacks. Y.M. Chee in Singapore, A. Joux and J. Stern in Paris independently found that this cryptosystem is ins...
-
Chapter
Chinese Full-Text Retrieval Technology Applied in National Occupational Training and Testing Network in WWW Environment
This paper describes how CGI and API techniques are used to realize fast indexing and remote retrieving vast quantity original data on personal computers.
-
Chapter and Conference Paper
Using Time over Threshold to Reduce Noise in Performance and Fault Management Systems
Fault management systems detect performance problems and intermittent failures by periodically examining a metric (such as the utilization of a link),and raising an alarm if the value is above a threshold. Suc...
-
Chapter
Develo** a Distributed Meeting Service to Support Mobile Meeting Participants
Future 3rd+ generation mobile wireless systems are been designed to support high data rates in comparison to existing voice based wireless systems. The success of these new systems will partly be based on the dat...
-
Chapter and Conference Paper
A Spectral Element Method for Oldroyd-B Fluid in a Contraction Channel
A spectral element method coupled with the EVSS method for computing viscoelastic flows is presented. The nonlinear rheological model, Oldroyd-B, is chosen to simulate the flow of a viscoelastic fluid based on...
-
Chapter and Conference Paper
Admission Control and Capacity Management for Advance Reservations with Uncertain Service Duration
Different from Immediate Request (IR) service in packet-switched networks, admission control for Advance Reservation (AR) service is more complex - the decision points include not only the start time of the ne...
-
Chapter and Conference Paper
A Ground-Truthing Tool for Layout Analysis Performance Evaluation
There is a significant need for performance evaluation of Layout Analysis methods. The greatest stumbling block is the lack of sufficient ground truth. In particular, there is currently no ground-truth for the...
-
Chapter and Conference Paper
Business Agent
The Internet and World Wide Web represent an increasingly important channel for retail commerce as well as business transactions. However, there are almost 5 billion pages or sites on the Internet and WWW. The...
-
Chapter and Conference Paper
Smooth Interfaces for Spectral Element Approximations of Navier-Stokes Equations
A smoothing technique is developed to calculate the interface conditions of spectral element method for solving the incompressible Navier-Stokes equations. The first derivative of spectral element solution at ...
-
Chapter and Conference Paper
An Overlay for Ubiquitous Streaming over Internet
Conventional distribution of real-time multimedia data uses multicasting or a series of relays and tunnels for unicast networks. The former is a capability not popularly enabled by a lot of networks while the ...
-
Chapter and Conference Paper
Intrusion Masking for Distributed Atomic Operations
Distributed database transactions are treated as atomic operations. This paper considers intrusion masking atomic operations among replica groups. The paper proposes two Byzantine fault tolerant two-phase comm...
-
Chapter and Conference Paper
Life Cycle Modeling of News Events Using Aging Theory
In this paper, an adaptive news event detection method is proposed. We consider a news event as a life form and propose an aging theory to model its life span. A news event becomes popular with a burst of news...
-
Chapter and Conference Paper
TCP Friendly Rate Adaptation for Multimedia Streaming in Mobile ad hoc Networks
Transport protocol for supporting multimedia streaming in mobile ad hoc networks has to cope with the rich dynamics, such as mobility-induced disconnection and reconnection, high out-of-order delivery ratios, ...
-
Chapter and Conference Paper
A Method on Solving Multiobjective Conditional Value-at-Risk
This paper studies Conditional Value-at-Risk (CVaR) with multiple losses. We introduce the concept of α-CVaR for the case of multiple losses under the confidence level vector α. The α-CVaR indicates the condition...
-
Chapter and Conference Paper
SuperNBD: An Efficient Network Storage Software for Cluster
Networked storage has become an increasingly common and essential component for cluster. In this environment, the network storage software through which the client nodes can directly access remote network atta...
-
Chapter and Conference Paper
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing
This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...
-
Chapter and Conference Paper
Fair and Performance Guaranteed Methods for Flat-Rate Unlimited Access Service Plan
Simplicity in administration and operation is the choice for production networks. Hence, flat-rate unlimited access service plan is the predominant form of retail pricing in Broadband Internet access services....
-
Chapter and Conference Paper
Multi-level Fusion of Audio and Visual Features for Speaker Identification
This paper explores the fusion of audio and visual evidences through a multi-level hybrid fusion architecture based on dynamic Bayesian network (DBN), which combines model level and decision level fusion to ac...
-
Chapter and Conference Paper
Technology Evaluations on the TH-FACE Recognition System
For biometric person authentication, evaluations on a biometric system are very essential parts of the entire process. This paper presents the technology evaluations on the TH-FACE recognition system. The main...
-
Chapter and Conference Paper
Design and Implementation of a SAN Agent for Windows NT Architecture
In an out-of-band SAN virtualization system, the virtualization appliance maintains metadata, and the agents inside the kernel of servers use that data to supply virtual storage devices and to perform the mapp...