![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Research on General Automatic Test Platform for Onboard Automatic Train Protection
Traditional train control systems experience problems such as low efficiency, tedious operation, high labor costs, poor visibility, and difficulty in designing and maintaining test cases during manual function...
-
Chapter and Conference Paper
Transpose and Mask: Simple and Effective Logit-Based Knowledge Distillation for Multi-attribute and Multi-label Classification
Knowledge distillation (KD) improves a student network by transferring knowledge from a teacher network. Although KD has been extensively studied in single-labeled image classification, it is not well explored...
-
Chapter and Conference Paper
Automatic Search of Linear Structure: Applications to Keccak and Ascon
The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...
-
Chapter and Conference Paper
Frame Correlation Knowledge Distillation for Gait Recognition in the Wild
Recently, large deep models have achieved significant progress on gait recognition in the wild. However, such models come with a high cost of runtime and computational resource consumption. In this paper, we i...
-
Chapter and Conference Paper
Research on Cloud Office Resource Allocation Algorithm Based on Correction Weight PSO
With the development of science and technology, cloud computing technology has changed people's office methods. People begin to use cloud services to realize remote collaborative office, which can save costs a...
-
Chapter and Conference Paper
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3
In this work, we focus on collision attacks against instances of SHA-3 hash family in both classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other variants proposed by Guo et al.
-
Chapter and Conference Paper
Evaluation of Relationship Quality Within Dyads Through the Performance in Dual-Player Cooperative Tasks
Human beings are influenced widely by relationship among individuals. However, there is still a lack of a systematic, objective and direct way to assess the quality of relationships within dyads. The current s...
-
Chapter and Conference Paper
A Reliable Voice Perceptual Hash Authentication Algorithm
In order to protect the authenticity and integrity of voice, this paper proposes a reliable voice perceptual hash authentication algorithm. This algorithm considers the dynamic characteristics of voice signals...
-
Chapter and Conference Paper
Adaptive Learning for Efficient Emergence of Social Norms in Networked Multiagent Systems
This paper investigates how norm emergence can be facilitated by agents’ adaptive learning behaviors in networked multiagent systems. A general learning framework is proposed, in which agents can dynamically a...
-
Chapter and Conference Paper
User Behavioral Context-Aware Service Recommendation for Personalized Mashups in Pervasive Environments
With the rapid development of mobile Internet and increasing amount of smart devices, Internet services have been integrated into peoples’ daily lives. Due to the features of end-user-oriented mashups in perva...
-
Chapter and Conference Paper
Vehicle Speed Estimation Based on Sensor Networks and Signal Correlation Measurement
This paper proposed a novel method for accurate vehicle speed estimation based on magnetic sensors. The estimation system consists of triple sensors and signals are collected synchronously when vehicles travel...
-
Chapter and Conference Paper
Algorithm of Multiple Sensitive Attributes Privacy Based on Personal Anonymous
This paper analyzes the (k, l) - Anonymous model need to address two key questions: re-encoding methods and information loss metrics, and in-depth analysis of the (k, l) - Anonymous model and similar models th...
-
Chapter and Conference Paper
An Integer Programming Approach for the Rural Postman Problem with Time Dependent Travel Times
The Chinese Postman Problem is a famous and classical problem in graph theory. This paper introduces a new variant of this problem, namely Rural Postman Problem with Time Dependent Travel Times, which is motiv...
-
Chapter and Conference Paper
The Development and Preliminary Application Ofplant Quarantine Remote Teaching System Inchina
With the development of modern information technology, the traditional teaching mode becomes more deficient for the requirement of modern education. Plant Quarantine has been accepted as the common course for ...
-
Chapter and Conference Paper
Discovering the Most Suitable Web Service in Collaboration Environment
With the increasing growth in popularity of web services, efficient discovery and matchmaking of relevant web services become significant challenges. Semantic Web provides a promising way to address the challe...
-
Chapter and Conference Paper
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves
We investigate an upper bound on the discrepancy and a lower bound on the linear complexity of a class of sequences, derived from elliptic curves by using discrete logarithm in this paper. The results indicate...
-
Chapter and Conference Paper
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences
An efficient algorithm for determining the linear complexity and the minimal polynomial of sequence with period p m q ...
-
Chapter and Conference Paper
A Service-Oriented Framework for Traffic Information Grid
Intelligent Transportation System (ITS) refers to the use of information technologies to address and alleviate transportation problems. The challenges of ITS exist mainly in synthesizing information from geogr...
-
Chapter and Conference Paper
Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms
For the first time, we propose Network-tree Model and its theorem of routing optimization, which greatly narrows the searching space of the routing procedure within much smaller sub-networks. We then show the ...
-
Chapter and Conference Paper
Traffic Flow Forecasting Based on Parallel Neural Network
In Intelligent Transportation Systems (ITS), traffic flow forecasting is important to Traffic Flow Guidance System (TFGS). However most of the traffic flow forecasting models cannot meet the requirement of TFG...