![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
282 Result(s)
-
Chapter
USD: Scalable Bandwidth Allocation for the Internet
In this paper, we present a differentiated service scheme called “User-Share Differentiation (USD)”. The USD scheme is designed for long-term bandwidth allocation without per-session signaling. The scheme allo...
-
Chapter and Conference Paper
Boosting trees for cost-sensitive classifications
This paper explores two boosting techniques for cost-sensitive tree classifications in the situation where misclassification costs change very often. Ideally, one would like to have only one induction, and use...
-
Chapter
A Cut-Off Priority Flow Classification Policy for Data-Driven IP/ATM Switching Systems
Flow classification is one of the key issues in the design of a data-driven IP/ATM switching system. To classify flows by applications is an effective approach in a real system due to its simplicity in impleme...
-
Chapter
Fair Bandwidth Allocation for Differentiated Services
In this paper, we present a comparative study of three proposals for differentiated services — the RIO scheme, the two-bit scheme and the User-Share Differentiation (USD) scheme. We simulate the three schemes ...
-
Chapter and Conference Paper
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices ...
-
Chapter and Conference Paper
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity
We establish, for the first time, an explicit and simple lower bound on the nonlinearity N f of a Boolean function f of n variables satisfying the avalanche criterion of degree p, namely, Nf≥ 2n-1
-
Chapter and Conference Paper
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
Signcryption is a public key cryptographic primitive that fulfills the functions of digital signature and public key encryption concurrently, with a cost smaller than that required by the traditional signature...
-
Chapter and Conference Paper
Efficient Verification of a Class of Linear Hybrid Automata Using Linear Programming
In this paper, we show that for a class of linear hybrid automata called zero loop-closed automata, the satisfaction problem for linear duration properties can be solved efficiently by linear programming. We give...
-
Chapter and Conference Paper
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
It has recently been shown that when m > 1/2n - 1, the nonlinearity N f of an mth-order correlation immune function f with n variables satisfies the condition of N
-
Chapter and Conference Paper
Architecture of Generalized Network Service Anomaly and Fault Thresholds
In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a novel system architecture that is capable of setting, monitoring and detecting generalized thresholds and soft faults proa...
-
Chapter and Conference Paper
IDSIS: Intelligent Document Semantic Indexing System
With rapid growth of the Internet, how to get information from this huge information space becomes an even important problem. In this paper, An Intelligence Document Semantic Indexing System: IDSIS is proposed...
-
Chapter and Conference Paper
Security Notions for Unconditionally Secure Signature Schemes
This paper focuses on notions for the security of digital signature schemes whose resistance against forgery is not dependent on unproven computational assumptions. We establish successfully a sound and strong...
-
Chapter
DVQ: A DTD-Driven Visual Query Interface for XML Database Systems
XML has been recognized as a promising language for data exchange over the Internet. A number of query languages have been proposed for querying XML data. Most of those languages are path-expression based. One...
-
Chapter and Conference Paper
Interactive Deformation of Irregular Surface Models
Interactive deformation of surface models, which consist of quadrilateral (regular) and non-quadrilateral (irregular) surface patches, arises in many applications of computer animation and computer aided produ...
-
Chapter and Conference Paper
Stereo Matching Using Belief Propagation
In this paper, we formulate the stereo matching problem as a Markov network consisting of three coupled Markov random fields (MRF’s). These three MRF’s model a smooth field for depth/disparity, a line process ...
-
Chapter and Conference Paper
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundatio...
-
Chapter and Conference Paper
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
Ring signature allows to specify a set of possible signers without revealing which member actually produced the signature. This concept was first formalized in 2001 by Rivest, Shamir, and Tauman[3]. Authors of...
-
Chapter and Conference Paper
Parallel Computing Method of Valuing for Multi-asset European Option
A critical problem in Finance Engineering is to value the option and other derivatives securities correctly. The Monte Carlo method (MC) is an important one in the computation for the valuation of multiasset E...
-
Chapter and Conference Paper
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts
There are many applications for true, unpredictable random numbers. For example the strength of numerous cryptographic operations is often dependent on a source of truly random numbers. Sources of random infor...
-
Chapter and Conference Paper
Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANET), nodes move freely and the replica allocation in such a dynamic environment is a significant challenge. In this paper, a dynamic adaptive replica allocation algorithm that can...