![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
It has recently been shown that when m > 1/2n - 1, the nonlinearity N f of an mth-order correlation immune function f with n variables satisfies the condition of N
-
Chapter and Conference Paper
IDSIS: Intelligent Document Semantic Indexing System
With rapid growth of the Internet, how to get information from this huge information space becomes an even important problem. In this paper, An Intelligence Document Semantic Indexing System: IDSIS is proposed...
-
Chapter
DVQ: A DTD-Driven Visual Query Interface for XML Database Systems
XML has been recognized as a promising language for data exchange over the Internet. A number of query languages have been proposed for querying XML data. Most of those languages are path-expression based. One...
-
Chapter and Conference Paper
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs
Remote mirroring ensures that all data written to a primary storage device are also written to a remote secondary storage device to support disaster recoverability. In this study, we designed and implemented a...
-
Chapter and Conference Paper
Network-Embedded Programmable Storage and Its Applications
We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and functionalities are significantly...
-
Chapter and Conference Paper
MagicStore: A New Out-of-Band Virtualization System in SAN Environments
In this paper, MagicStore, a new out-of-band virtualization system designed for SAN environments is proposed. Online multiplication of the components in a striped volume can help enhance both the I/O performan...
-
Chapter and Conference Paper
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services
Today’s grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are mo...
-
Chapter and Conference Paper
Pattern-Based Specification and Validation of Web Services Interaction Properties
There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWL-S. Part of the semantic description in OWL-S is about the interaction proce...
-
Chapter and Conference Paper
Modelling and Analysis of Power Consumption for Component-Based Embedded Software
With the increasing complexity of the real-time embedded software, the power consumption is becoming a real challenge in the system designs. In this paper, for modelling the component-based embedded software, ...
-
Chapter and Conference Paper
An ID-Based Watermarking Scheme for Java Programs
In this paper, we propose an identities(ID) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants’ identities, embedded via the watermarked opaque predicates, and ...
-
Chapter and Conference Paper
Performance and Analysis of CDM-FH-OFDMA for Broadband Wireless Systems
Frequency-hop** (FH) methods in the Orthogonal frequency division multiplexing access(OFDMA) system,which are to assign user-specific subcarrier to the active users, have been paid much attention to in the b...
-
Chapter and Conference Paper
Chinese Visible Human Data Sets and Their Applications
The research on digital visible human is of great significance and application value. The US VHP created the first digital image data set of complete human (male and female) in 1995. To promote worldwide appli...
-
Chapter and Conference Paper
Layered Peer to Peer Streaming Using Hidden Markov Models
A fundamental problem in peer-to-peer streaming is how to select peers from a large network to request their media data. Due to the heterogeneity and the time-varying features of shared resources between peers...
-
Chapter and Conference Paper
EEGFGR: An Energy-Efficient Greedy-Face Geographic Routing for Wireless Sensor Networks
The geographic routing technology is good for the self-organizing and large-scale Wireless Sensor Networks(WSNs), and the energy-limited sensor nodes require the energy used for routing to be minimum. In this ...
-
Chapter and Conference Paper
Extracting Realistic Textures from Reference Spheres
This paper proposes a method for extracting realistic textures from real-world reference spheres. The BRDF parameters of fundamental materials, as well as a material weight map for the sphere are obtained thro...
-
Chapter and Conference Paper
Linkable Ring Signatures from Linear Feedback Shift Register
Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of ...
-
Chapter and Conference Paper
Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e
The broadband wireless access (BWA) network, such as IEEE 802.16e, becomes more and more popular in recent years. According to the IEEE 802.16e specifications, mobile subscriber stations (MSSs) with energy con...
-
Chapter and Conference Paper
WebELS: A Content-Centered E-Learning Platform for Postgraduate Education in Engineering
This paper proposes a general purpose e-Learning platform WebELS to support higher education in engineering and science especially for PhD education. WebELS consists of three major modules, i.e., Learning for ...
-
Chapter and Conference Paper
Managing Long-Tail Processes Using FormSys
Efforts and tools aiming to automate business processes promise the highest potential gains on business processes with a well-defined structure and high degree of repetition [1]. Despite successes in this area...
-
Chapter and Conference Paper
Provenance-Aware Faceted Search in Drupal
As the web content is increasingly generated in more diverse situations, provenance is becoming more and more critical. While a variety of approaches have been investigated for capturing and making use of prov...