Sciweavers

IEEEIAS
2009
IEEE
13 years 9 months ago
Full System Simulation and Verification Framework
In this paper, we propose a framework to develop highperformance system accelerator hardware and the corresponding software at system-level. This framework is designed by integrat...
Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chu...
IEEEIAS
2009
IEEE
13 years 9 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
IEEEIAS
2009
IEEE
13 years 9 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
IEEEIAS
2009
IEEE
13 years 9 months ago
A Study on the Algorithm Based on Image Color Correlation Mining
: Because of the semantic gap between low-level feature and high-level semantic feature of images, the results of the traditional color-based image retrieval can't meet users&...
Yongyue Chen, Huosong Xia
IEEEIAS
2009
IEEE
13 years 9 months ago
Detection of Abnormal Sound Using Multi-stage GMM for Surveillance Microphone
We developed a system that detects abnormal sound from sound signal observed by a surveillance microphone. Our system learns the "normal sound" from observation of the m...
Akinori Ito, Akihito Aiba, Masashi Ito, Shozo Maki...
IEEEIAS
2009
IEEE
14 years 6 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
IEEEIAS
2009
IEEE
14 years 6 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
IEEEIAS
2009
IEEE
14 years 6 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IEEEIAS
2009
IEEE
14 years 6 months ago
Guess and Determine Attack on SOSEMANUK
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
Ding Lin, Guan Jie
IEEEIAS
2009
IEEE
14 years 6 months ago
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264
: An adaptive threshold for early termination is proposed in this paper to enhance the cross octagonal search algorithm (COSA)[1]. In block motion estimation, search patterns have ...
Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu