Beijing University Of Technology

Displaying 1-18 of 18 results

  • White Papers // Apr 2014

    A Non-Cooperative Game Model for Reliability-Based Task Scheduling in Cloud Computing

    Cloud computing is a newly emerging distributed system which is evolved from Grid computing. Task scheduling is the core research of cloud computing which studies how to allocate the tasks among the physical nodes, so that the tasks can get a balanced allocation or each task's execution cost decreases to...

    Provided By Beijing University Of Technology

  • White Papers // Apr 2014

    A Task Allocation Schema Based on Response Time Optimization in Cloud Computing

    Cloud computing is a newly emerging distributed computing which is evolved from Grid computing. Task scheduling is the core research of cloud computing which studies how to allocate the tasks among the physical nodes so that the tasks can get a balanced allocation or each task's execution cost decreases to...

    Provided By Beijing University Of Technology

  • White Papers // May 2013

    Toward Trust-Based Privacy Protection in Consumer Communication

    In consumer communications, entities, i.e., users, hand-held devices, etc., which connect to or interact with each other, may know little about each other or without any prior knowledge. Therefore, in many applications, before a serious interaction begins, certain level of trust must be established between the interacting entities, which may...

    Provided By Beijing University Of Technology

  • White Papers // Apr 2013

    Quantitative Analysis of the Correlation of Round-Trip Times Between Network Nodes

    Round-Trip Time (RTT) is defined as the round-trip delay of a data packet between a source and a destination node and is a very important metric for measuring the performance of network applications. The measurement and estimation of RTTs has received a great deal of attention in network measurement research...

    Provided By Beijing University Of Technology

  • White Papers // Feb 2013

    Authentication and En-Route Data Filtering for Wireless Sensor Networks in The Internet of Things Scenario

    To become an indispensable part of the Internet of Things (IoT), Wireless Sensor Networks (WSNs) have to be integrated into the Internet. Under such circumstances, any IP-enabled node in the Internet shall be able to directly communicate with any sensor node in a WSN. Then, multiple sensor nodes can be...

    Provided By Beijing University Of Technology

  • White Papers // Feb 2013

    A Service-Oriented Identity Authentication Privacy Protection Method in Cloud Computing

    Cloud computing provides elastic, scalable on-demand IT services for individuals and organizations. In the cloud computing, everything is as the service. Cloud clients enjoy convenience and efficiency service, but at the same time encounter new issues. Cloud clients needs to provide authentication information to access to service, which often contains...

    Provided By Beijing University Of Technology

  • White Papers // Oct 2012

    Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN

    IPv6 over Low power Wireless Personal Area Network (6LoWPAN) has emerged as a promising technology to realize ambient intelligence under the vision of the Internet of Things. Under most circumstances, it is imperative that security be addressed from bootstrapping to data transmission. In this paper, the authors propose a secure...

    Provided By Beijing University Of Technology

  • White Papers // Sep 2011

    On the Controlled Markov Chains Approach to Software Testing

    The Controlled Markov Chains (CMC) approach to software testing is a relatively new approach that is distinctly different from conventional ones. It follows the idea of software cybernetics that explores the interplay between software and control, and treats software testing as a control problem. The software under test serves as...

    Provided By Beijing University Of Technology

  • White Papers // Jul 2011

    Access Control Model Based on Trust

    With the development of networking technology, traditional access control methods can no longer effectively deal with the security issues in open networking environments. As an important factor in network security, trust can be an effective approach to solve the access control problem. In this paper, the authors propose an access...

    Provided By Beijing University Of Technology

  • White Papers // Jun 2011

    Research on Detection Scheme for Denial of Service Attacks in Wireless Mesh Networks

    There are a lot of measures to launch DoS attacks from the physical layer to the application layer in wireless mesh networks because of its own characteristics. In order to detect the DoS attack (Denial-of-Service attack) when wireless mesh networks adopt AODV routing protocol of Ad Hoc networks, such technologies...

    Provided By Beijing University Of Technology

  • White Papers // May 2011

    Fast Password Recovery Attack: Application to APOP

    In this paper, the authors propose a fast password recovery attack to APOP application in local which can recover a password with 11 characters in less than one minute, recover a password with 31 characters extremely fast, about 4 minutes, and for 43 characters in practical time. These attacks truly...

    Provided By Beijing University Of Technology

  • White Papers // May 2011

    A Deeply Protected Hybrid Key Exchange Model in Wireless Mesh Networks

    Wireless mesh networks are widely considered as a vision for the future of wireless mobile networks. In this paper, the authors present a deeply protected hybrid key exchange model in wireless mesh networks named DPHKE. The model uses signcryption and encryption to deeply protect the shared-key's secret material and uses...

    Provided By Beijing University Of Technology

  • White Papers // May 2011

    The Construction of Fuzzy Cognitive Map Classification Model Based on Relational Database

    With the aim to facilitate cognitive and classification mining for multi-relationship system, the paper proposes a kind of FCM - TTFCM (Two-level Tree-type Fuzzy Cognitive Map). But how to construct TTFCM directly from relational database corresponding to the multi-relationship system is the key. A kind of calculation method to mine...

    Provided By Beijing University Of Technology

  • White Papers // Apr 2011

    Database Design of a General Data Analysis System of Commodity Sales Information

    A data analysis system for the general commodity sales information is researched on and further designed. The key problems of designing this system are that, it should enable the system to adjust to user-data with different structures, enable users to define or change data structures as well as retrieval methods....

    Provided By Beijing University Of Technology

  • White Papers // Jan 2011

    The REESSE1+ Public Key Cryptosystem

    The trapdoor functions for RSA and ElGamal public key cryptosystems are computationally one-way, which indicates that there always exists one sufficiently large setting of the security dominant parameter that makes utilizing a cryptosystem feasible and breaking the cryptosystem infeasible in polynomial time. Instancing RSA based on the Integer Factorization Problem...

    Provided By Beijing University Of Technology

  • White Papers // Jan 2011

    Research on the Relationship Between Trust and Privacy in Network Environments

    In network environments, the entities that connect to or interact with each other may know very little about each other or without prior knowledge at the beginning of an interaction. Therefore, in many cases, before a serious interaction begins, trust must be established between the interactive entities. During trust establishment,...

    Provided By Beijing University Of Technology

  • White Papers // Sep 2009

    Enhancing Reliability for Virtual Machines Via Continual Migration

    The authors' approach is to design and implement a continual migration strategy for virtual machines to achieve automatic failure recovery. By continually and transparently propagating virtual machine's state to a backup host via live migration techniques, trivial applications encapsulated in the virtual machine can be recovered from hardware failures with...

    Provided By Beijing University Of Technology

  • White Papers // Jun 2009

    An UML Statechart Diagram-Based MM-Path Generation Approach for Object-Oriented Integration Testing

    MM-Path, an acronym for Method/Message Path, describes the dynamic interactions between methods in object-oriented systems. This paper discusses the classifications of MM-Path, based on the characteristics of object-oriented software. The authors categorize it according to the generation reasons, the effect scope and the composition of MM-Path. A formalized representation of...

    Provided By Beijing University Of Technology

  • White Papers // Feb 2013

    Authentication and En-Route Data Filtering for Wireless Sensor Networks in The Internet of Things Scenario

    To become an indispensable part of the Internet of Things (IoT), Wireless Sensor Networks (WSNs) have to be integrated into the Internet. Under such circumstances, any IP-enabled node in the Internet shall be able to directly communicate with any sensor node in a WSN. Then, multiple sensor nodes can be...

    Provided By Beijing University Of Technology

  • White Papers // Feb 2013

    A Service-Oriented Identity Authentication Privacy Protection Method in Cloud Computing

    Cloud computing provides elastic, scalable on-demand IT services for individuals and organizations. In the cloud computing, everything is as the service. Cloud clients enjoy convenience and efficiency service, but at the same time encounter new issues. Cloud clients needs to provide authentication information to access to service, which often contains...

    Provided By Beijing University Of Technology

  • White Papers // Apr 2013

    Quantitative Analysis of the Correlation of Round-Trip Times Between Network Nodes

    Round-Trip Time (RTT) is defined as the round-trip delay of a data packet between a source and a destination node and is a very important metric for measuring the performance of network applications. The measurement and estimation of RTTs has received a great deal of attention in network measurement research...

    Provided By Beijing University Of Technology

  • White Papers // Oct 2012

    Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN

    IPv6 over Low power Wireless Personal Area Network (6LoWPAN) has emerged as a promising technology to realize ambient intelligence under the vision of the Internet of Things. Under most circumstances, it is imperative that security be addressed from bootstrapping to data transmission. In this paper, the authors propose a secure...

    Provided By Beijing University Of Technology

  • White Papers // Jan 2011

    The REESSE1+ Public Key Cryptosystem

    The trapdoor functions for RSA and ElGamal public key cryptosystems are computationally one-way, which indicates that there always exists one sufficiently large setting of the security dominant parameter that makes utilizing a cryptosystem feasible and breaking the cryptosystem infeasible in polynomial time. Instancing RSA based on the Integer Factorization Problem...

    Provided By Beijing University Of Technology

  • White Papers // Jun 2009

    An UML Statechart Diagram-Based MM-Path Generation Approach for Object-Oriented Integration Testing

    MM-Path, an acronym for Method/Message Path, describes the dynamic interactions between methods in object-oriented systems. This paper discusses the classifications of MM-Path, based on the characteristics of object-oriented software. The authors categorize it according to the generation reasons, the effect scope and the composition of MM-Path. A formalized representation of...

    Provided By Beijing University Of Technology

  • White Papers // May 2011

    Fast Password Recovery Attack: Application to APOP

    In this paper, the authors propose a fast password recovery attack to APOP application in local which can recover a password with 11 characters in less than one minute, recover a password with 31 characters extremely fast, about 4 minutes, and for 43 characters in practical time. These attacks truly...

    Provided By Beijing University Of Technology

  • White Papers // May 2011

    A Deeply Protected Hybrid Key Exchange Model in Wireless Mesh Networks

    Wireless mesh networks are widely considered as a vision for the future of wireless mobile networks. In this paper, the authors present a deeply protected hybrid key exchange model in wireless mesh networks named DPHKE. The model uses signcryption and encryption to deeply protect the shared-key's secret material and uses...

    Provided By Beijing University Of Technology

  • White Papers // Sep 2009

    Enhancing Reliability for Virtual Machines Via Continual Migration

    The authors' approach is to design and implement a continual migration strategy for virtual machines to achieve automatic failure recovery. By continually and transparently propagating virtual machine's state to a backup host via live migration techniques, trivial applications encapsulated in the virtual machine can be recovered from hardware failures with...

    Provided By Beijing University Of Technology

  • White Papers // Jan 2011

    Research on the Relationship Between Trust and Privacy in Network Environments

    In network environments, the entities that connect to or interact with each other may know very little about each other or without prior knowledge at the beginning of an interaction. Therefore, in many cases, before a serious interaction begins, trust must be established between the interactive entities. During trust establishment,...

    Provided By Beijing University Of Technology

  • White Papers // May 2011

    The Construction of Fuzzy Cognitive Map Classification Model Based on Relational Database

    With the aim to facilitate cognitive and classification mining for multi-relationship system, the paper proposes a kind of FCM - TTFCM (Two-level Tree-type Fuzzy Cognitive Map). But how to construct TTFCM directly from relational database corresponding to the multi-relationship system is the key. A kind of calculation method to mine...

    Provided By Beijing University Of Technology

  • White Papers // Jun 2011

    Research on Detection Scheme for Denial of Service Attacks in Wireless Mesh Networks

    There are a lot of measures to launch DoS attacks from the physical layer to the application layer in wireless mesh networks because of its own characteristics. In order to detect the DoS attack (Denial-of-Service attack) when wireless mesh networks adopt AODV routing protocol of Ad Hoc networks, such technologies...

    Provided By Beijing University Of Technology

  • White Papers // Jul 2011

    Access Control Model Based on Trust

    With the development of networking technology, traditional access control methods can no longer effectively deal with the security issues in open networking environments. As an important factor in network security, trust can be an effective approach to solve the access control problem. In this paper, the authors propose an access...

    Provided By Beijing University Of Technology

  • White Papers // Sep 2011

    On the Controlled Markov Chains Approach to Software Testing

    The Controlled Markov Chains (CMC) approach to software testing is a relatively new approach that is distinctly different from conventional ones. It follows the idea of software cybernetics that explores the interplay between software and control, and treats software testing as a control problem. The software under test serves as...

    Provided By Beijing University Of Technology

  • White Papers // Apr 2011

    Database Design of a General Data Analysis System of Commodity Sales Information

    A data analysis system for the general commodity sales information is researched on and further designed. The key problems of designing this system are that, it should enable the system to adjust to user-data with different structures, enable users to define or change data structures as well as retrieval methods....

    Provided By Beijing University Of Technology

  • White Papers // Apr 2014

    A Non-Cooperative Game Model for Reliability-Based Task Scheduling in Cloud Computing

    Cloud computing is a newly emerging distributed system which is evolved from Grid computing. Task scheduling is the core research of cloud computing which studies how to allocate the tasks among the physical nodes, so that the tasks can get a balanced allocation or each task's execution cost decreases to...

    Provided By Beijing University Of Technology

  • White Papers // Apr 2014

    A Task Allocation Schema Based on Response Time Optimization in Cloud Computing

    Cloud computing is a newly emerging distributed computing which is evolved from Grid computing. Task scheduling is the core research of cloud computing which studies how to allocate the tasks among the physical nodes so that the tasks can get a balanced allocation or each task's execution cost decreases to...

    Provided By Beijing University Of Technology

  • White Papers // May 2013

    Toward Trust-Based Privacy Protection in Consumer Communication

    In consumer communications, entities, i.e., users, hand-held devices, etc., which connect to or interact with each other, may know little about each other or without any prior knowledge. Therefore, in many applications, before a serious interaction begins, certain level of trust must be established between the interacting entities, which may...

    Provided By Beijing University Of Technology