Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

   优先出版

合作单位

2013年, 第7卷 第3期 出版日期:2013-06-01

选择: 合并摘要 显示/隐藏图片
RESEARCH ARTICLE
FPGA based unified architecture for public key and private key cryptosystems
Yi WANG, Renfa LI
Frontiers of Computer Science. 2013, 7 (3): 307-316.  
https://doi.org/10.1007/s11704-013-2187-2

摘要   HTML   PDF (814KB)

Recently, security in embedded system arises attentions because of modern electronic devices need cautiously either exchange or communicate with the sensitive data. Although security is classical research topic in worldwide communication, the researchers still face the problems of how to deal with these resource constraint devices and enhance the features of assurance and certification. Therefore, some computations of cryptographic algorithms are built on hardware platforms, such as field program gate arrays (FPGAs). The commonly used cryptographic algorithms for digital signature algorithm (DSA) are rivest-shamir-adleman (RSA) and elliptic curve cryptosystems (ECC) which based on the presumed difficulty of factoring large integers and the algebraic structure of elliptic curves over finite fields. Usually, RSA is computed over GF(p), and ECC is computed over GF(p) or GF(2p). Moreover, embedded applications need advance encryption standard (AES) algorithms to process encryption and decryption procedures. In order to reuse the hardware resources and meet the trade-off between area and performance, we proposed a new triple functional arithmetic unit for computing high radix RSA and ECC operations over GF(p) and GF(2p), which also can be extended to support AES operations. A new high radix signed digital (SD) adder has been proposed to eliminate the carry propagations over GF(p). The proposed unified design took up 28.7% less hardware resources than implementing RSA, ECC, and AES individually, and the experimental results show that our Received June 1, 2012; accepted December 5, 2012 E-mail: estelle.ywang@gmail.com proposed architecture can achieve 141.8MHz using approximately 5.5k CLBs on Virtex-5 FPGA.

参考文献 | 相关文章 | 多维度评价
Preserving location privacy without exact locations in mobile services
Xiao PAN, Xiaofeng MENG
Frontiers of Computer Science. 2013, 7 (3): 317-340.  
https://doi.org/10.1007/s11704-013-2020-y

摘要   HTML   PDF (1167KB)

Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which is exactly the information mobile users want to hide. In this paper, we propose a p-anti-conspiration privacy model to anonymize over semi-honest users. Furthermore, two k?NNG-based cloaking algorithms, vk?NNCA and ek?NNCA, are proposed to protect location privacy without exact locations. The efficiency and effectiveness of the proposed algorithms are validated by a series of carefully designed experiments. The experimental results show that the price paid for location privacy protection without exact locations is small.

参考文献 | 相关文章 | 多维度评价
Quantum software framework: a tentative study
Nan WU, Haixing HU, Fangmin SONG, Huimin ZHENG, Xiangdong LI
Frontiers of Computer Science. 2013, 7 (3): 341-349.  
https://doi.org/10.1007/s11704-012-2168-x

摘要   HTML   PDF (851KB)

In this paper we conduct a tentative study on the requirements and the structure for a quantum computer at the software level. From the software point of view, we describe the methodology used to minimize the decoherence.We construct the quantum instruction set for the higher-level computation. We also study the criteria for designing the quantum programming languages.

参考文献 | 相关文章 | 多维度评价
Reversible spiking neural P systems
Tao SONG, Xiaolong SHI, Jinbang XU
Frontiers of Computer Science. 2013, 7 (3): 350-358.  
https://doi.org/10.1007/s11704-013-2061-2

摘要   HTML   PDF (356KB)

Spiking neural (SN) P systems are a class of distributed parallel computing devices inspired by the way neurons communicate by means of spikes. In this work, we investigate reversibility in SN P systems, as well as the computing power of reversible SN P systems. Reversible SN P systems are proved to have Turing creativity, that is, they can compute any recursively enumerable set of non-negative integers by simulating universal reversible register machine.

参考文献 | 相关文章 | 多维度评价
Co-metric: a metric learning algorithm for data with multiple views
Qiang QIAN, Songcan CHEN
Frontiers of Computer Science. 2013, 7 (3): 359-369.  
https://doi.org/10.1007/s11704-013-2110-x

摘要   HTML   PDF (1126KB)

We address the problem of metric learning for multi-view data. Many metric learning algorithms have been proposed, most of them focus just on single view circumstances, and only a few deal with multi-view data. In this paper, motivated by the co-training framework, we propose an algorithm-independent framework, named co-metric, to learn Mahalanobis metrics in multi-view settings. In its implementation, an off-the-shelf single-view metric learning algorithm is used to learn metrics in individual views of a few labeled examples. Then the most confidently-labeled examples chosen from the unlabeled set are used to guide the metric learning in the next loop. This procedure is repeated until some stop criteria are met. The framework can accommodate most existing metric learning algorithms whether types-ofside- information or example-labels are used. In addition it can naturally deal with semi-supervised circumstances under more than two views. Our comparative experiments demonstrate its competiveness and effectiveness.

参考文献 | 相关文章 | 多维度评价
REVIEW ARTICLE
A survey on temporal logics for specifying and verifying real-time systems
Savas KONUR
Frontiers of Computer Science. 2013, 7 (3): 370-403.  
https://doi.org/10.1007/s11704-013-2195-2

摘要   HTML   PDF (515KB)

Over the last two decades, there has been an extensive study of logical formalisms on specifying and verifying real-time systems. Temporal logics have been an important research subject within this direction. Although numerous logics have been introduced for formal specification of real-time and complex systems, an up to date survey of these logics does not exist in the literature. In this paper we analyse various temporal formalisms introduced for specification, including propositional/first-order linear temporal logics, branching temporal logics, interval temporal logics, real-time temporal logics and probabilistic temporal logics. We give decidability, axiomatizability, expressiveness, model checking results for each logic analysed. We also provide a comparison of features of the temporal logics discussed.

参考文献 | 相关文章 | 多维度评价
RESEARCH ARTICLE
Task assignment for minimizing application completion time using honeybee mating optimization
Qinma KANG, Hong HE
Frontiers of Computer Science. 2013, 7 (3): 404-415.  
https://doi.org/10.1007/s11704-013-2130-6

摘要   HTML   PDF (565KB)

Effective task assignment is essential for achieving high performance in heterogeneous distributed computing systems. This paper proposes a new technique for minimizing the parallel application time cost of task assignment based on the honeybee mating optimization (HBMO) algorithm. The HBMO approach combines the power of simulated annealing, genetic algorithms, and an effective local search heuristic to find the best possible solution to the problem within an acceptable amount of computation time. The performance of the proposed HBMO algorithm is shown by comparing it with three existing task assignment techniques on a large number of randomly generated problem instances. Experimental results indicate that the proposed HBMO algorithm outperforms the competing algorithms.

参考文献 | 相关文章 | 多维度评价
CADSE: communication aware design space exploration for efficient run-time MPSoC management
Amit Kumar SINGH, Akash KUMAR, Jigang WU, Thambipillai SRIKANTHAN
Frontiers of Computer Science. 2013, 7 (3): 416-430.  
https://doi.org/10.1007/s11704-013-2196-1

摘要   HTML   PDF (628KB)

Real-time multi-media applications are increasingly mapped on modern embedded systems based on multiprocessor systems-on-chip (MPSoC). Tasks of the applications need to be mapped on the MPSoC resources efficiently in order to satisfy their performance constraints. Exploring all the possible mappings, i.e., tasks to resources combinations exhaustively may take days or weeks. Additionally, the exploration is performed at design-time, which cannot handle dynamism in applications and resources’ status. A runtime mapping technique can cater for the dynamism but cannot guarantee for strict timing deadlines due to large computations involved at run-time. Thus, an approach performing feasible compute intensive exploration at design-time and using the explored results at run-time is required. This paper presents a solution in the same direction. Communicationaware design space exploration (CADSE) techniques have been proposed to explore different mapping options to be selected at run-time subject to desired performance and available MPSoC resources. Experiments show that the proposed techniques for exploration are faster over an exhaustive exploration and provides almost the same quality of results.

参考文献 | 相关文章 | 多维度评价
Topology-aware virtual network embedding based on closeness centrality
Zihou WANG, Yanni HAN, Tao LIN, Yuemei XU, Song CI, Hui TANG
Frontiers of Computer Science. 2013, 7 (3): 446-457.  
https://doi.org/10.1007/s11704-013-2108-4

摘要   HTML   PDF (498KB)

Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtual nodes and virtual edges onto substrate networks. Previous research has presented several heuristic algorithms, which fail to consider that the attributes of the substrate topology and virtual networks affect the embedding process. In this paper, for the first time, we introduce complex network centrality analysis into the virtual network embedding, and propose virtual network embedding algorithms based on closeness centrality. Due to considering of the attributes of nodes and edges in the topology, our studies are more reasonable than existing work. In addition, with the guidance of topology quantitative evaluation, the proposed network embedding approach largely improves the network utilization efficiency and decreases the embedding complexity. We also investigate our algorithms on real network topologies (e.g., AT&T, DFN) and random network topologies. Experimental results demonstrate the usability and capability of the proposed approach.

参考文献 | 相关文章 | 多维度评价
9篇文章