Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

   Online First

Administered by

, Volume 7 Issue 3

For Selected: View Abstracts Toggle Thumbnails
RESEARCH ARTICLE
FPGA based unified architecture for public key and private key cryptosystems
Yi WANG, Renfa LI
Front Comput Sci. 2013, 7 (3): 307-316.  
https://doi.org/10.1007/s11704-013-2187-2

Abstract   HTML   PDF (814KB)

Recently, security in embedded system arises attentions because of modern electronic devices need cautiously either exchange or communicate with the sensitive data. Although security is classical research topic in worldwide communication, the researchers still face the problems of how to deal with these resource constraint devices and enhance the features of assurance and certification. Therefore, some computations of cryptographic algorithms are built on hardware platforms, such as field program gate arrays (FPGAs). The commonly used cryptographic algorithms for digital signature algorithm (DSA) are rivest-shamir-adleman (RSA) and elliptic curve cryptosystems (ECC) which based on the presumed difficulty of factoring large integers and the algebraic structure of elliptic curves over finite fields. Usually, RSA is computed over GF(p), and ECC is computed over GF(p) or GF(2p). Moreover, embedded applications need advance encryption standard (AES) algorithms to process encryption and decryption procedures. In order to reuse the hardware resources and meet the trade-off between area and performance, we proposed a new triple functional arithmetic unit for computing high radix RSA and ECC operations over GF(p) and GF(2p), which also can be extended to support AES operations. A new high radix signed digital (SD) adder has been proposed to eliminate the carry propagations over GF(p). The proposed unified design took up 28.7% less hardware resources than implementing RSA, ECC, and AES individually, and the experimental results show that our Received June 1, 2012; accepted December 5, 2012 E-mail: estelle.ywang@gmail.com proposed architecture can achieve 141.8MHz using approximately 5.5k CLBs on Virtex-5 FPGA.

References | Related Articles | Metrics
Preserving location privacy without exact locations in mobile services
Xiao PAN, Xiaofeng MENG
Front Comput Sci. 2013, 7 (3): 317-340.  
https://doi.org/10.1007/s11704-013-2020-y

Abstract   HTML   PDF (1167KB)

Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which is exactly the information mobile users want to hide. In this paper, we propose a p-anti-conspiration privacy model to anonymize over semi-honest users. Furthermore, two k?NNG-based cloaking algorithms, vk?NNCA and ek?NNCA, are proposed to protect location privacy without exact locations. The efficiency and effectiveness of the proposed algorithms are validated by a series of carefully designed experiments. The experimental results show that the price paid for location privacy protection without exact locations is small.

References | Related Articles | Metrics
Quantum software framework: a tentative study
Nan WU, Haixing HU, Fangmin SONG, Huimin ZHENG, Xiangdong LI
Front Comput Sci. 2013, 7 (3): 341-349.  
https://doi.org/10.1007/s11704-012-2168-x

Abstract   HTML   PDF (851KB)

In this paper we conduct a tentative study on the requirements and the structure for a quantum computer at the software level. From the software point of view, we describe the methodology used to minimize the decoherence.We construct the quantum instruction set for the higher-level computation. We also study the criteria for designing the quantum programming languages.

References | Related Articles | Metrics
Reversible spiking neural P systems
Tao SONG, Xiaolong SHI, Jinbang XU
Front Comput Sci. 2013, 7 (3): 350-358.  
https://doi.org/10.1007/s11704-013-2061-2

Abstract   HTML   PDF (356KB)

Spiking neural (SN) P systems are a class of distributed parallel computing devices inspired by the way neurons communicate by means of spikes. In this work, we investigate reversibility in SN P systems, as well as the computing power of reversible SN P systems. Reversible SN P systems are proved to have Turing creativity, that is, they can compute any recursively enumerable set of non-negative integers by simulating universal reversible register machine.

References | Related Articles | Metrics
Co-metric: a metric learning algorithm for data with multiple views
Qiang QIAN, Songcan CHEN
Front Comput Sci. 2013, 7 (3): 359-369.  
https://doi.org/10.1007/s11704-013-2110-x

Abstract   HTML   PDF (1126KB)

We address the problem of metric learning for multi-view data. Many metric learning algorithms have been proposed, most of them focus just on single view circumstances, and only a few deal with multi-view data. In this paper, motivated by the co-training framework, we propose an algorithm-independent framework, named co-metric, to learn Mahalanobis metrics in multi-view settings. In its implementation, an off-the-shelf single-view metric learning algorithm is used to learn metrics in individual views of a few labeled examples. Then the most confidently-labeled examples chosen from the unlabeled set are used to guide the metric learning in the next loop. This procedure is repeated until some stop criteria are met. The framework can accommodate most existing metric learning algorithms whether types-ofside- information or example-labels are used. In addition it can naturally deal with semi-supervised circumstances under more than two views. Our comparative experiments demonstrate its competiveness and effectiveness.

References | Related Articles | Metrics
REVIEW ARTICLE
A survey on temporal logics for specifying and verifying real-time systems
Savas KONUR
Front. Comput. Sci.. 2013, 7 (3): 370-403.  
https://doi.org/10.1007/s11704-013-2195-2

Abstract   HTML   PDF (515KB)

Over the last two decades, there has been an extensive study of logical formalisms on specifying and verifying real-time systems. Temporal logics have been an important research subject within this direction. Although numerous logics have been introduced for formal specification of real-time and complex systems, an up to date survey of these logics does not exist in the literature. In this paper we analyse various temporal formalisms introduced for specification, including propositional/first-order linear temporal logics, branching temporal logics, interval temporal logics, real-time temporal logics and probabilistic temporal logics. We give decidability, axiomatizability, expressiveness, model checking results for each logic analysed. We also provide a comparison of features of the temporal logics discussed.

References | Related Articles | Metrics
RESEARCH ARTICLE
Task assignment for minimizing application completion time using honeybee mating optimization
Qinma KANG, Hong HE
Front Comput Sci. 2013, 7 (3): 404-415.  
https://doi.org/10.1007/s11704-013-2130-6

Abstract   HTML   PDF (565KB)

Effective task assignment is essential for achieving high performance in heterogeneous distributed computing systems. This paper proposes a new technique for minimizing the parallel application time cost of task assignment based on the honeybee mating optimization (HBMO) algorithm. The HBMO approach combines the power of simulated annealing, genetic algorithms, and an effective local search heuristic to find the best possible solution to the problem within an acceptable amount of computation time. The performance of the proposed HBMO algorithm is shown by comparing it with three existing task assignment techniques on a large number of randomly generated problem instances. Experimental results indicate that the proposed HBMO algorithm outperforms the competing algorithms.

References | Related Articles | Metrics
CADSE: communication aware design space exploration for efficient run-time MPSoC management
Amit Kumar SINGH, Akash KUMAR, Jigang WU, Thambipillai SRIKANTHAN
Front Comput Sci. 2013, 7 (3): 416-430.  
https://doi.org/10.1007/s11704-013-2196-1

Abstract   HTML   PDF (628KB)

Real-time multi-media applications are increasingly mapped on modern embedded systems based on multiprocessor systems-on-chip (MPSoC). Tasks of the applications need to be mapped on the MPSoC resources efficiently in order to satisfy their performance constraints. Exploring all the possible mappings, i.e., tasks to resources combinations exhaustively may take days or weeks. Additionally, the exploration is performed at design-time, which cannot handle dynamism in applications and resources’ status. A runtime mapping technique can cater for the dynamism but cannot guarantee for strict timing deadlines due to large computations involved at run-time. Thus, an approach performing feasible compute intensive exploration at design-time and using the explored results at run-time is required. This paper presents a solution in the same direction. Communicationaware design space exploration (CADSE) techniques have been proposed to explore different mapping options to be selected at run-time subject to desired performance and available MPSoC resources. Experiments show that the proposed techniques for exploration are faster over an exhaustive exploration and provides almost the same quality of results.

References | Related Articles | Metrics
Topology-aware virtual network embedding based on closeness centrality
Zihou WANG, Yanni HAN, Tao LIN, Yuemei XU, Song CI, Hui TANG
Front Comput Sci. 2013, 7 (3): 446-457.  
https://doi.org/10.1007/s11704-013-2108-4

Abstract   HTML   PDF (498KB)

Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtual nodes and virtual edges onto substrate networks. Previous research has presented several heuristic algorithms, which fail to consider that the attributes of the substrate topology and virtual networks affect the embedding process. In this paper, for the first time, we introduce complex network centrality analysis into the virtual network embedding, and propose virtual network embedding algorithms based on closeness centrality. Due to considering of the attributes of nodes and edges in the topology, our studies are more reasonable than existing work. In addition, with the guidance of topology quantitative evaluation, the proposed network embedding approach largely improves the network utilization efficiency and decreases the embedding complexity. We also investigate our algorithms on real network topologies (e.g., AT&T, DFN) and random network topologies. Experimental results demonstrate the usability and capability of the proposed approach.

References | Related Articles | Metrics
9 articles