نتایج جستجو برای: proxy modeling

تعداد نتایج: 414282  

2005
Je Hong Park Bo Gyeong Kang Sangwoo Park

A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signature schemes and various extensions have been considered. As an example, the notion of threshold proxy signature or proxy multi-signature was introduced as a group-oriented variant. In this paper, we show that some threshold proxy ...

2011
James P. McCusker Joanne S. Luciano Deborah L. McGuinness

Conceptual modeling can be viewed as a way of expressing human understanding of a body of knowledge. This view can be viewed as distinct from standard notions of data modeling and ontology, which seek to directly describe data and reality. We define conceptual interoperability, give use cases and requirements for it, and introduce the Conceptual Model Ontology (CMO), which satisfies the discuss...

2002
Gordon H. Dash Nina Kajiji

Stylized facts are uncovered for a domestic (U.S.) examination of the South African Rand futures contract (ZAR). In this preliminary study, we model complex volatility patterns by a nonparametric artificial neural network (ANN) that incorporates a performance enhancing closed-form regularization technique. The modeling characteristics revealed by the Kajiji-4 radial basis function (RBF) ANN pro...

2007
Jan Mendling Hajo A. Reijers Jorge S. Cardoso

Despite that formal and informal quality aspects are of significant importance to business process modeling, there is only little empirical work reported on process model quality and its impact factors. In this paper we investigate understandability as a proxy for quality of process models and focus on its relations with personal and model characteristics. We used a questionnaire in classes at ...

2014
Aarno T. Kotilainen Laura Arppe Slawomir Dobosz Eystein Jansen Karoline Kabel Juha Karhu Mia M. Kotilainen Antoon Kuijpers Bryan C. Lougheed H. E. Markus Meier Matthias Moros Thomas Neumann Christian Porsche Niels Poulsen Peter Rasmussen Sofia Ribeiro Bjørg Risebrobakken Daria Ryabchuk Semjon Schimanke Ian Snowball Mikhail Spiridonov Joonas J. Virtasalo Kaarina Weckström Andrzej Witkowski Vladimir Zhamoida

Integrated sediment multiproxy studies and modeling were used to reconstruct past changes in the Baltic Sea ecosystem. Results of natural changes over the past 6000 years in the Baltic Sea ecosystem suggest that forecasted climate warming might enhance environmental problems of the Baltic Sea. Integrated modeling and sediment proxy studies reveal increased sea surface temperatures and expanded ...

2007
Wei Tan Liana L. Fong Norman Bobroff

Workflow technology is an emerging paradigm for systematic modeling and orchestration of job flow for enterprise and scientific applications. This paper introduces BPEL4Job, a BPEL-based design for fault handling of job flow in a distributed computing environment. The features of the proposed design include: a two-stage approach for job flow modeling that separates base flow structure from faul...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2015
Tyrus Berry Dimitrios Giannakis John Harlim

This paper presents a nonparametric modeling approach for forecasting stochastic dynamical systems on low-dimensional manifolds. The key idea is to represent the discrete shift maps on a smooth basis which can be obtained by the diffusion maps algorithm. In the limit of large data, this approach converges to a Galerkin projection of the semigroup solution to the underlying dynamics on a basis a...

2003
Chwei-Shyong TSAI Shiang-Feng TZENG Min-Shiang HWANG

In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers. In their scheme, the proxy group cannot deny having signed the proxy signature if they did. However, Hsu et al.’s scheme is vulnerable to some attacks. A malicious original signer or malicious proxy signer can impersonate some other proxy signers to generate proxy signatures. In this article, we shall pr...

Journal: :IACR Cryptology ePrint Archive 2003
Jiqiang Lv Jingwei Liu Xinmei Wang

Proxy signature is a signature that an original signer delegates his or her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. However, Sun et al. [7] showed that the proxy and multi-proxy signatures of Lee et al. [3], and the strong proxy signature scheme with proxy signer privacy protection of Shum et al. [6] are not against t...

2010
Xiaoming HU Zhe ZHANG Yinchun YANG

Based on the RSA problem, Zhou et al.’s proposed a proxy-protected proxy signature scheme. They claimed that their scheme were secure and efficient. However, this paper shows that their proposed proxy-protected proxy signature scheme is insecure against the replaced warrant attack: the original signer can remove the old warrant from a valid proxy signature and then construct a new warrant, and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید