Learn More
From the view of business process, we analyze and design the workflow management system for virtual enterprise (VE), which is distinguished from traditional management of enterprise based on division of function module. Mobile intelligent agent is the basic unit for the management of business processes that realizes the independence and autonomy of dynamic(More)
A novel computable visual attention model (VAM) for video skimming algorithm is proposed. Videos bear more motion features than images do. Objects in videos cause different attention effects, depending on various situations, positions, motions, and appearances. The static visual attention model is based on spatial distribution, visual object, or both, but(More)
This paper addresses the issues of service composition with characteristic of transaction. In spite of the growing interest in service composition, current technologies are found lacking of an underlying conceptual model supporting transaction. A service theory model with characteristic of transaction based on finite state machine (tFSM) is presented. On(More)
Broadcasting in mobile ad hoc networks (MANETs) provides route establishment and control functionality for many unicast and multicast protocols and as such is widely utilized as a building block for other network layer protocols. Based on the analysis of existing broadcasting algorithms, a new broadcast protocol, Receiver-deciding location aided broadcast(More)
A risk situation evaluation model for network security is proposed based on analyzing security threat status. This method first perceived and identified the characteristics of critical risk factors, such as asset, vulnerability and threat, from multi-security-sensors. Then a quantitative evaluation algorithm was presented to estimate current threats and(More)
Group key agreement protocol allows all the members to agree upon a common session key, which may be used for later secure communication among all the participants. Since TGDH (tree based Diffie-Hellman) has been proposed by Yongdae Kim, Adrian Perrig, and Gene Tsudik, there are several group key agreement protocols proposed to improve the security and(More)
Location information in mobile ad hoc networks (MANETs) provides efficiency to routing algorithms. Based on the analysis of several typical location update schemas, this paper proposes a new location information service algorithm called PULI and its variation mPULI. The essence of PULI/mPULI lies in the neat integration of location prediction and(More)
  • 1