Ding Hong

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The resource requesters and providers often belong to different security domains in the openning network. It can be achieved through automated trust negotiation to build confidence and to ensure the security of shared resources. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper analyzed the automatic(More)
In this paper, a new classification scheme, which extracts the main scattering mechanism with target scattering similarities, is proposed. This approach not only leads to improved understanding of scattering mechanisms, but also has good performance in discriminating different scattering type of land cover. The NASA/JPL AIRSAR data is used for validating(More)
In the open network, the resource requesters and providers often belong to different security domains. It can be achieved through automated trust negotiation(ATN) to build confidence among strangers and to ensure the security of shared resources. How to speed up the subsequent negotiation between these entities is the important issue. This paper analyzed(More)
The resource requesters and providers often belong to different security domains in the opening network. It can be achieved through automated trust negotiation(ATN) to build confidence among strangers and to ensure the security of shared resources. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper(More)
Here introduces a monitor system technically based on ARM7 embedded micro processor (HMS30C7202) and Micro C/OS-II embedded operating system. The paper provides the scheme of the principal, introduces the connection method of outside signals, tells about how to transplant the Micro C/OS-II to the operating system, and shows the programming emphases and some(More)
  • 1