Learn More
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the(More)
Component metadata is one of the most effective methods to improve the testability of component-based software. In this paper, we firstly give a formal definition of component, and summarize the basic meanings of component metadata. Based on these, an idea of grouped-metadata object (GMO) is introduced, which is divided into two types, respectively named(More)
Component-based software development technique and its intensive use in the industry has led to the wide research in various aspects of component-based systems. How to improve the testability of component-based software is an interesting and useful technique in the component-based software engineering. In this paper, we summarize eight types of dependency(More)
Component-based software development technique and its intensive use in the industry has led to the wide research in various aspects of component-based systems (CBSs). Its relating quality assurance techniques had become the key research content. This paper summarizes eight types of dependency between two components in the CBSs. And it discusses about a(More)
— The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, we extensively analyze the techniques on data privacy protection for secure cloud storage. We propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKC-based scheme,(More)
—An outlier mining based algorithm is presented to detect dim target in sea and sky background infrared image sequences. Firstly, according to the characteristic that dim target intensity is not correlation with background, viewed the target pixels as outliers; and then used an outlier mining algorithm based on local reachability density (lrd) to detect the(More)