Resource Type

Journal Article 33

Year

2023 3

2022 5

2021 1

2020 2

2019 1

2018 8

2017 6

2016 1

2015 3

2011 1

2007 1

2006 1

open ︾

Keywords

Access control 2

Attribute-based encryption 2

Cloud storage 2

User privacy 2

6G 1

Abstract syntax tree 1

Authentication 1

BIM 1

Backward unlikability 1

CDMA 1

Channel impulse response 1

Coalition game 1

Cognitive radio 1

Cognitive radio network 1

Cognitive radio networks 1

Collaborative filtering (CF) 1

Combinatorial reverse auction 1

Compressed sensing 1

Continuous monitoring 1

Cyber system 1

open ︾

Search scope:

排序: Display mode:

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract: However, ABE schemes have practical limitations on dynamic user revocation.In this paper, we propose two generic user revocation systems for ABE with user privacy protection, userrevocation via ciphertext re-encryption (UR-CRE) and user revocation via cloud storage providers (UR-CSP

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 773-786 doi: 10.1631/FITEE.1800512

Abstract: However, ABE schemes have practical limitations on dynamic attribute revocation.We propose a generic attribute revocation system for ABE with user privacy protection.The attribute revocation ABE (AR-ABE) system can work with any type of ABE scheme to dynamically revoke

Keywords: Attribute-based encryption     Generic attribute revocation     User privacy     Cloud storage     Access control    

Conceptual study on incorporating user information into forecasting systems

Jiarui HAN, Qian YE, Zhongwei YAN, Meiyan JIAO, Jiangjiang XIA

Frontiers of Environmental Science & Engineering 2011, Volume 5, Issue 4,   Pages 533-542 doi: 10.1007/s11783-010-0246-6

Abstract: An ideal forecasting system would incorporate user-end information.The weather forecasting system should include user interaction because user needs may change with differentA study was conducted on the conceptual forecasting system that included a dynamic, user-oriented interactiveA self-improving forecast system was developed involving user feedback throughout a flood season, changingThis paper discusses ideas for developing interactive, user-oriented forecast systems.

Keywords: user-end information     user-oriented     interactive forecasting system     TIGGE (THORPEX interactive grand global    

Generating native user interfaces formultiple devices by means ofmodel transformation

Ignacio MARIN,Francisco ORTIN,German PEDROSA,Javier RODRIGUEZ

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 12,   Pages 995-1017 doi: 10.1631/FITEE.1500083

Abstract: To address this issue, we propose the generation of native user interfaces (UIs) by means of model transformations, following the modelbased user interface (MBUI) paradigm.The objective is not to generate generic applications following the lowest-common-denominator approach

Keywords: Model-to-model transformation     Native user interfaces     Model-based user interfaces     Model-driven engineering    

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4,   Pages 259-271 doi: 10.1631/FITEE.1400232

Abstract: , Chang (2014) introduced a formally provable secure authentication protocol with the property of user-untraceabilityUnfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceabilityas claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle

Keywords: Authentication     Privacy     Security     Smart card     Untraceability    

Joint user association and resource partition for downlink-uplink decoupling inmulti-tierHetNets Article

Zhi-yong FENG, Ze-bing FENG, T. Aaron GULLIVER

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6,   Pages 817-829 doi: 10.1631/FITEE.1700031

Abstract: In this paper, a joint user association and resource partition framework for downlink-uplink decouplingmaximal received power and range extension, a coalition game based scheme is proposed for the optimal userMoreover, the DL and UL optimal bandwidth partition for BSs is derived based on user association consideringdemonstrate the effectiveness of the proposed scheme, which enhances the sum rate compared with other user

Keywords: Downlink-uplink decoupling     User association     Resource partition     Heterogeneous cellular network     Coalition    

Optimal dispatch of multi energy system using power-to-gas technology considering flexible load on user

Zi LING, Xiu YANG, Zilin LI

Frontiers in Energy 2018, Volume 12, Issue 4,   Pages 569-581 doi: 10.1007/s11708-018-0595-6

Abstract: Meanwhile, the participation of flexible load on user side in system optimization has attracted muchBased on the concept of energy hub, according to its series characteristic, this paper established a genericThe characteristic of flexible load on user side was considered and optimal dispatch analysis was madeoptimal dispatch result of the multi-energy system using the P2G technology considering flexible load on userthat cooperative dispatch of multi-energy system using the P2G technology considering flexible load on user

Keywords: multi-energy system     energy hub     series characteristic     optimal dispatch     flexible load    

Image-based fall detection and classification of a user with a walking support system

Sajjad TAGHVAEI, Kazuhiro KOSUGE

Frontiers of Mechanical Engineering 2018, Volume 13, Issue 3,   Pages 427-441 doi: 10.1007/s11465-017-0465-7

Abstract: for the state classification is the centroid position of the upper body, which is extracted from the userResults show that the algorithm can be adapted to the new user’s motion pattern within 40 s, with

Keywords: fall detection     walking support     hidden Markov model     multivariate analysis    

Project Guide for the Numerical Control Generation Demonstration Project to Promote the Application of Generic

Wei Feng,Zhou Yuan and Xue Lan

Strategic Study of CAE 2017, Volume 19, Issue 3,   Pages 45-52 doi: 10.15302/J-SSCAE-2017.03.007

Abstract:

Numerical Control (NC) technology is a key and generic enabling technologyorganization failure, there is a serious "Death Valley" phenomenon in the application of genericIn this way, the NC Generation Demonstration Project bridges the gap between generic enabling technologyproject has led to some remarkable accomplishments, and is a successful example of the application of generic

Keywords: demonstration project     generic enabling technology     technology innovation diffusion     small and medium    

Verifier-local revocation group signatures with backward unlinkability from lattices Research Articles

Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6,   Pages 876-892 doi: 10.1631/FITEE.2000507

Abstract:

For (GS) supporting membership revocation, (VLR) mechanism seems to be a more flexible choice, becauseit requires only that verifiers download up-to-date revocation information for signature verification

Keywords: Group signature     Lattice-based cryptography     Verifier-local revocation     Backward unlikability     Short    

Exploration of interconnected factory mode: Haier Jiaozhou Air Conditioner Interconnected Factory

Yunjie ZHOU

Frontiers of Engineering Management 2017, Volume 4, Issue 4,   Pages 500-503 doi: 10.15302/J-FEM-2017105

Keywords: interconnected factory mode     user-centered     mass customization     interconnection    

Blind Multi-user Detection Based on Simplified LSCMA in STBC Coded MC-CDMA Systems

Xiong Yilan,Li Guangzeng

Strategic Study of CAE 2007, Volume 9, Issue 5,   Pages 42-45

Abstract: simple and feasible algorithm based on constant modulus (CM) criterion is proposed for blind multi-user

Keywords: space time block code     MC-CDMA     constant modulus algorithm     blind multi_user detection    

Hybrid full-/half-duplex cellular networks: user admission and power control None

Lu CHEN, Ding-zhu WEN, Cai-jun ZHONG, Guan-ding YU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 379-387 doi: 10.1631/FITEE.1700027

Abstract: practical scenario with channels, uplink users, and downlink users (max{ }≤ + ), we tackle the issue of useradmission and power control to simultaneously maximize the user admission number and minimize the totalWe formulate a 0–1 integer programming problem for the joint-user admission and power allocation problem

Keywords: Full-duplex     Half-duplex     User admission     Power control    

A strategy-proof auction mechanism for service composition based on user preferences

Yao Xia, Zhiqiu Huang,xiayao@nuaa.edu.cn,zqhuang@nuaa.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900726

Abstract: is an effective method of combining existing atomic services into a value-added service based on cost and quality of service (QoS). To meet the diverse needs of users and to offer pricing services based on QoS, we propose a auction mechanism based on s, which is and can be beneficial in selecting services based on s and dynamically determining the price of services. We have proven that the proposed auction mechanism achieves desirable properties including truthfulness and individual rationality. Furthermore, we propose an auction algorithm to implement the auction mechanism, and carry out extensive experiments based on real data. The results verify that the proposed auction mechanism not only achieves desirable properties, but also helps users find a satisfactory scheme.

Keywords: Combinatorial reverse auction     Service composition     User preference     Strategy-proof     Dynamic pricing    

Generic and SME-specific factors that influence the BIM adoption process: an overview that highlights

Elodie HOCHSCHEID, Gilles HALIN

Frontiers of Engineering Management 2020, Volume 7, Issue 1,   Pages 119-130 doi: 10.1007/s42524-019-0043-2

Abstract: Building information modeling/management (BIM) is an emerging technological and procedural shift in the architecture, engineering, construction and operation industry. In this study, we use an extensive state-of-the-art method to clarify the BIM adoption process and the factors that can influence the success or failure of BIM adoption, particularly during the implementation stage, which are not frequently found in the literature. As an innovation, the lexical field allocated to the spread of innovations is assigned to BIM (diffusion, adoption, and implementation). After recalling the definition of relevant terms and then removing the resulting inconsistencies in vocabularies, we investigate various studies to identify factors that influence BIM adoption and then unify all these studies in one coherent and consistent BIM adoption process model. We focus on factors that play a role in the adoption of BIM in small- and medium-sized enterprises (SMEs) because SMEs constitute the majority of companies in the construction sector. This research highlights and intends to fill in some gaps found in the current BIM adoption literature.

Keywords: BIM     adoption     diffusion     implementation     change management     SMEs     literature review     architecture firms    

Title Author Date Type Operation

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

Generic attribute revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Journal Article

Conceptual study on incorporating user information into forecasting systems

Jiarui HAN, Qian YE, Zhongwei YAN, Meiyan JIAO, Jiangjiang XIA

Journal Article

Generating native user interfaces formultiple devices by means ofmodel transformation

Ignacio MARIN,Francisco ORTIN,German PEDROSA,Javier RODRIGUEZ

Journal Article

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Journal Article

Joint user association and resource partition for downlink-uplink decoupling inmulti-tierHetNets

Zhi-yong FENG, Ze-bing FENG, T. Aaron GULLIVER

Journal Article

Optimal dispatch of multi energy system using power-to-gas technology considering flexible load on user

Zi LING, Xiu YANG, Zilin LI

Journal Article

Image-based fall detection and classification of a user with a walking support system

Sajjad TAGHVAEI, Kazuhiro KOSUGE

Journal Article

Project Guide for the Numerical Control Generation Demonstration Project to Promote the Application of Generic

Wei Feng,Zhou Yuan and Xue Lan

Journal Article

Verifier-local revocation group signatures with backward unlinkability from lattices

Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA

Journal Article

Exploration of interconnected factory mode: Haier Jiaozhou Air Conditioner Interconnected Factory

Yunjie ZHOU

Journal Article

Blind Multi-user Detection Based on Simplified LSCMA in STBC Coded MC-CDMA Systems

Xiong Yilan,Li Guangzeng

Journal Article

Hybrid full-/half-duplex cellular networks: user admission and power control

Lu CHEN, Ding-zhu WEN, Cai-jun ZHONG, Guan-ding YU

Journal Article

A strategy-proof auction mechanism for service composition based on user preferences

Yao Xia, Zhiqiu Huang,xiayao@nuaa.edu.cn,zqhuang@nuaa.edu.cn

Journal Article

Generic and SME-specific factors that influence the BIM adoption process: an overview that highlights

Elodie HOCHSCHEID, Gilles HALIN

Journal Article