In this paper, we propose an ID-based non-interactive zero-knowledge proof system based on the 1-out-of-2 noninteractive oblivious transfer protocol. This zero-knowledge proof system is secure against a newly discovered cheating attack. 相似文献
This paper presents a project undertaken for the European Space Agency (ESA). The project is developing a knowledge based system for planning and scheduling of activities for spacecraft assembly, integration and verification (AIV). The system extends to the monitoring of plan execution and the plan repair phases.
The objectives of the contract are to develop an operational kernel of a planning, scheduling and plan repair tool, called OPTIMUM-AIV, and to provide facilities which will allow individual projects to customize the kernel to suit its specific needs. The kernel shall consist of a set of software functionalities for assistance in the initial specification of the AIV plan, in the verification and generation of valid plans and schedules for the AIV activities, and in interactive monitoring and execution problem recovery for the detailed AIV plans. Embedded in OPTIMUM-AIV are external interfaces which allow integration with alternative scheduling systems and project databases.
The current status of the OPTIMUM-AIV project, as of May 1991, is that the architectural design of the system has been agreed on by ESTEC/ESA and detailed design and implementation is now underway, expecting a final delivery in October of 1991. 相似文献
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file-swarming system under realistic setting: constraints in upload/download capacity, collaboration among peers and incentive for chunk exchange. We first extend the results in the coupon system [L. Massoulie, M. Vojnovic, Coupon replication systems, in: Proc. ACM SIGMETRICS, Banff, Alberta, Canada, 2005] by providing a tighter performance bound. Then we generalize the coupon system by considering peers with limited upload and download capacity. We illustrate the last-piece problem and show the effectiveness of using forward error-correction (FEC) code and/or multiple requests to improve the performance. Lastly, we propose a framework to analyze an incentive-based file-swarming system. The stochastic framework we propose can serve as a basis for other researchers to analyze and design more advanced features of file-swarming systems. 相似文献
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography. 相似文献
Abstract. Knowledge systems development and use have been significantly encumbered by the difficulties of eliciting and formalizing the expertise upon which knowledge workers rely. This paper approaches the problem from an examination of the knowledge competencies of knowledge workers in order to define a universe of discourse for knowledge elicitation. It outlines two categories and several types of knowledge that could serve as the foundations for the development of a theory of expertise. 相似文献
PERFECT (Programming EnviRonment For Expert systems Constrained in reasoning Time) is aimed at providing the necessary engineering support in real-time knowledge-based system development. PERFECT bridges the gap between the traditional analysis and design methodologies, and the implementation tools for these systems. It does so by providing the means to construct a knowledge model and to choose a suitable inference strategy. Subsequently the properties of the knowledge model and inference strategy may be analysed. For instance, it may be checked whether the knowledge model contains sufficient knowledge to diagnose a fault in an industrial process. Moreover, it may be checked whether the inference engine is able to provide an answer to a certain problem in time. If not, the analyser of PERFECT proposes an alternative structure of the knowledge model. When the constructed knowledge model and the chosen inference strategy show the required time efficiency, the compiler of PERFECT may translate them to an actual real-time knowledge based system in COGSYS. In addition, guidelines are provided with respect to the design of the human-machine interface. The resulting system is an instrument—a source of information that can be used by the human operator during problem-solving, rather than a prosthesis—a device that solves the entire problem by itself and presents the outcome to the human operator. 相似文献