Search For:

Displaying 1-6 out of 6 total
An Improved State Transition-Based Security Policy Conflict Detection Algorithm
Found in: Computational and Information Sciences, International Conference on
By Dai Xiangdong, Chen Xingyuan, Wang Yongliang, Wang Yigong, Liu Jiang
Issue Date:December 2010
pp. 609-612
Security policy is the core to ensure the system operating safely, security policy conflict will cause the system to suffer a security threaten, which even make system crash, therefore security policy conflict detection is particularly important. This pape...
 
Synchronization of Boolean Networks with Different Update Schemes
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Hao Zhang,Xingyuan Wang,Xiaohui Lin
Issue Date:September 2014
pp. 1-1
In this paper, the synchronizations of Boolean networks with different update schemes (synchronized Boolean networks and asynchronous Boolean networks) are investigated. All nodes in Boolean network are represented in terms of semi-tensor product. First, w...
 
Algebraic Representation of Asynchronous Multiple-Valued Networks and Its Dynamics
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Chao Luo, Xingyuan Wang
Issue Date:July 2013
pp. 927-938
In this paper, dynamics of asynchronous multiple-valued networks (AMVNs) are investigated based on linear representation. By semitensor product of matrices, we convert AMVNs into the discrete-time linear representation. A general formula to calculate all o...
 
Study on the Management Maturity Model of High-Tech Venturing Project Based on Fuzzy Comprehensive Evaluation
Found in: Future Information Technology and Management Engineering, International Seminar on
By Xu Yang, Xingyuan Wang
Issue Date:December 2009
pp. 486-489
Using project management maturity model for reference and combining the three characteristics of high-tech venturing project— high input, high risks, and high returns— we analyze the factor of management maturity of high-tech venturing project and then con...
 
A Novel Binary Image Digital Watermarking Algorithm Based on DWT and Chaotic Encryption
Found in: Young Computer Scientists, International Conference for
By TianKai Sun, XiaoGen Shao, XingYuan Wang
Issue Date:November 2008
pp. 2797-2802
A novel binary image digital watermarking algorithm based on DWT and chaotic encryption is proposed. The proposed scheme utilized the Logistic chaotic sequences and generalized cat mapping to scramble the watermarks, so that the security of embedding water...
 
Algebraic Representation of Asynchronous Multiple-Valued Networks and Its Dynamics
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Chao Luo, Xingyuan Wang
Issue Date:July 2013
pp. 927-938
In this paper, dynamics of asynchronous multiple-valued networks (AMVNs) are investigated based on linear representation. By semitensor product of matrices, we convert AMVNs into the discrete-time linear representation. A general formula to calculate all o...
     
 1