On the Security of A Provably Secure Certificate Based Ring Signature Without Pairing
|
|
|
- Emery Dalton
- 10 years ago
- Views:
Transcription
1 Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP , Ma On the Secuity of A Povably Secue Cetificate Based Ring Signatue Without Paiing Ji Geng 1, Hu Xiong 1,2, Fagen Li 1, and Zhiguang Qin 1 (Coesponding autho: Hu Xiong) School of Compute Science and Engineeing, Univesity of Electonic Science and Technology of China 1 No. 4, Noth Jianshe Road, Chenghua Distict, chengdu, Sichuan , China State Key Laboatoy of Infomation Secuity, Institute of Softwae, Chinese Academy of Sciences 2 No. 19 Yuquan Road, Shijingshan Distict, Beijing , China ( [email protected]) (Received Feb. 11, 2014; evised and accepted Nov. 6, 2014) Abstact Featued with anonymity and spontaneity, ing signatue has been widely adopted in vaious envionments to offe anonymous authentication. To simplify the cetificate management in taditional public key infastuctue (PKI) and solve the inheent key escow poblem in the Identity-based cyptogaphy, Qin et al. popose a paiingfee ing signatue scheme in the cetificate-based cyptosystem ecently. Unfotunately, we demonstate that thei scheme is not secue against the malicious cetificate authoity (CA) and key eplacement attacks by giving concete attack. Concetely, a malicious cetificate authoity (CA) can foge a signatue on abitay message in name of any use s identity and a uncetified use is also able to foge a message. Keywods: Cetificate-based signatue, fogey attack, ing signatue 1 Intoduction Ring signatue [19], which allows a use to issue a signatue on behalf of a goup of possible signes (ing), has been intoduced by Rivest et al. in Asiacypt The esulting ing signatue can convince a veifie that one membe in the ing indeed signed the message without evealing the eal identity of the actual signe. Diffeent fom goup signatue [4], thee is not goup manage in the ing signatue to handle the enollment and evocation of the ing membes. Specifically, the actual signe can conscipt the othe ing membes to fom the ing without thei consent. Featued with anonymity and spontaneity, ing signatue has been widely adopted to offe anonymous authentication in vaious scenaios. As a epesentative example, potable devices o mobile applications in the infastuctue-less mobile ad hoc netwoks (MANETs) can shae data with the othe paticipants to behave in intelligent mannes. It is challenging to secue MANETs due to the openness and lack of the cental authoity. Taking MANETs as an example, thee ae seveal secuity equiements a pactical system must satisfy, including: Authenticity: In the situation of MANETs, the data sent fom the othe paticipants would be misleading if it is foged by advesaies. Thus, it is desiable to authenticate the eceiving data to esist the attacks mounted by the outside advesaies; Anonymity: The shaed data in MANETs contains vast infomation of uses, fom which one can extact the location of the taget uses, etc. Theefoe, any failues with egad to the pivacy peseving may lead to the eluctance fom the uses to shae data with othes; Ad hoc: In the MANETs, the fomation of a goup whee the actual use hidden fom is spontaneous due to the lack of cental authoity; and Efficiency: Taking the huge numbe of uses in MANETs into account, a pactical system must lowe the computation and communication ovehead as much as possible. Ring signatue can be viewed as an efficient solution on the afoementioned situation whee the data authenticity and anonymity ae expected. In addition to the data shaing in the MANETs (instantiated as Vehicula ad hoc netwoks [21] and wieless senso netwoks [11]), ing signatue can also be deployed in othe envionments such as outing potocol [16] and electonic auction potocol [22, 23]. Futhemoe, ing signatues can also be viewed as the building block of concuent signatues [5, 7] and optimistic fai exchange [12]. The suvey of ing signatues can be found in [6, 25].
2 Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP , Ma Table 1: Notations Notations Desciptions MANETs: Mobile Ad hoc NETwoks PKI: Public Key Infastuctue ID-PKC: Identity-based Public Key Cyptogaphy CB-PKC: Cetificate-Based Public Key Cyptogaphy CA: Cetificate Authoity PKG: Pivate Key Geneato ID i : The identity of the use i (upk IDi, usk IDi ): The use public/secet key pai of the use i (R, k i ): The cetificate of the use i L ID = {ID 1,, ID n }: The identity set of n ing membes L upk = {upk ID1,, upk IDn }: The public key set of n ing membes G: A multiplicative goup with ode q, whee q is pime numbe. g: A andom geneato chosen fom G π ui : The poof-of-knowledge (PoK) such that P K{(u i ) : U 1 = g ui U 2 = X ui } H: Secue hash function such as H : {0, 1} Z q In taditional public key infastuctue (PKI), a semitusted cetificate authoity (CA) is involved to geneate a digital cetificate to bind the public key and the coesponding identity. The management ovehead of the public key cetificate is consideed to be costly. To simplify the cetificate management, the notion of Identitybased public key cyptogaphy (ID-PKC) has been intoduced [20]. In ID-PKC, the public key of use can be easily deived fom its digital identity such as addess o telephone numbe. To enjoy the meits of ID-PKC, the notion of ID-based ing signatue schemes along with the extensions have been extensively investigated [2, 8, 24]. Unfotunately, a fully-tusted pivate key geneato (PKG) is needed to geneate the pivate key fo each use accoding to its espective identity in ID-PKC. Thus, the key escow poblem is intoduced into ID-PKC. To simplify the heavy cetificate management in taditional PKI and solve the key escow poblem in ID-PKC, a new paadigm, cetificate-based public key cyptogaphy (CB-PKC), is poposed by Genty [10]. In CB-PKC, each use will geneate the public and pivate key pai itself and the CA will issue the cetificate using the pivate key geneation algoithm in ID-PKC. In this way, the cetificate will be used as pat of the pivate key and thidpaty queies on cetificate status in taditional PKI has aleady been eliminated in CB-PKC. Au et al. [1] intoduce the notion of ing signatue in the CB-PKC setting to enjoy the meits of CB-PKC and ing signatue togethe, and futhe poposed a concete cetificate based ing signatue based on bilinea paiing. In ode to emove the costly bilinea paiing opeation, Qin et al. [18] poposed a paiing fee cetificatebased ing signatue ecently. Futhemoe, they claimed that thei scheme is povably secue in the andom oacle model assuming the Discete Logaithm assumption holds. Unfotunately, in this pape, we show that thei scheme cannot achieve the claimed secuity by demonstating two fogey attacks. Concetely, a malicious CA equipped with the maste secet key can foge a valid signatue on abitay message. In addition, a uncetified entity without a cetificate issued by CA can also foge a valid signatue on abitay message but eplacing the public keys. The est of this pape is oganized as follows. In Section 2, we eview Qin et al. s paiing-fee cetificate based ing signatue scheme. In Section 3, we show that Qin et al. s scheme is not secue and analyze the basic eason fo the attack. Finally, the conclusions ae given in Section 4. 2 Review of Qin et al. s Scheme Qin et al. s cetificate based ing signatue scheme [18] is based on cetificate-based signatue scheme in [17] and ID-based ing signatue scheme in [13]. The notation used in [18] is listed in Table 1 to impove the eadability and we eview Qin et al. s scheme as follows. 1) Setup: Let G be a multiplicative goup with ode q. The CA selects a andom geneato g G and andomly chooses x R Z q as the maste secet key. It sets X = g x. Let H : {0, 1} Z q be a cyptogaphic hash function. The public paametes ae given by paams=(g, q, g, X, H) The multiplicative goup can be implemented on the Elliptic cuve cyptogaphy (ECC). Accoding to [3], to achieve the compaable level of secuity to 1024-bits RSA, the Koblitz elliptic cuve y 2 = x 3 + ax 2 + b defined on F poviding ECC goup can be adopted. Hee, a is equal to 1 and b is a 163-bit andom pime. Thus, the size of the element in goup G (the maste public key and the use public key) is assumed to be 163-bit. 2) UseKeyGen: Use ID i selects a secet value u i Z q
3 Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP , Ma as his secet key usk IDi, and computes his public key upk IDi =, X u i, π ui ) whee π ui is the following non-inteactive poof-of-knowledge (PoK): P K{(u i ) : U 1 = g u i U 2 = X u i.} The subscipt of u i has been inadvetently omitted in [18]. This omission has been coected to be consistent. 3) CetGen: Let h i = H(upk IDi, ID i ) fo use ID i with public key upk IDi and binay sting ID i which is used to identify the use. To geneate a cetificate fo use ID i, the CA andomly chooses R Z q, computes R = g and k i = 1 ( h i xr) mod q. The cetificate is (R, k i ). Note that a coectly geneated cetificate should satisfy the following equality: R k i X R = g h i. 4) Ring-Sign: Suppose thee is a goup of n uses whose identities fom the set L ID = {ID 1,, ID n }, and thei coesponding public keys fom the set L upk = {upk ID1,, upk IDn }. To sign a message m {0, 1} on behalf of the goup, the actual signe, indexed by s using the secet key usk IDs and the cetificate cet IDs, pefoms the following steps. a. Fo each i {1,, n} \ {s}, selects y i R Z q unifomly at andom and computes Y i = R y i. b. Compute h i = H(m L upk L ID Y i ) fo i {1,, n} \ {s}. c. Choose y s R Z q, computes Y s = ) h i h i ) hir. R y s i s i s d. Compute h s = H(m L upk L ID Y s ). e. Compute z = ( n y i + h s k s u s ) mod q. f. Output the ing signatue on m as σ = {Y 1,, Y n, R, z, π u1,, π un }. Though {R, π u1,, π un } is needed in the Veify algoithm, it has been inadvetently omitted in the signatue of [18]. This omission has been coected to be consistent. 5) Veify: To veify a ing signatue σ = {Y 1,, Y n, R, z, π u1,, π un } on a message m with identities in L ID and coesponding public keys in L upk, the veifie pefoms the following steps. a. Check whethe π ui is a valid PoK. If not, outputs, Othewise, un the next step. b. Compute h i = H(m L upk L ID Y i ) and h i = H(upk IDi, ID i ) fo all i {1,, n}. c. Check whethe n (g ui ) hi h i? n = R z Y 1 Y n (X ui ) hir d. Accept the ing signatue as valid and outputs 1 if the above equation holds, othewise, output 0. 3 Analysis of Qin et al. s Scheme It is non-tivial to devise secue cetificate-based encyption/signatue scheme since the cetificate of the use will no longe be used to cetify the coesponding public key instead it will be implicitly used as pat of pivate key in the decyption/signing algoithm. In fact, seveal cetificate-based encyption scheme [26] and cetificatebased signatue scheme [14, 17] have been shown to be insecue against the attacks mounted by an uncetified entity o malicious CA espectively [9, 15, 27]. Motivated by these attacks, we obseve that Qin et al. s cetificate-based ing signatue [18] is also insecue against the fogey attack. Compaing with the existing attack algoithms with espect to cetificate based encyption/signatue schemes [9, 15, 27], ou wok mainly focus on the insecuity of the cetificate-based ing signatue, whee a lage numbe of uses ae involved in the pocess of the signatue geneation. Accoding to [14, 15, 18, 27], two diffeent types of attacks by the malicious CA and by an uncetified use should be consideed in CB-PKC. On the one hand, the malicious CA, who has the maste secet key, cannot obtain the use secet key and mount the public key eplacement attack. On the othe hand, the uncetified use can eplace public keys of any entities in the system, but is not allowed to obtain the taget use s cetificate. 3.1 Malicious CA Attack on Qin et al. s Scheme Given a ing signatue σ = {Y 1,, Y n, R, z, π u1,, π un } with the identities in L ID = {ID 1,, ID n } and coesponding public keys in L upk = {upk ID1,, upk IDn }, the CA equipped with the maste key x can foge a valid signatue on abitay message m as follows: 1) Randomly choose j R {1,, n}. 2) Compute h j = H(upk IDj, ID j ). 3) Compute R = x 1 h j, whee x is the maste key. 4) Fo each i {1,, n} \ {j}, selects y i R Z q unifomly at andom and computes Y i = (R ) y i. 5) Compute h i = H(m L upk L ID Y i ) fo i {1,, n} \ {j}. 6) Choose y j R Z q, computes Y (R ) y j ) h i R. 7) Compute z = n y i mod q. j = 8) Output the ing signatue on m as σ = 1,, Y n, R, z, π u1,, π un }.
4 Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP , Ma The following equations show that the signatue σ = 1,, Y n, R, z, π u1,, π un } is valid. n (g ui ) hi hi = (g ui g xujh j x 1 hj = g xu jh j R = X u jh j R = (R ) n y i (R ) y i (R ) y j (g ui n ) h i R ) h i R n = (R ) z Y 1 Y n ) h i R. 3.2 Key Replacement Attack on Qin et al. s Scheme In the following, we show that the scheme is not against an uncetified entity attack. Concetely, an entity without a cetificate issued by CA can foge a valid signatue on abitay message m by eplacing the public keys. The attack is depicted as follows: 1) Randomly choose R Z q and compute R = g. 2) Randomly choose j R {1,, n}. n (g ui ) hi h i = g uj h jh j (g ui = g a h j hjh j = g ah j (g ui = g ah j X ar X a h h j R j = g ah j X ar X u jh j R j = (g ) ah + n y i g y i X ar g y j n ) h i R ) h i R 4 Conclusions n = (R ) z Y 1 Y n (X ui ) h i R. In this pape, we have showed that the Qin et al. [18] s cetificate based ing signatue scheme is not secue against the fogey attack. We conside paiing-fee cetificate based ing signatue scheme along with povable secuity as an open poblem and ou futue eseach wok. 3) Fo each i {1,, n} \ {j}, selects y i R Z q unifomly at andom and computes Y i = g y i. 4) Compute h i = H(m L upk L ID Y i ) fo i {1,, n} \ {j}. 5) Choose y j R Z q, computes Y X ar g y j ) h i R. 6) Compute h j = H(upk IDj, ID j ). j = 7) Compute u j = ã h j as the secet key of use with identity ID j, and set upk IDj = (g u j, X u j, π uj ) as the public key of this use, whee π uj is the following non-inteactive poof-of-knowledge (PoK): P K{(u j ). : U 1 = g u j U 2 = X u j }. 8) Compute z = ah n j + y i mod q. 9) Output the ing signatue on m as σ = 1,, Y n, R, z, π u1,, π un }. The following equations show that the signatue σ = 1,, Y n, R, z, π u1,, π un } is valid. Acknowledgments This wok is patially suppoted by National Natual Science Foundation of China unde Gant Nos , , and , the Fundamental Reseach Funds fo the Cental Univesities unde Gant No. ZYGX2013J073 and ZYGX2012J077, and the Applied Basic Reseach Pogam of Sichuan Povince unde Gant No. 2014JY0041. Refeences [1] Man Ho Au, Joseph K. Liu, Willy Susilo, and Tsz Hon Yuen, Cetificate based (linkable) ing signatue, in 3d Intenational Confeence on Infomation Secuity Pactice and Expeience-ISPEC 2007, pp , Hong Kong, China, May [2] Amit K Awasthi and Sunde Lal, Id-based ing signatue and poxy ing signatue schemes fom bilinea paiings, Intenational Jounal of Netwok Secuity, vol. 4, no. 2, pp , [3] Xuefei Cao, Weidong Kou, and Xiaoni Du, A paiing-fee identity-based authenticated key ageement potocol with minimal message exchanges, In-
5 Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP , Ma fomation Sciences, vol. 180, no. 15, pp , [4] David Chaum and Eugene van Hevst, Goup signatue, in Advances in Cyptology-EUROCRYPT 1991, pp , Bighton, UK, Apil [5] Liqun Chen, Caoline Kudla, and Kenneth G. Pateson, Concuent signatues, in Advances in Cyptology-EUROCRYPT 2004, pp , Intelaken, Switzeland, May [6] Sheman S. M. Chow, Richad W. C. Lui, Lucas Chi Kwong Hui, and Siu-Ming Yiu, Identity based ing signatue: Why, how and what next, in EuoPKI 2005, pp , Cantebuy, UK, June [7] Sheman S.M. Chow and WILLY Susilo, Geneic constuction of (identity-based) pefect concuent signatues, in 7th Intenational Confeence on Infomation and Communications Secuity-ICICS 2005, pp , Beijing, China, Decembe [8] Sheman S.M. Chow, Siu-Ming Yiu, and Lucas C.K. Hui, Efficient identity based ing signatue, in 3d Intenational Confeence on Applied Cyptogaphy and Netwok Secuity-ACNS 2005, pp , NY, USA, June [9] David Galindo, Paz Moillo, and Cala Ràfols, Beaking yum and lee geneic constuctions of cetificate-less and cetificate-based encyption schemes, in 3d Euopean PKI Wokshop: Theoy and Pactice-EuoPKI 2006, pp , Tuin, Italy, June [10] Caig Genty, Cetificate-based encyption and the cetificate evocation poblem, in Advances in Cyptology-EUROCRYPT 2003, pp , Wasaw, Poland, May [11] Daojing He, Jiajun Bu, Sencun Zhu, Sammy Chan, and Chun Chen, Distibuted access contol with pivacy suppot in wieless senso netwoks, IEEE Tansactions on Wieless Communications, vol. 10, no. 10, pp , [12] Qiong Huang, Guomin Yang, Duncan S. Wong, and Willy Susilo, Efficient optimistic fai exchange secue in the multi-use setting and chosen-key model without andom oacles, in The Cyptogaphes Tack at the RSA Confeence, CT-RSA 2008, pp , San Fancisco, CA, USA, Apil [13] Gemán Sáez Javie Heanz, New identity-based ing signatue schemes, in 6th Intenational Confeence on Infomation and Communications Secuity- ICICS 2004, pp , Malaga, Spain, Octobe [14] Bo Gyeong Kang, Je Hong Pak, and Sang Geun Hahn, A cetificate-based signatue scheme, in Topics in Cyptology-CT-RSA 2004, pp , CA, USA, Febuay [15] Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu, Cetificate-based signatue: Secuity model and efficient constuction, in EuoPKI 2007, pp , Palma de Malloca, Spain, June [16] Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin (Sheman) Shen, and Zhenfu Cao, Aspake: An anonymous secue outing potocol with authenticated key exchange fo wieless ad hoc netwoks, in Poceedings of IEEE Intenational Confeence on Communications, ICC 2007, pp , Scotland, UK, June [17] Joseph K. Liu, Joonsang Baek, Willy Susilo, and Jianying Zhou:, Cetificate-based signatue schemes without paiings o andom oacles, in 11th Intenational Confeence on Infomation Secuity-ISC 2008, pp , Taipei, Taiwan, Septembe [18] Zhiguang Qin, Hu Xiong, and Fagen Li, A povably secue ceticate based ing signatue without paiing, Intenational Jounal of Netwok Secuity, vol. 16, no. 3, pp , [19] Ronald L. Rivest, Adi Shami, and Yael Tauman, How to leak a secet, in Advances in Cyptology- AsiaCypt 2001, pp , Gold Coast, Austalia, Decembe [20] Adi Shami, Identity-based cyptosystems and signatue schemes, in Advances in Cyptology-Cypto 1984, pp , Califonia, USA, August [21] Hu Xiong, Konstantin Beznosov, Zhiguang Qin, and Matei Ripeanu, Efficient and spontaneous pivacypeseving potocol fo secue vehicula communication, in Poceedings of IEEE Intenational Confeence on Communications, ICC 2010, pp. 1 6, Cape Town, South Afica, May [22] Hu Xiong, Zhong Chen, and Fagen Li, Biddeanonymous english auction potocol based on evocable ing signatue, Expet Systems with Applications, vol. 39, no. 8, pp , [23] Hu Xiong, Zhiguang Qin, and Fagen Li, An anonymous sealed-bid electonic auction based on ing signatue, Intenational Jounal of Netwok Secuity, vol. 8, no. 3, pp , [24] Hu Xiong, Zhiguang Qin, and Fagen Li, A cetificateless poxy ing signatue scheme with povable secuity, Intenational Jounal of Netwok Secuity, vol. 12, no. 2, pp , [25] Hu Xiong, Zhiguang Qin, and Fagen Li, A taxonomy of ing signatue schemes: Theoy and applications, IETE Jounal Of Reseach, vol. 59, no. 4, pp , [26] Dae Hyun Yum and Pil Joong Lee, Identity-based cyptogaphy in public key management, in 1st Euopean PKI Wokshop: Reseach and Applications- EuoPKI 2004, pp , Samos Island, Geece, June [27] Jianhong Zhang, On the secuity of a cetificatebased signatue scheme and its impovement with paiings, in 5th Intenational Confeence on Infomation Secuity Pactice and Expeience-ISPEC 2009, pp , Xi an, China, Apil Ji Geng is a pofesso in the School of Compute Science and Engineeing, Univesity of Electonic Science and Technology of China. He eceived his M.S. degee fom
6 Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP , Ma Southwest Jiaotong Univesity in His eseach inteests include: infomation secuity and system softwae. Hu Xiong is an associate pofesso at Univesity of Electonic Science and Technology of China (UESTC). He eceived his Ph.D degee fom UESTC in His eseach inteests include: cyptogaphy and netwok secuity. Zhiguang Qin is the dean and pofesso in the School of Compute Science and Engineeing, Univesity of Electonic Science and Technology of China (UESTC). He eceived his PH.D. degee fom UESTC in His eseach inteests include: infomation secuity and compute netwok. Fagen Li eceived his Ph.D. degee fom Xidian Univesity in He is now an associate pofesso in the School of Compute Science and Engineeing, Univesity of Electonic Science and Technology of China. His ecent eseach inteests include cyptogaphy and netwok secuity.
An Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
Software Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes
Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092
The transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
Secure Smartcard-Based Fingerprint Authentication
Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak [email protected] Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity
An Epidemic Model of Mobile Phone Virus
An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China [email protected] School of Compute Science and Technology, Huazhong Univesity
Research on Risk Assessment of the Transformer Based on Life Cycle Cost
ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,
Effect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
9:6.4 Sample Questions/Requests for Managing Underwriter Candidates
9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated
Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis
Send Odes fo Repints to [email protected] 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency
A formalism of ontology to support a software maintenance knowledge-based system
A fomalism of ontology to suppot a softwae maintenance knowledge-based system Alain Apil 1, Jean-Mac Deshanais 1, and Reine Dumke 2 1 École de Technologie Supéieue, 1100 Note-Dame West, Monteal, Canada
Alarm transmission through Radio and GSM networks
Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS
An Approach to Optimized Resource Allocation for Cloud Simulation Platform
An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,
Channel selection in e-commerce age: A strategic analysis of co-op advertising models
Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of
College of Engineering Bachelor of Computer Science
2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date
SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA
Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.
High Availability Replication Strategy for Deduplication Storage System
Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, [email protected] [email protected] Abstact As the amount of digital data
A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods
A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd [email protected]
Cloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS
ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy
STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION
Jounal of Machine Engineeing, Vol. 11, No. 4, 211 Batosz POWALKA 1 Macin CHODZKO 1 Kzysztof JEMIELNIAK 2 milling, chatte, opeational modal analysis STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL
Towards Automatic Update of Access Control Policy
Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia
Database Management Systems
Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012
Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with
How to Encrypt Properly with RSA
RSA Laboatoies CyptoBytes. Volume 5, No. 1 Winte/Sping 2002, pages 9 19. ow to Encypt Popely with RSA David Pointcheval Dépt d Infomatique, ENS CNRS, 45 ue d Ulm, 75230 Pais Cedex 05, Fance E-mail: [email protected]
ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM
Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of
Scheduling Hadoop Jobs to Meet Deadlines
Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements
Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors
Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: [email protected], [email protected]
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
AgentTime: A Distributed Multi-agent Software System for University s Timetabling
AgentTime: A Distibuted Multi-agent Softwae System fo Univesity s Timetabling Eduad Babkin 1,2, Habib Adbulab 1, Tatiana Babkina 2 1 LITIS laboatoy, INSA de Rouen. Rouen, Fance. 2 State Univesity Highe
A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types
Aticle A Two-Step Tabu Seach Heuistic fo Multi-Peiod Multi-Site Assignment Poblem with Joint Requiement of Multiple Resouce Types Siavit Swangnop and Paveena Chaovalitwongse* Depatment of Industial Engineeing,
Ilona V. Tregub, ScD., Professor
Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation
Multicriteria analysis in telecommunications
Poceedings of the 37th Hawaii Intenational Confeence on System Sciences - 2004 Multiciteia analysis in telecommunications Janusz Ganat and Andze P. Wiezbicki National Institute of Telecommunications Szachowa
Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor
> PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task
Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents
Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem
STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION
Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts
Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment
Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability
Multiband Microstrip Patch Antenna for Microwave Applications
IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications
Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices
Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that
Over-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy [email protected] Stefano Paaboschi DIIMM - Univesità
Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems
Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe
Supporting Efficient Top-k Queries in Type-Ahead Search
Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),
Approximation Algorithms for Data Management in Networks
Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany [email protected] Haald Räcke Heinz Nixdof Institute
Converting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH
nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav
Firstmark Credit Union Commercial Loan Department
Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and
Strength Analysis and Optimization Design about the key parts of the Robot
Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design
An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty
An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,
Fixed Income Attribution: Introduction
18th & 19th Febuay 2015, Cental London Fixed Income Attibution: A compehensive undestanding of Fixed Income Attibution and the challenging data issues aound this topic Delegates attending this two-day
An Analysis of Manufacturer Benefits under Vendor Managed Systems
An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY [email protected] Nesim Ekip 1
METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION
ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix
Statistics and Data Analysis
Pape 274-25 An Extension to SAS/OR fo Decision System Suppot Ali Emouznead Highe Education Funding Council fo England, Nothavon house, Coldhabou Lane, Bistol, BS16 1QD U.K. ABSTRACT This pape exploes the
Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication
I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line
Comparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability
Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors
anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing
Distributed Computing and Big Data: Hadoop and MapReduce
Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents
est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.
9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,
THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION
IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany [email protected] ABSTRACT
Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.
Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to
Predictive Control of Permanent Magnet Synchronous Motor Based on Optimization Model Algorithmic Control
Pedictive Contol of Pemanent Magnet Synchonous Moto Based on Optimization Model Algoithmic Contol 1 Chen Junshuo, 2 Liu Jinglin, 3 Zhang Ying *1, Chen Junshuo School of Automation, Nothwesten Ploytechnical
Certificate Based Signature Schemes without Pairings or Random Oracles
Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying
Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels
Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik
Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan
Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in
Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN
Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,
who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors
Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division
Efficient Redundancy Techniques for Latency Reduction in Cloud Systems
Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo
They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run
End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada [email protected], [email protected], [email protected]
Improving Network Security Via Cyber-Insurance A Market Analysis
1 Impoving Netwok Secuity Via Cybe-Insuance A Maket Analysis RANJAN PAL, LEANA GOLUBCHIK, KONSTANTINOS PSOUNIS Univesity of Southen Califonia PAN HUI Hong Kong Univesity of Science and Technology Recent
Promised Lead-Time Contracts Under Asymmetric Information
OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly
PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary
PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC
Memory-Aware Sizing for In-Memory Databases
Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks
An Efficient Boadcast Authentication Scheme in Wieess Senso Netwoks Shang-Ming Chang Shiuhpyng Shieh Waen W. Lin {changsm, ssp, waen}@csie.nctu.edu.tw Nationa Chiao Tung Univesity / Univesity of Caifonia,
Adaptive Queue Management with Restraint on Non-Responsive Flows
Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,
883 Brochure A5 GENE ss vernis.indd 1-2
ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,
Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis
Available online at www.sciencediect.com Pocedia Engineeing 41 (2012 ) 1360 1366 Intenational Symposium on Robotics and Intelligent Sensos 2012 (IRIS 2012) Modal Chaacteistics study of CEM-1 Single-Laye
Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure
Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich
AN INTEGRATED MOBILE MAPPING SYSTEM FOR DATA ACQUISITION AND AUTOMATED ASSET EXTRACTION
AN INTEGRATED MOBILE MAPPING SYSTEM FOR DATA ACQUISITION AND AUTOMATED ASSET EXTRACTION T. Kingston a, V. Gikas b *, C. Laflamme a, C. Laouche a a GEO-3D Inc, 9655 Ignace St., Suite L, Bossad (QC, J4Y
Application of the VISEVA demand generation software to Berlin using publicly available behavioral data
Justen, Beuck, Nagel 1 Application of the VISEVA demand geneation softwae to Belin using publicly available behavioal data Submission date: 15-Nov-06 Wods: 5973 Figues and tables: 6 ( = 1500 Wods) Total:
The Detection of Obstacles Using Features by the Horizon View Camera
The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit [email protected]
COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS
Highe Education Cente fo Alcohol and Othe Dug Abuse and Violence Pevention Education Development Cente, Inc. 55 Chapel Steet Newton, MA 02458-1060 COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS
How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (
Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate
Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1145-116 (006) Automatic Closed Caption Detection and Filteing in MPEG Videos fo Video Stuctuing Depatment of Compute Science and Infomation Engineeing National
