期刊文献+

一种复杂多媒体结构的多媒体数据库模型 被引量:2

下载PDF
导出
摘要 MIR系统的内核能够从大量的多媒体数据中找到用户感兴趣的信息。为了实现这一目的,MIR系统的数据库必须提供完整的和严格的多媒体数据内容,但目前的多媒体文档的描述方法,如MPEG-7有很多不足,无法呈现分层信息。对于这一问题,根据多媒体文档内容的抽象的层次类别,提出一个分层的多媒体文档描述模型,并讨论图层之间的映射关系。
出处 《电脑编程技巧与维护》 2016年第6期61-63,91,共4页 Computer Programming Skills & Maintenance
基金 江苏省现代教育技术研究项目(2012-R-21983)
  • 相关文献

参考文献13

  • 1Che-Fu Yu, Virgil D. Gligor. A Formal Specification and Verification Method for the Prevention of Denial of Service. [EEE Transactions on Software Engineering, vol.16, no.6, pp. 581-592. 1990.
  • 2Catherine Meadows, " A cost-based framework for analysis of denial of service networks", Journal of Computer Security, vol.9,no. 1/2,pp. 143-164, 2001.
  • 3Bo Meng, Wei Huang. Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover. In- ternational Journal of Computer Mathematics (in press) , 2011.
  • 4Bruno Blanchek " A Computationally Sound Mechanized Prover for Security Protocols" , IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp. 193-207, 2008.
  • 5IEEE P802.1 li/D10.0. Medium Aeeess Control (MAC) Se- curity Enhancements, Amendment 6 to IEEE Standard for In- formation technology - Teleeommunications and information exchange between systems - Local and metropolitan area net- works - Specific requirements - Part ll: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifi- cations. 2004.
  • 6Bo Meng, Fei Shao. Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Proba- bilistic Polynomial Calculus in Computational Model. Infor-marion Technology Journal, vol. 10,no.3,pp.611-625, 2011.
  • 7Bruno Blanchet, David Pointcheval. Automated Security Proofs with Sequences of Games. In Proceeding of Advances in Cryptology - CRYPTO 2006, pp. 537-554,2006.
  • 8Changhua He,John C. Mitchell. Analysis of the 802.11i 4- Way Handshake. In Proceedings of the Third ACM Interna- tional Workshop on Wireless Security, pp.43-50, 2004.
  • 9Kemal Bicakcia, Bulent Tavlib. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces, vol.31, no. 5, pp.931-941, 2009.
  • 10Bo Meng, Fei Shao. Mechanized Proof of Resistance of De- nial of Service Attacks Based on Events with CryptoVerif in Computational Model. Advanced Science Letters (in press) , 2011.

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部