Visualizing and analyzing the explosive datasets coming from observation and simulation in the geosciences is becoming great challenge. Using parallel visualization technique to visualize the large-scale geosciences data is an effective solution. We discuss the usage of large-scale data parallel visualization in the geosciences in the paper. We firstly introduce the several parts of large-scale data parallel visualization, then characterize the features of large-scale data of geosciences, at last, we discuss the usage of parallel visualization of large-scale data in the visualizing simulation results of mantle convection, seismic wave propagation and tsunami.
An HCMU is a kind of extremal metric with singularities on a Riemann surface. If the area and Calabi energy are both bounded, the Gauss curvature of an HCMU is a continuous function on the Riemann surface. In this paper we get an explicit construction of an HCMU on S2 which has no saddle point of the Gauss curvature of the metric. Further more we prove that on S2 or T2 the Gauss curvature of an HCMU is smooth if and only all of the singular angles are integers.
As a new type of wireless mobile networks, Ad Hoc networks do not depend on any fixed infrastructure, and have no centralized control unit and so its computation capabilities are limited by mobile nodes. Recently, Wang, et al. proposed a novel multi-party key agreement protocol with password authentication and sharing password evolvement for Ad Hoc networds and claimed their protocol secure and efficient. However, the research shows the protocol is insecure against off-line password guessing attack and forgery attack. We also point out that the protocol does not meet forward security, backward security and dynamic key evolvement.
Security involves both protection and compliance. Although the Trusted Computing Group (TCG) has defined specifications for Trusted Computing, including those of Trusted Platform Module (TPM), criteria on compliance testing is still not available. In this paper, a test mechanism checking TPM commands is instrumented into TPM applications, which will validate TPM’s conformance to specifications before its functional execution. Based on this, the initial idea of a chain of compliance is also discussed to enhance the trustworthiness of computing platforms by verifying the conformance of their components.