作者:
Xu, ZhengCao, BuyangTongji Univ
Sch Software Engn Shanghai 201804 Peoples R China Tongji Univ
China Intelligent Urbanizat Cocreat Ctr High Dens Shanghai 200092 Peoples R China
Clustering analysis plays an important role in a wide range of fields including data mining, pattern recognition, machine learning and many other areas. In this paper, we present a parallel tabu search algorithm for c...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Clustering analysis plays an important role in a wide range of fields including data mining, pattern recognition, machine learning and many other areas. In this paper, we present a parallel tabu search algorithm for clustering problems. A permanent tabu list is proposed to partition the solution space for parallelization. Moreover, this permanent tabu list can also reduce the neighborhood space and constrain the election of candidates. the proposed approach is evaluated by clustering some specific dataset. And experimental results and speedups obtained show the efficiency of the parallel algorithm.
Regular expression matching is widely used in content-aware applications, such as NIDS and protocol identification. However, wire-speed processing for large scale patterns still remains a great challenge in practice. ...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Regular expression matching is widely used in content-aware applications, such as NIDS and protocol identification. However, wire-speed processing for large scale patterns still remains a great challenge in practice. Considering low hit rates in NIDS, a compact and efficient pre-filter is firstly proposed to filter most normal traffics and leave few suspicious traffics for further pattern matching. Experiment results show that, the pre-filter achieves a big improvement in both space and time consumption with its compact and efficient structure.
Hierarchical identity-based cryptography is an efficient technology to address the security issues in cloud storage. However, the inherent key escrow problem primarily hinders the widespread adoption of this cryptosys...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Hierarchical identity-based cryptography is an efficient technology to address the security issues in cloud storage. However, the inherent key escrow problem primarily hinders the widespread adoption of this cryptosystem in practice. To address the key escrow problem, this paper proposes an escrow-free hierarchical identity-based signature model, in which a user signs messages with a user-selected secret and PKG signing factor apart from the private key. For proving the full security, we formulate three security games with respect to our signature model. We instantiate the escrow-free model into a specific scheme based on the SHER-IBS scheme and prove that our scheme is secure against adaptive chosen ID and message attacks.
Cloud storage has become one of the integral parts of online life. However, the cloud storage brings in new kinds of data security issues as well. Authentication framework for both users and services provides an effic...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Cloud storage has become one of the integral parts of online life. However, the cloud storage brings in new kinds of data security issues as well. Authentication framework for both users and services provides an efficient solution to the security and privacy problems of the cloud storage. In this paper we propose a Hierarchical Identity-Based Signature (HIBS) scheme using composite order bilinear groups. We present the methodology of dual system signature to prove that our scheme is secure against existential forgery on adaptively chosen message and identity attack under standard model. Our HIBS scheme shares the same system parameters withthe hierarchical identity-based encryption (LW-HIBE) scheme by Lewko and Waters, and it is as efficient as the LW-HIBE. Combining our signature scheme withthe LW-HIBE scheme yields a complete solution of an identity-based public key system, which can be utilized to build an authentication framework for cloud storage.
Scheduling precedence constrained stochastic tasks on heterogenous cluster systems is an important issue which impact the performance of clusters significantly. Different with deterministic tasks, stochastic task mode...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Scheduling precedence constrained stochastic tasks on heterogenous cluster systems is an important issue which impact the performance of clusters significantly. Different with deterministic tasks, stochastic task model assumes that the workload of task and quantity of data transmission between tasks are stochastic variables, which is more realistic than other task models. Scheduling model and algorithms of precedence constrained stochastic tasks attract a large number of researchers' attention recently. An algorithm SDLS (Stochastic Dynamic Level Scheduling) has been proved performing well in scheduling stochastic tasks on heterogenous clusters. However, the assumption about communication time between tasks in SDLS is much simpler than its assumptions about task computing time, which makes it cannot depict the communication cost among heterogenous links well. In this paper, it is assumed that the quantity of data communication between tasks is a stochastic variable of normal distribution, instead of assuming communication time among heterogenous links a same stochastic variable immediately. Moreover, a modified scheduling model and algorithm SDLS-HC (Stochastic Dynamic Level Scheduling on Heterogenous Communication links) are proposed. Work in this paper focus on considering much more detailed communication cost in task scheduling based on SDLS. Evaluation on many random generated tasks experiments demonstrates that SDLS-HC achieves better performance than SDLS on cluster systems with heterogenous links.
In order to address the problem of energy- and time-efficient execution of spatial queries in directional sensor networks, an efficient hybrid spatial query processing algorithm called SQPDSN is proposed in this paper...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
In order to address the problem of energy- and time-efficient execution of spatial queries in directional sensor networks, an efficient hybrid spatial query processing algorithm called SQPDSN is proposed in this paper. In the majority of studies on query processing using wireless sensor networks, sensors are assumed to have an isotropic sensing and transmission model. However, in certain applications the sensors have directional sensing and directional transmission model. SQPDSN only requires each node within the query region send data message once which reduces the data messages. For achieving minimal energy consumption and minimal response time, our query processing model ensures that only the relevant nodes for the correct execution of a query are involved in the query execution. Each sector has a node which collects the sensory data in it, aggregates the data to derive partial query result and send it to the next sector. Compared with other techniques, the experimental results demonstrated an improvement of the proposed technique in terms of energy efficient query cover with lower communication cost.
Hierarchical Identity-Based Encryption (HIBE) provides an efficient solution to the security problems existed in cloud storage. However, the key escrow problem, which is an inherent problem in HIBE, primarily hinders ...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Hierarchical Identity-Based Encryption (HIBE) provides an efficient solution to the security problems existed in cloud storage. However, the key escrow problem, which is an inherent problem in HIBE, primarily hinders the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably-secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. We instantiate the model into an escrow-free HIBE scheme that is referred to as the EF-LW-HIBE scheme, based on the HIBE scheme introduced by Lewko and Waters. Utilizing the Dual System Encryption methodology, we prove that our EF-LW-HIBE scheme is IND-ID-CCA secure.
暂无评论