the proceedings contain 29 papers. the topics discussed include: analysis of probabilistic basic parallel processes;type reconstruction for the linear π-calculus with composite and equi-recursive types;a semantical a...
ISBN:
(纸本)9783642548291
the proceedings contain 29 papers. the topics discussed include: analysis of probabilistic basic parallel processes;type reconstruction for the linear π-calculus with composite and equi-recursive types;a semantical and operational account of call-by-value solvability;network-formation games with regular objectives;playing with probabilities in reconfigurable broadcast networks;unsafe order-2 tree languages are context-sensitive;complexity of model-checking call-by-value programs;resource reachability games on pushdown graphs;the complexity of partial-observation stochastic parity games with finite-memory strategies;on negotiation as concurrency primitive II: deterministic cyclic negotiations;on asymmetric unification and the combination problem in disjoint theories;axiomatizing bisimulation equivalences and metrics from probabilistic SOS rules;generalized Eilenberg theorem I: local varieties of languages;and combining bialgebraic semantics and equations.
this paper proposes a novel inherently rotation invariant local descriptor which combined intensity information and gradient information of key feature. the CSLBP shows a better performance than SIFT and do not need l...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
this paper proposes a novel inherently rotation invariant local descriptor which combined intensity information and gradient information of key feature. the CSLBP shows a better performance than SIFT and do not need large computation. To further enhance its performance and robustness, we calculated the gradient of key feature and computed a combined histogram included intensity and gradient information of sample point. Moreover, our descriptor does not estimate a reference orientation for achieving rotation invariance. We conduct the image matching experiments on Oxford dataset and additional image pairs with large illumination changes to evaluate the performance of our descriptor and existing local descriptors(such as SIFT, GLOH, DAISY, MROGH-S, etc.). the experimental results demonstrate the effectiveness of our descriptors and their superiority to the state-of-the-art descriptors.
Secure multiparty computation enables protocol participants to compute the output of a public function of their private inputs whilst protecting the confidentiality of their inputs. But such an output, as a function o...
详细信息
ISBN:
(纸本)9783662544556;9783662544549
Secure multiparty computation enables protocol participants to compute the output of a public function of their private inputs whilst protecting the confidentiality of their inputs. But such an output, as a function of its inputs, inevitably leaks some information about input values regardless of the protocol used to compute it. We introduce foundations for quantifying and understanding how such leakage may influence input behaviour of deceitful protocol participants as well as that of participants they target. Our model captures the beliefs and knowledge that participants have about what input values other participants may choose. In this model, measures of information flow that may arise between protocol participants are introduced, formally investigated, and experimentally evaluated. these information-theoretic measures not only suggest advantageous input behaviour to deceitful participants for optimal updates of their beliefs about chosen inputs of targeted participants. they also allow targets to quantify the information-flow risk of their input choices. We show that this approach supports a game-theoretic formulation in which deceitful attackers wish to maximise the information that they gain on inputs of targets once the computation output is known, whereas the targets wish to protect the privacy of their inputs.
the proceedings contain 36 papers. the special focus in this conference is on Mathematical Aspects of Computer and Information sciences. the topics include: Integrating algebraic and SAT solvers;isabelle formalization...
ISBN:
(纸本)9783319724522
the proceedings contain 36 papers. the special focus in this conference is on Mathematical Aspects of Computer and Information sciences. the topics include: Integrating algebraic and SAT solvers;isabelle formalization of set theoretic structures and set comprehensions;jordan canonical form with parameters from frobenius form with parameters;knowledge-based interoperability for mathematical software systems;on interval methods with zero rewriting and exact geometric computation;sparse rational function interpolation with finitely many values for the coefficients;virtual theories – A uniform interface to mathematical knowledge bases;on real roots counting for non-radical parametric ideals;on the bit-size of non-radical triangular sets;balancing expression dags for more efficient lazy adaptive evaluation;rapidly convergent integrals and function evaluation;stirling numbers, Lambert W and the Gamma function;the potential and challenges of CAD with equational constraints for SC-square;new small 4-designs with nonabelian automorphism groups;on classifying steiner triple systems by their 3-rank;right-justified characterization for generating regular pattern avoiding permutations;experimental study of the Ehrhart interpolation polytope;on testing isomorphism of graphs of bounded eigenvalue multiplicity;a simple streaming bit-parallel algorithm for swap pattern matching;epidemic intelligence statistical modelling for biosurveillance;certification using Newton-invariant subspaces;mining acute stroke patients’ data using supervised machine learning;parallel and robust empirical risk minimization via the median trick;leakage-resilient riffle shuffle;ordinary pairing-friendly genus 2 hyperelliptic curves with absolutely simple Jacobians;Statistical testing of PRNG: Generalized gambler’s ruin problem;subtleties in security definitions for predicate encryption with public index;code-based key encapsulation from McEliece’s cryptosystem.
the responses of high-rise buildings are mostly dominated by the first few vibration modes;therefore, the corresponding floor responses at high levels have long predominant periods. Damages of nonstructural components...
详细信息
Private set intersection (PSI) refers to a special case of secure two-party computation in which the parties each have a set of items and compute the intersection of these sets without revealing any additional informa...
详细信息
ISBN:
(纸本)9783319566207;9783319566191
Private set intersection (PSI) refers to a special case of secure two-party computation in which the parties each have a set of items and compute the intersection of these sets without revealing any additional information. In this paper we present improvements to practical PSI providing security in the presence of malicious adversaries. Our starting point is the protocol of Dong, Chen & Wen (CCS 2013) that is based on Bloom filters. We identify a bug in their malicious-secure variant and show how to fix it using a cut-and-choose approach that has low overhead while simultaneously avoiding one the main computational bottleneck in their original protocol. We also point out some subtleties that arise when using Bloom filters in malicious-secure cryptographic protocols. We have implemented our PSI protocols and report on its performance. Our improvements reduce the cost of Dong et al.'s protocol by a factor of 14 - 110x on a single thread. When compared to the previous fastest protocol of De Cristofaro et al., we improve the running time by 8 - 24x. For instance, our protocol has an online time of 14 s and an overall time of 2.1 min to securely compute the intersection of two sets of 1 million items each.
foundations of softwarescience and computationstructures : Second internationalconference, Fossacs '99 Held as Part of the Joint European conferences on theory and Practice of software, Etaps '99, Amsterdam...
详细信息
foundations of softwarescience and computationstructures : Second internationalconference, Fossacs '99 Held as Part of the Joint European conferences on theory and Practice of software, Etaps '99, Amsterdam, the Netherlands, March 22-28, 1999 : Proceedings by Fossacs '99 (1999 : Amsterdam, Netherlands); thomas, Wolfgang, 1947-; international Joint conference on theory; Practice of software Development (9th : 1999 : Amsterdam, Netherlands); published by Berlin ; New York : Springer
We present a theory for slicing probabilistic imperative programs-containing random assignment and "observe" statements-represented as control flow graphs whose nodes transform probability distributions. We ...
详细信息
ISBN:
(纸本)9783662496305;9783662496299
We present a theory for slicing probabilistic imperative programs-containing random assignment and "observe" statements-represented as control flow graphs whose nodes transform probability distributions. We show that such a representation allows direct adaptation of standard machinery such as data and control dependence, postdominators, relevant variables, etc. to the probabilistic setting. We separate the specification of slicing from its implementation: first we develop syntactic conditions that a slice must satisfy;next we prove that any such slice is semantically correct;finally we give an algorithm to compute the least slice. A key feature of our syntactic conditions is that they involve two disjoint slices such that the variables of one slice are probabilistically independent of the variables of the other. this leads directly to a proof of correctness of probabilistic slicing.
We show that any one-counter automaton with n states, if its language is non-empty, accepts some word of length at most O(n(2)). this closes the gap between the previously known upper bound of O(n(3)) and lower bound ...
详细信息
ISBN:
(纸本)9783662496305;9783662496299
We show that any one-counter automaton with n states, if its language is non-empty, accepts some word of length at most O(n(2)). this closes the gap between the previously known upper bound of O(n(3)) and lower bound of Omega(n(2)). More generally, we prove a tight upper bound on the length of shortest paths between arbitrary configurations in one-counter transition systems (weaker bounds have previously appeared in the literature).
this paper is concerned with Freeze LTL, a temporal logic on data words with registers. In a (multi-attributed) data word each position carries a letter from a finite alphabet and assigns a data value to a fixed, fini...
详细信息
ISBN:
(纸本)9783662496305;9783662496299
this paper is concerned with Freeze LTL, a temporal logic on data words with registers. In a (multi-attributed) data word each position carries a letter from a finite alphabet and assigns a data value to a fixed, finite set of attributes. the satisfiability problem of Freeze LTL is undecidable if more than one register is available or tuples of data values can be stored and compared arbitrarily. Starting from the decidable one-register fragment we propose an extension that allows for specifying a dependency relation on attributes. this restricts in a flexible way how collections of attribute values can be stored and compared. this conceptual dimension is orthogonal to the number of registers or the available temporal operators. the extension is strict. Admitting arbitrary dependency relations, satisfiability becomes undecidable. Tree-like relations, however, induce a family of decidable fragments escalating the ordinal-indexed hierarchy of fast-growing complexity classes, a recently introduced framework for non-primitive recursive complexities. this results in completeness for the class F is an element of(0). We employ nested counter systems and show that they relate to the hierarchy in terms of the nesting depth.
暂无评论