Obliviousness is a security feature to protect sensitive information from an algorithm's observable behaviours. For better run-time performance, many oblivious algorithms published recently are probabilistic inste...
详细信息
ISBN:
(纸本)9781450399012
Obliviousness is a security feature to protect sensitive information from an algorithm's observable behaviours. For better run-time performance, many oblivious algorithms published recently are probabilistic instead of deterministic, but this also brings difficulties to reason about them. We introduce some challenges, works and further ideas in this paper, including the concrete contribution of extending PSL for verifying one of the random oblivious algorithms. We also present my further PhD research plan on this topic.
Detecting, tracking and identifying different non-rigid agents in smart spaces is solved with a probabilistic filter proposed in this paper. A camera ring statically mounted in the intelligent space is used as observa...
详细信息
ISBN:
(纸本)9781424463916
Detecting, tracking and identifying different non-rigid agents in smart spaces is solved with a probabilistic filter proposed in this paper. A camera ring statically mounted in the intelligent space is used as observation system. Besides, three subsystems create the global detection and tracking algorithm: a three-dimensional reconstruction of these entities;a global tracker of all these entities made of a multimodal filter;and a deterministic classifier based on a connectivity map that obtains the individual agents in the smart space. A the end of the paper, different results and reliability statistics are presented in order to demonstrate the global functionality in real executions of the proposal presented.
Chaitin and Schwartz [4] have proved that Solovay and Strassen [12], Miller [9], and Rabin [10] probabilistic algorithms for testing primality are error-free in case the input sequence of coin tosses has maximal infor...
详细信息
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be comprom...
详细信息
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The solution proposed requires the tag to store just a single key, thus fitting the constraints on tag's memory. Second, we provide a probabilistic tag identification scheme that requires the server to perform just bitwise operations and simple list manipulation primitives, thus speeding up the identification process. The tag identification protocol assures privacy, security and resilience to DoS attacks thanks to its stateless nature. Moreover, we extend the tag identification protocol to achieve mutual authentication and resilience to replay attacks. The proposed identification protocol, unlike other probabilistic protocols, never rejects a legitimate tag. Furthermore, the identification protocol requires the reader to access the local database (DB) of tags' keys O(n) times-where n is the number of tags in the system-while it has been shown in the literature that a privacy preserving identification protocol requires a reader to access O(n) times this DB. In this sense, our protocol is optimal. Finally, the three features suggested in this paper, namely, reader-dependent key management, tag identification, and mutual authentication, can be independently adopted to build alternative solutions. (C) 2010 Elsevier Ltd. All rights reserved.
An algorithm based on correlation analysis was adopted to estimate the probability of the presence of damage in aluminum plates using Lamb wave signals from an active sensor network. Both finite element analysis and e...
详细信息
An algorithm based on correlation analysis was adopted to estimate the probability of the presence of damage in aluminum plates using Lamb wave signals from an active sensor network. Both finite element analysis and experimental evaluations were presented. The Shannon entropy optimization criterion was applied to calibrate the optimal mother wavelet and the most appropriate continuous wavelet transform scale for signal processing. The correlation coefficients for individual sensing paths between the present state (with damage) and the reference state (without damage) were calculated, and the probability of the presence of damage in the monitoring area enclosed by the active sensor network was estimated to identify the damage. A concept of virtual sensing paths (VSPs) was proposed to enhance the performance of the algorithm by increasing the number of sensing paths in data fusion. The results identified using both simulation and experimental Lamb wave signals from different groups of sensing paths at different central frequencies agreed well with the actual situations, demonstrating the potential of the correlation-based algorithm with the application of VSPs for identification of damage in structures.
We can easily decide, using O(n-5) arithmetic operations, if multiplication is associative in an n-dimensional algebra. We present two Monte Carlo algorithms that use only O(n3) and O(n4) operations respectively. Inte...
详细信息
We can easily decide, using O(n-5) arithmetic operations, if multiplication is associative in an n-dimensional algebra. We present two Monte Carlo algorithms that use only O(n3) and O(n4) operations respectively. Interestingly, one method can be used in a more general setting to efficiently solve the seemingly hard problem of testing whether an arbitrary algebra over Q satisfies an arbitrary multilinear identity.
A speed up technique for the non-local means (NLM) image denoising algorithm based on probabilistic early termination ( PET) is proposed. A significant amount of computation in the NLM scheme is dedicated to the disto...
详细信息
A speed up technique for the non-local means (NLM) image denoising algorithm based on probabilistic early termination ( PET) is proposed. A significant amount of computation in the NLM scheme is dedicated to the distortion calculation between pixel neighborhoods. The proposed PET scheme adopts a probability model to achieve early termination. Specifically, the distortion computation can be terminated and the corresponding contributing pixel can be rejected earlier, if the expected distortion value is too high to be of significance in weighted averaging. Performance comparative with several fast NLM schemes is provided to demonstrate the effectiveness of the proposed algorithm.
We consider a team of k identical, oblivious, and semi-synchronous mobile robots that are able to sense (i.e., view) their environment, yet are unable to communicate, and evolve on a constrained path. Previous results...
详细信息
We consider a team of k identical, oblivious, and semi-synchronous mobile robots that are able to sense (i.e., view) their environment, yet are unable to communicate, and evolve on a constrained path. Previous results in this weak scenario show that initial symmetry yields high lower bounds when problems are to be solved by deterministic robots. In this paper, we initiate research on probabilistic bounds and solutions in this context, and focus on the exploration problem of anonymous unoriented rings of any size n. It is known that k = Theta(logn) deterministic robots are necessary and sufficient to solve the problem, provided that k and n are coprime. By contrast, we show that four identical probabilistic robots are necessary and sufficient to solve the same problem, also removing the coprime constraint. Our positive results are constructive. (C) 2013 Elsevier B.V. All rights reserved.
This paper presents and analyzes a new probabilistic clock synchronization algorithm that can guarantee a much smaller bound on the clock skew than most existing algorithms. The algorithm is probabilistic in the sense...
详细信息
This paper presents and analyzes a new probabilistic clock synchronization algorithm that can guarantee a much smaller bound on the clock skew than most existing algorithms. The algorithm is probabilistic in the sense that the bound on the clock skew that it guarantees has a probability of invalidity associated with it. However, the probability of invalidity may be made extremely small by transmitting a sufficient number of synchronization messages. It is shown that an upper bound on the probability of invalidity decreases exponentially with the number of synchronization messages transmitted. A closed-form expression that relates the probability of invalidity to the clock skew and the number of synchronization messages is also derived.
作者:
Tanaka, KTohoku Univ
Grad Sch Informat Sci Dept Comp & Math Sci Sendai Miyagi 9808579 Japan
probabilistic inference by means of a massive probabilistic model usually has exponential-order computational complexity. For such massive probabilistic model, loopy belief propagation was proposed as a scheme to obta...
详细信息
probabilistic inference by means of a massive probabilistic model usually has exponential-order computational complexity. For such massive probabilistic model, loopy belief propagation was proposed as a scheme to obtain the approximate inference. It is known that the generalized loopy belief propagation is constructed by using a cluster variation method. However, it is difficult to calculate the correlation in every pair of nodes which are not connected directly to each other by means of the generalized loopy belief propagation. In the present paper, we propose a general scheme for calculating an approximate correlation in every pair of nodes in a probabilistic model for probabilistic inference. The general scheme is formulated by combining a cluster variation method with a linear response theory.
暂无评论