With its characteristics of decentralization,security, data traceability, and tamper-resistance, the blockchain has been widely used in various *** the difference in the performance of the devices, the light client is...
详细信息
With its characteristics of decentralization,security, data traceability, and tamper-resistance, the blockchain has been widely used in various *** the difference in the performance of the devices, the light client is proposed so that devices without the ability to store a full blockchain copy can also participate in the blockchain transactions. However,the light client has to communicate with full nodes and verify the authenticity of a transaction which brings in some extent of communication, computation, and storage overheads to the light client. These overheads cannot be ignored for some low-performance devices, such as embedded devices or Io T chips, and therefore the current light client scheme does not work in this situation. We propose LOPE(a Low-overhead payment v Erification method) for poor-capacity nodes in the blockchain *** LOPE, a grouping protocol is designed to partition full nodes into groups to serve the verification requests of the light client. In addition, Practical byzantine fault tolerance(PBFT) is used to ensure the light client to get a credible result in spite of a few dishonest nodes existing in the group. We conduct LOPE and evaluate it in a testbed. The experiment results show that LOPE reduces more than half of the communication overhead, degrades the computation overhead of the light client to a large extent, and avoids the storage overhead of the hash roots of block headers in the light client. We also conduct theoretical analysis to show the performance improvement and security issues of LOPE.
In recent years, a variety of encrypfion algorithms were proposed to enhance the security of software and systems. Validating whether encryption algorithms are correctly implemented is a challenging issue. software te...
详细信息
In recent years, a variety of encrypfion algorithms were proposed to enhance the security of software and systems. Validating whether encryption algorithms are correctly implemented is a challenging issue. software testing delivers an effective and practical solution, but it also faces the oracle problem (that is, under many practical situations, it is impossible or too computationally expensive to know whether the output for any given input is correct). In this paper, we propose a property-based approach to testing encryption programs in the absence of oracles. Our approach makes use of the so-called metamorphic properties of encryption algorithms to generate test cases and verify test results. Two case studies were conducted to illustrate the proposed approach and validate its effectiveness. Experimental results show that even without oracles, the proposed approach can detect nearly 50% inserted faults with at most three metamorphic relations (MRs) and fifty test cases.
Hardware-software (HW/SW) partitioning is one of the crucial steps in embedded system design. This paper focuses on the algorithmic aspects of the HW/SW partitioning with the objectives of minimizing both execution ti...
详细信息
Categorizing the consecutive video frames into shots is the first and prerequisite step for contentbased video indexing and retrieval. With a considerable amount of research focusing on the shot boundary detection, tr...
详细信息
In this paper, we present a hybrid representation of image-based models combining the textured planes and the hierarchical points. Taking a set of depth images as input, our method starts from classifying input pixels...
详细信息
In this paper, we present a hybrid representation of image-based models combining the textured planes and the hierarchical points. Taking a set of depth images as input, our method starts from classifying input pixels into two categories, indicating the planar and non-planar surfaces respectively. For the planar surfaces, the geometric coefficients are reconstructed to form the uniformly sampled textures. For nearly planar surfaces, some textured planes, called lumiproxies, are constructed to represent the equivalent visual appearance. The Hough transform is used to find the positions of these textured planes, and optic flow measures are used to determine their textures. For remaining pixels corresponding to the non-planar geometries, the point primitive is applied, reorganized as the OBB-tree structure. Then, texture mapping and point splatting are employed together to render the novel views, with the hardware acceleration.
Real-Time Publish and Subscribe (RTPS) protocol is a protocol for implementing message exchange over an unreliable transport in data distribution service (DDS). Formal modelling and verification of the protocol provid...
详细信息
Real-Time Publish and Subscribe (RTPS) protocol is a protocol for implementing message exchange over an unreliable transport in data distribution service (DDS). Formal modelling and verification of the protocol provide stronger guarantees of its correctness and efficiency than testing alone. In this paper, we build formal models for the RTPS protocol using UPPAAL and Simulink/Stateflow. Modelling using Simulink/Stateflow allows analyzing the protocol through simula-tion, as well as generate executable code. Modelling using UPPAAL allows us to verify properties of the model stated in TCTL (Timed Computation Tree Logic), as well as estimate its performance using statistical model checking. We further describe a procedure for translation from Stateflow to timed automata, where a subset of major features in Stateflow is supported, and prove the soundness statement that the Stateflow model is a refinement of the translated timed automata model. As a consequence, any property in a certain fragment of TCTL that we have verified for the timed automata model in UPPAAL is preserved for the original Stateflow model.
Complex problem solving requires diverse expertise and multiple techniques. In order to solve such problems, complex multi-agent systems that include both of human experts and autonomous agents are required in many ap...
详细信息
Complex problem solving requires diverse expertise and multiple techniques. In order to solve such problems, complex multi-agent systems that include both of human experts and autonomous agents are required in many application domains. Most complex multi-agent systems work in open domains and include various heterogeneous agents. Due to the heterogeneity of agents and dynamic features of working environments, expertise and capabilities of agents might not be well estimated and presented in these systems. Therefore, how to discover useful knowledge from human and autonomous experts, make more accurate estimation for experts' capabilities and find out suitable expert(s) to solve incoming problems ("Expert Mining") are important research issues in the area of multi-agent system. In this paper, we introduce an ontology-based approach for knowledge and expert mining in hybrid multi-agent systems. In this research, ontologies are hired to describe knowledge of the system. Knowledge and expert mining processes are executed as the system handles incoming problems. In this approach, we embed more self-learning and self-adjusting abilities in multi-agent systems, so as to help in discovering knowledge of heterogeneous experts of multi-agent systems.
Anti-aliasing is a well-established technique in computer graphics that reduces the blocky or stair-wise appearance of pixels. This paper provides a comprehensive overview of the anti-aliasing techniques used in compu...
详细信息
Anti-aliasing is a well-established technique in computer graphics that reduces the blocky or stair-wise appearance of pixels. This paper provides a comprehensive overview of the anti-aliasing techniques used in computer graphics, which can be classified into two categories: post-filtering based anti-aliasing and pre-filtering based anti-aliasing. We discuss post-filtering based anti-aliasing algorithms through classifying them into hardware anti-aliasing techniques and post-process techniques for deferred rendering. Comparisons are made among different methods to illustrate the strengths and weaknesses of every category. We also review the utilization of anti-aliasing techniques from the first category in different graphic processing units, i.e., different NVIDIA and AMD series. This review provides a guide that should allow researchers to position their work in this important research area, and new research problems are identified.
Dear editor,Flower painting,which is one of the major categories of Chinese painting,represents the key artistic characteristics of oriental *** other words,its typical usages of stroke and ink color contribute to the...
详细信息
Dear editor,Flower painting,which is one of the major categories of Chinese painting,represents the key artistic characteristics of oriental *** other words,its typical usages of stroke and ink color contribute to the unique appeal of Chinese painting,since the strokes may be straight or curved,hard or soft,thick or thin,pale or dark,and the ink colors may be dry or running,blending or ***,the complexity and variety of
The potential of information technology(IT)in education modernization has been widely *** the broad efforts for advancing education IT,digital education resources continue to receive a high level of attention,with the...
详细信息
The potential of information technology(IT)in education modernization has been widely *** the broad efforts for advancing education IT,digital education resources continue to receive a high level of attention,with the goal
暂无评论