A dynamic stock trading system with a distributed shared memory is analyzed formally based on its temporal Petri net model. The functional correctness of the system is formally verified and some important properties o...
详细信息
In order to tolerate possible leakage of secret keys, leakage-resilient cryptosystem models a class of attractive leakage output by allowing an adversary to provide any computable leakage function and learning the par...
详细信息
In order to tolerate possible leakage of secret keys, leakage-resilient cryptosystem models a class of attractive leakage output by allowing an adversary to provide any computable leakage function and learning the partial keys or other possible intemal states from the output of function. In this work, we present an adaptively secure broadcast encryption resilient to key continual leakage in the standard model. Our scheme provides the tolerance of continual leakage, in which any user can generate multiple private keys per user by periodically updating the key. We use the dual system encryption mechanism to implement the leakage resilience and adaptive security, and intrinsically set an algorithm to refresh a key and produce a same distributed new key. We also give the evaluation of the leakage bound and leakage fraction, and the simulations show that our scheme can tolerate about 71% leakage fraction with 3.34× 10^-52 failure probability in standard 80-bit security level when we adjust the leakage factor to allow the private key to be 100 Kb.
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solu...
详细信息
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solution that makes use of the bounded model checking(BMC)technique to generate test sequences and parallel *** this method,the parallel SBST with BMC derives the leading sequence for each router’s internal function and detects all functionally-testable faults related to the function.A Monte-Carlo simulation algorithm is then used to search for the approximately optimum configuration of the parallel packets,which guarantees the test quality and minimizes the test ***,a multi-threading technology is used to ensure that the Monte-Carlo simulation can reach the approximately optimum configuration in a large random space and reduce the generating time of the parallel *** results show that the proposed method achieves a high fault coverage with a reduced test ***,by performing online testing in the functional mode with SBST,it effectively avoids the over-testing problem caused by functionally untestable turns in kilo-core NoCs.
For state and non-state actors with sizable cyber interests, numerous breaches during this decade affirmed the necessity of having cyber counterintelligence (CCI) at the centre of cybersecurity efforts. Concurrent wit...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object segmentation:one is that the single frame calculation time is too long,and the other is that the current frame’s segmentation should use more information from past *** algorithm uses a global context(GC)module to achieve highperformance,real-time *** GC module can effectively integrate multi-frame image information without increased memory and can process each frame in real ***,the prediction mask of the previous frame is helpful for the segmentation of the current frame,so we input it into a spatial constraint module(SCM),which constrains the areas of segments in the current *** SCM effectively alleviates mismatching of similar targets yet consumes few additional *** added a refinement module to the decoder to improve boundary *** model achieves state-of-the-art results on various datasets,scoring 80.1%on YouTube-VOS 2018 and a J&F score of 78.0%on DAVIS 2017,while taking 0.05 s per frame on the DAVIS 2016 validation dataset.
A traditional single-pixel camera needs a large number of measurements to reconstruct the object with compressive sensing *** with the 1/0 matrices in classical measurement,the 1/-1 matrices in the complementary measu...
详细信息
A traditional single-pixel camera needs a large number of measurements to reconstruct the object with compressive sensing *** with the 1/0 matrices in classical measurement,the 1/-1 matrices in the complementary measurement has better property for reconstruction computation and returns better reconstruction ***,each row of the 1/-1 matrices needs two measurements with the traditional single-pixel camera which results into double measurements compared with the 1/0 *** this paper,we consider the pseudo complementary measurement which only takes the same amount of measurements with the row number of some properly designed 1/0 matrix to compute the total luminous flux of the objective and derives the measurement data of the corresponding 1/-1 matrix in a mathematical *** numerical simulation and experimental result show that the pseudo complementary measurement is an efficient tool for the traditional single-pixel camera imaging under low measurement rate,which can combine the advantages of the classical and complementary measurements and significantly improve the peak signal-to-noise ratio.
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi...
详细信息
For this special section on software systems special section, discuss important issues that will shape several research leaders in software systems, as guest editors for this this field's future directions. The essa...
详细信息
For this special section on software systems special section, discuss important issues that will shape several research leaders in software systems, as guest editors for this this field's future directions. The essays included in this roundtable article cover research opportunities and challenges for emerging software systems such as data processing programs (Xiangyu Zhang) and online services (Dongmei Zhang), with new directions of technologies such as unifications in software testing (Yves Le Traon), data-driven and evidence-based softwareengineering (Qing Wang), and dynamic analysis of multiple traces (Lu Zhang). Tao Xie, Leading Editor of Special Section on Softwaare Svstem.
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma...
详细信息
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et alfs scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.'s proof.
The utilization of biomimicry of bacterial foraging strategy was considered to develop an adaptive control strategy for mobile robot, and a bacterial foraging approach was proposed for robot path planning. In the prop...
详细信息
The utilization of biomimicry of bacterial foraging strategy was considered to develop an adaptive control strategy for mobile robot, and a bacterial foraging approach was proposed for robot path planning. In the proposed model, robot that mimics the behavior of bacteria is able to determine an optimal collision-free path between a start and a target point in the environment surrounded by obstacles. In the simulation, two test scenarios of static environment with different number obstacles were adopted to evaluate the performance of the proposed method. Simulation results show that the robot which reflects the bacterial foraging behavior can adapt to complex environments in the planned trajectories with both satisfactory accuracy and stability.
暂无评论