Limitation of message size of the MMS technology is one of the important factors which make this technology less attractive. This limitation restricts the system developers in developing new mobile applications using ...
详细信息
Secure sum protocol is a significant secure multiparty computation protocol and it has various applications in privacy-preserving distributed multiparty computation. However, most existing secure sum protocols rarely ...
详细信息
Secure sum protocol is a significant secure multiparty computation protocol and it has various applications in privacy-preserving distributed multiparty computation. However, most existing secure sum protocols rarely considered how to resist underlying collusion which is a significant practical problem. Urabe et al. proposed a collusion-resistant secure sum protocol, but too much cost of communication and computation results in its low performance efficiency. In this paper, we propose security definitions to measure secure multiparty computation protocol's capability of resisting potential collusion. Then, we precisely analyze several previous secure sum protocols' capability of resisting collusion. In addition, considering realistic requirement to resist collusion and performance efficiency needs, we present a novel collusion-resisting secure sum protocol. Theoretical analysis and experimental results confirm that our secure sum protocol is efficient and has strong capability of resisting potential collusion such that it is much superior to previous ones. The communication overheads and computation complexity of our scheme both are linearity of the number of participants. Besides, our protocol's capability of resisting collusion is adjustable according to different security needs.
In a number of types of documents, ranging from forms to archive documents and books with annotations, machine printed and handwritten text may be present in the same document image, giving rise to significant issues ...
详细信息
In a number of types of documents, ranging from forms to archive documents and books with annotations, machine printed and handwritten text may be present in the same document image, giving rise to significant issues within a digitisation and recognition pipeline. It is therefore necessary to separate the two types of text before applying different recognition methodologies to each. In this paper, a new approach is proposed which strives towards identifying and separating handwritten from machine printed text using the Bag of visual Words paradigm (BoVW). Initially, blocks of interest are detected in the document image. For each block, a descriptor is calculated based on the BoVW. The final characterization of the blocks as Handwritten, Machine Printed or Noise is made by a Support Vector Machine classifier. The promising performance of the proposed approach is shown by using a consistent evaluation methodology which couples meaningful measures along with a new dataset.
We propose a novel method to generate partial products for reduced area parallel multipliers. Our method reduces the total number of partial product bits of parallel multiplication by about half. We call partial produ...
Three-dimensional (3D) integrated circuits (ICs) that stack multiple dies vertically using through-silicon vias (TSVs) have gained wide interests of the semiconductor industry. The shift towards volume production of 3...
详细信息
Three-dimensional (3D) integrated circuits (ICs) that stack multiple dies vertically using through-silicon vias (TSVs) have gained wide interests of the semiconductor industry. The shift towards volume production of 3D-stacked ICs, however, requires their manufacturing yield to be commercially viable. Various techniques have been presented in the literature to address this important problem, including pre-bond testing techniques to tackle the “known good die” problem, TSV redundancy designs to provide defect-tolerance, and wafter/die matching solutions to improve the overall stack yield. In this paper, we survey recent advances in this filed and point out challenges to be resolved in the future.
In the surface EMG measurement, since signals generated from surface layer muscles are interfered with signals from deep layer muscles, it is difficult to identify each EMG. In this study, we aimed to identify surface...
详细信息
ISBN:
(纸本)9784907764401
In the surface EMG measurement, since signals generated from surface layer muscles are interfered with signals from deep layer muscles, it is difficult to identify each EMG. In this study, we aimed to identify surface layer and deep layer muscle activity by surface electrode. We focused on the intersection of the two muscles of surface layer and deep layer whose fibers run at right-angle each other. In such place, we placed electrodes along each muscle fiber. We observed the difference of each signals measured from each electrode sets for two kinds of body movements in which each muscle acts independently. At that time, it was confirmed that only the EMG signal along each muscle was detected when the muscle acted independently. Therefore, we thought that it can be identified surface or deep layer muscle activity by the difference of propagation directions of EMG signal along muscle fiber. Accordingly, we tried to identify the propagation direction of EMG using an electrode array. From this result, we found that the propagation direction can be visible by the electrode array. It is thought that we can identify muscle activity of deep layer muscle from the mixed signal from both of surface layer and deep layer by this method.
Recognized as great works of world literature, Shakespeare's poems and plays have been translated into dozens of languages for over 300 years. Also, there are many re-translations into the same language, for examp...
详细信息
We present an efficient controlled quantum perfect teleportation scheme. In our scheme, multiple senders can teleport multiple arbitrary unknown multi-qubit states to a single receiver via a previously shared entangle...
详细信息
We present an efficient controlled quantum perfect teleportation scheme. In our scheme, multiple senders can teleport multiple arbitrary unknown multi-qubit states to a single receiver via a previously shared entanglement state with the help of one or more controllers. Furthermore, our scheme has a very good performance in the measurement and operation complexity, since it only needs to perform Bell state and single-particle measurements and to apply Controlled-Not gate and other single-particle unitary operations. In addition, compared with traditional schemes, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher communication efficiency.
We present Bamboo, a custom source-to-source translator that transforms MPI C source into a data-driven form that automatically overlaps communication with available computation. Running on up to 98304 processors of N...
详细信息
ISBN:
(纸本)9781467308052
We present Bamboo, a custom source-to-source translator that transforms MPI C source into a data-driven form that automatically overlaps communication with available computation. Running on up to 98304 processors of NERSC's Hopper system, we observe that Bamboo's overlap capability speeds up MPI implementations of a 3D Jacobi iterative solver and Cannon's matrix multiplication. Bamboo's generated code meets or exceeds the performance of hand optimized MPI, which includes split-phase coding, the method classically employed to hide communication. We achieved our results with only modest amounts of programmer annotation and no intrusive reprogramming of the original application source.
Scientific computing has become one of the key players in the advance of modern science and technologies. In the meantime, due to the success of developments in processor fabrication, the computing power of Personal C...
详细信息
Scientific computing has become one of the key players in the advance of modern science and technologies. In the meantime, due to the success of developments in processor fabrication, the computing power of Personal computer (PC) is not to be ignored as well. Lots of high throughput type of applications can be satisfied by using the current desktop PCs, especially for those in computerized classrooms, and leave the supercomputers for the demands from large scale high performance parallel computations. The goal of this work is to develop an automated mechanism for cluster computing to utilize the computing power such as resides in computerized classroom. The PCs in computerized classroom are usually setup for education and training purpose during the daytime, and shut down at night. After well deployment, these PCs can be transformed into a pre-configured cluster computing resource immediately without touching the existing education/training environment installed on these PCs. Thus, the training activities will not be affected by this additional activity to harvest idle computing cycles. To echo today's energy saving issues, a dynamic power management is also developed to minimize energy cost. This development not only greatly reduces the management efforts and time to build a cluster, but also implies the reduction of the power consumption by such a mechanism.
暂无评论