The development of fault-tolerant quantum processors relies on the ability to control noise. A particularly insidious form of noise is temporally correlated or non-Markovian noise. By combining randomized benchmarking...
详细信息
Effective finger writing underpins semantic text input task for virtual reality applications. We demonstrate WiWrite, a novel finger writing system that leverages the ubiquitous wireless signals to enable character re...
详细信息
Effective finger writing underpins semantic text input task for virtual reality applications. We demonstrate WiWrite, a novel finger writing system that leverages the ubiquitous wireless signals to enable character recognition and word estimation. WiWrite decomposes characters into basic strokes and distinguishes them by exploring the unique signal reflection pattern caused by finger movements. Apart from the prior arts relying on specialized sensors or wearable devices, WiWrite is device-free without any accessories in deed. Our real-world experiments in two different scenarios show that WiWrite succeeds in classifying 26 upper-case alphabets with 90.8% average accuracy and recognizing simple words with an average accuracy of 96.7%.
Smart grid deploys a large number of smart terminals and sensing devices to form an edge network, as well as a virtual network of information space and the power Internet of Things. As a key component of 5G and future...
详细信息
With the continuous growth in population and energy demands more attention has been paid to energy consumption issues in residential environments. At the user-end, the home energy management system (HEMS) has been pro...
详细信息
ISBN:
(数字)9781728198668
ISBN:
(纸本)9781728198675
With the continuous growth in population and energy demands more attention has been paid to energy consumption issues in residential environments. At the user-end, the home energy management system (HEMS) has been proposed as a cost-effective solution to reduce the electricity cost in households, while maintaining users' comfort and reducing the pressure on energy providers. However, it is a challenge to design a cost-effective scheduling strategies for HEMS which takes many objectives into consideration while potentially benefiting both users and providers. In our work, we propose a new approach named adaptive multi-objective salp swarm algorithm (AMSSA) based on traditional multi-objective salp swarm algorithm (MSSA) to realise a multi-objective optimisation approach for the power scheduling problem. AMSSA not only fulfils the trade-off among users' comfort, electricity cost and peak to average ratio (PAR), but also enhances the convergence speed for the overall optimisation process. Moreover, we also set up a testbed by using smart appliances and implemented our design on an edge-based energy management system. The experiment results demonstrated a reduction in both electricity cost (47.55%) and PAR (45.73%), compared with the case without a scheduling scheme.
Infrared and visible image fusion aims to integrate the features of two source images into a single image, the essence of this method lies in the effective extraction and processing of source image features. The multi...
详细信息
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulne...
详细信息
作者:
Bin YuanYan JiaLuyi XingDongfang ZhaoXiaoFeng WangDeqing ZouHai JinYuqing ZhangSchool of Cyber Science and Engineering
Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering
Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University BloomingtonSchool of Cyber Science and Engineering
Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology
Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center
University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
ISBN:
(纸本)9781939133175
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by the device vendor, e.g., Philips bulbs are managed under Philips Hue cloud. Today's mainstream IoT clouds also support device access delegation across different vendors (e.g., Philips Hue, LIFX, etc.) and cloud providers (e.g., Google, IFTTT, etc.): for example, Philips Hue and SmartThings clouds support to delegate device access to another cloud such as Google Home, so a user can manage multiple devices from different vendors all through Google Home. Serving this purpose are the IoT delegation mechanisms developed and utilized by IoT clouds, which we found are heterogeneous and ad-hoc in the wild, in the absence of a standardized delegation protocol suited for IoT environments. In this paper, we report the first systematic study on real-world IoT access delegation, based upon a semi-automatic verification tool we developed. Our study brought to light the pervasiveness of security risks in these delegation mechanisms, allowing the adversary (e.g., Airbnb tenants, former employees) to gain unauthorized access to the victim's devices (e.g., smart locks) or impersonate the devices to trigger other devices. We confirmed the presence of critical security flaws in these mechanisms through end-to-end exploits on them, and further conducted a measurement study. Our research demonstrates the serious consequences of these exploits and the security implications of the practice today for building these mechanisms. We reported our findings to related parties, which acknowledged the problems. We further propose principles for developing more secure cross-cloud IoT delegation services, before a standardized solution can be widely deployed.
The volume of RDF data continues to grow over the past decade and many known RDF datasets have billions of triples. A grant challenge of managing this huge RDF data is how to access this big RDF data efficiently. A po...
详细信息
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindere...
详细信息
ISBN:
(数字)9781728152127
ISBN:
(纸本)9781728152134
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindered the wide adoption of mobile bookcrossing, leading to loss of books. Meanwhile, the managerial inefficiency of current mobile bookcrossing systems becomes another obstacle for advancing the book circulation. To overcome these problems, we propose to leverage the promising blockchain technology with the merits of its immutability and cryptographic smart contract. In this paper, we present BookChain, a traceable and efficient blockchain-based innercampus book sharing system. BookChain stores the complete sharing data of an interested book permanently on blockchain, such that every reader can trace the borrowing history, which reduces the potential for loss of book. BookChain also introduces the use of smart contract to automate the circulation of books with minimal human intervention, resulting in the improvement of efficiency. The experimental results show the effectiveness and low-cost of the proposed system under high concurrent users.
Non-uniform memory access (NUMA) architectures feature asymmetrical memory access latencies on different CPU nodes. Hybrid memory systems composed of non-volatile memory (NVM) and DRAM further diversify memory access ...
详细信息
Non-uniform memory access (NUMA) architectures feature asymmetrical memory access latencies on different CPU nodes. Hybrid memory systems composed of non-volatile memory (NVM) and DRAM further diversify memory access latencies due to the relatively large performance gap between NVM and DRAM. Traditional NUMA memory management policies fail to manage hybrid memories effectively and may even hurt application performance. In this paper, we present HiNUMA, a new NUMA abstraction for memory allocation and migration in hybrid memory systems. HiNUMA advocates NUMA topologyaware hybrid memory allocation policies for the initial data placement. HiNUMA also proposes a new NUMA balancing mechanism called HANB for memory migration at runtime. HANB considers both data access frequency and memory bandwidth utilization to reduce the cost of memory accesses in hybrid memory systems. We evaluate the performance of HiNUMA with several typical workloads. Experimental results show that HiNUMA can effectively utilize hybrid memories, and deliver much higher application performance than conventional NUMA memory management policies and other state-of-the-art work.
暂无评论