The wireless physical channel parameters are recently used to provide secret ***,the key generation usually suffers from the quantization errors due to the noise,which decreases the key agreement ratio (KAR) between a...
详细信息
The wireless physical channel parameters are recently used to provide secret ***,the key generation usually suffers from the quantization errors due to the noise,which decreases the key agreement ratio (KAR) between authorized *** existing approaches achieve high KAR by discarding some channel parameters which may lower the key generation efficiency and therefore lower the encryption *** the frequency-division duplex (FDD) systems,the number of reciprocal parameters,such as the multipath angle and delay,is *** how to find a quantization method with high KAR and encryption strength is one of the major problems for secret key generation in FDD *** this paper,a robust quantization scheme based on grouping and shifting is proposed,in which all the available parameters are used for key *** addition,a key mapping method with error correction based on Chinese remainder theorem (CRT) is proposed to further improve the KAR *** demonstrate the effectiveness of the proposed method.
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
Several new, data-oriented internetworking architectures have been proposed recently. However, the practical deployability of such designs is an open question. In this paper, we consider data-oriented network designs ...
详细信息
ISBN:
(纸本)9781605582108
Several new, data-oriented internetworking architectures have been proposed recently. However, the practical deployability of such designs is an open question. In this paper, we consider data-oriented network designs in the light of the policy and incentive structures of the present internetworking economy. A main observation of our work is that none of the present proposals is both policy-compliant and incentivecompatible with the current internetworking market, which makes their deployment very challenging if not impossible. This difficulty stems from the unfounded implicit assumption that data-oriented routing policies directly reflect the underlying packet-level inter-domain policies. We find that to enable the more effective network utilization promised by data-oriented networking, essential caching incentives need to exist, and that data-oriented peering needs be considered separately from peering for packet forwarding.
Sensor networks deployed in remote locations require easy to use but also extremely expressive tools for reliable operation. The PermaSense project has developed a platform based on a number of proven COTS components ...
详细信息
ISBN:
(纸本)9781424451081
Sensor networks deployed in remote locations require easy to use but also extremely expressive tools for reliable operation. The PermaSense project has developed a platform based on a number of proven COTS components and integrated with the GSN based data backend. All tools are accessible from a single location in a web browser. This demo will present the monitoring and control tools in live operation with deployments on real field sites in the Swiss Alps.
Testbeds are indispensable for debugging and evaluating wireless embedded systems. While existing testbeds provide ample opportunities for realistic, large-scale experiments, they are limited in their ability to close...
详细信息
Testbeds are indispensable for debugging and evaluating wireless embedded systems. While existing testbeds provide ample opportunities for realistic, large-scale experiments, they are limited in their ability to closely observe and control the distributed operation of resource-constrained nodes-access to the nodes is restricted to the serial port. This paper presents Flocklab, a testbed that overcomes this limitation by allowing multiple services to run simultaneously and synchronously against all nodes under test in addition to the traditional serial port service: tracing of GPIO pins to record logical events occurring on a node, actuation of GPIO pins to trigger actions on a node, and high-resolution power profiling. Flocklab's accurate timing information in the low microsecond range enables logical events to be correlated with power samples, thus providing a previously unattained level of visibility into the distributed behavior of wireless embedded systems. In this paper, we describe Flocklab's design, benchmark its performance, and demonstrate its capabilities through several real-world test cases.
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telom...
详细信息
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telomere-to-telomere assemblies,which have not yet captured its full *** this study,we investigated the genomic diversity of human centromere higher order repeats(HORs)via both HiFi reads and haplotype-resolved assemblies from hundreds of samples drawn from ongoing pangenome-sequencing projects and reprocessed them via a novel HOR annotation pipeline,*** used this wealth of data to provide a global survey of the centromeric HOR landscape;in particular,we found that 23 HORs presented significant copy number variability between *** detected three centromere genotypes with unbalanced population frequencies on chromosomes 5,8,and *** inter-assembly comparison of HOR loci further revealed that while HOR array structures are diverse,they nevertheless tend to form a number of specific landscapes,each exhibiting different levels of HOR subunit expansion and possibly reflecting a cyclical evolutionary transition from homogeneous to nested structures and back.
作者:
Luo, BinGuo, HongCREAM Group
State Key Lab. of Advanced Optical Communication Systems and Networks Inst. of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
A-type atom coupled by additional driving light and radio frequency (RF) field can generate controllable simultaneous slow and fast light at two frequencies. Distortions by radiative dampings are discussed and compens...
详细信息
We demonstrated a simple all-normal-dispersion Yb-doped femtosecond fiber laser, which delivers a pulse with 8.9 nJ and 33 MHz. After the extracavity compression with a grating pair, the pulse was compressed to 210 fs...
详细信息
Reports on the design and implementation of a networked visual monitoring system for surveillance. Instead of the usual periodic monitoring, the system has an auto-tracking feature which captures the important charact...
详细信息
ISBN:
(纸本)0780354826
Reports on the design and implementation of a networked visual monitoring system for surveillance. Instead of the usual periodic monitoring, the system has an auto-tracking feature which captures the important characteristics of intruders. We integrate two schemes, namely, image segmentation and histogram comparison, to accomplish the auto-tracking feature. The developed tracking scheme is able to segment and track moving objects from the background in real time. The tracked object information is used to guide the motion of the tracking camera to track the intruders and then to take a series of photographs. In multiple object tracking, we have developed a multiple objects tracking scheme, based on object color histogram comparison, to overcome object occlusion and disocclusion issues. To achieve efficient transmission and storage, the captured video is compressed in H.263 format. Query based on time as well as events are provided. Users can access the system from web browsers to view the monitoring site or manipulate the tracking camera on the Internet. These features are of importance and value to surveillance.
作者:
Li, JunhuiYu, QuanfuLiu, YuGuo, HongCREAM Group
State Key Lab. of Advanced Optical Communication Systems and Networks Inst. of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
Violation of Bell inequality cannot guarantee non-locality, thus an applicable hacking scheme on device-independent Bell test based quantum randomness expansion is given, together with a more secure upper bound on gen...
详细信息
暂无评论