The trade-off among individual privacy, data utility and data feature of service has been a great concern when designing and evaluating privacy preserving schemes in trajectories publishing. The trajectories data is s...
详细信息
The trade-off among individual privacy, data utility and data feature of service has been a great concern when designing and evaluating privacy preserving schemes in trajectories publishing. The trajectories data is spatial and temporal correlated strongly. So, Privacy-preserving over them should take the human behaviors and their status into account. In this paper, we develop a novel method to investigate and analyze users' behaviors as well as the crowd density after abstracting users' ROIs. Finally, we evaluate the privacy stress via a well-designed indictor combing the trajectories visualization and analyzation. Experiments show that the method is capable of effectively finding both crowd living patterns and distribution, and the proposed indictor can quantize the mobility data utility precisely in grid.
The deep hashing based retrieval method is widely adopted in large-scale image and video retrieval. However, there is little investigation on its security. In this paper, we propose a novel method, dubbed deep hashing...
详细信息
This study focuses on the scalability problems for very large, high-speed switches, and presents a two-stage integrated scheduling algorithm named UMCSA (Unicast and Multicast Concurrent Scheduling Algorithm) which su...
详细信息
This study focuses on the scalability problems for very large, high-speed switches, and presents a two-stage integrated scheduling algorithm named UMCSA (Unicast and Multicast Concurrent Scheduling Algorithm) which supports both unicast and multicast traffic simultaneously. The first stage of the switching fabric performs switching for unicast traffic and load-balancing for multicast traffic, while the second stage performs switching for load-balanced multicast traffic. With a two-phase (request-grant) scheme, the proposed algorithm performs without iteration, and at the same time reduces the scheduling overhead to O(logN) significantly. By using the VOQ (Virtual Output Queuing) technique for unicast and multicast traffic separately at different stages, the HoL (Head-of-Line) blocking is eliminated and therefore a good throughput performance could be achieved. UMCSA performs scheduling for unicast and multicast traffic in parallel at different stages with simple Round-Robin arbitration, which is more suitable for high-speed applications. Simulation results show that the proposed integrated algorithm exhibits a good performance in terms of throughput and average delay, at different traffic compositions under various traffic patterns.
This paper introduces a learning-based optimal control strategy enhanced with nonmodel-based state estimation to manage the complexities of lane-changing maneuvers in autonomous vehicles. Traditional approaches often ...
详细信息
This paper studies the adaptive optimal control problem for a class of linear time-delay systems described by delay differential equations (DDEs). A crucial strategy is to take advantage of recent developments in rein...
详细信息
Survivability is an important component in the requirements in elastic optical networks (EONs). We examine here the significance of network survivability design against multiple-link failures under dedicated protectio...
详细信息
The purpose of the paper is to describe a new semi-automated design space exploration method based on genetic programming. A new control/dataflow specification method is proposed as well as appropriate models for hard...
详细信息
The purpose of the paper is to describe a new semi-automated design space exploration method based on genetic programming. A new control/dataflow specification method is proposed as well as appropriate models for hardware parts and algorithms. With this method we are able to test many different hardware architectures and algorithms against cost, speed, computation time and other constraints within a very short time. The remaining manual work is to exploit the model parameters of the components of the architecture and the algorithm. In contrast to other approaches our method is suited for embedded and distributed systems. The method, models and application are explained in detail by means of a comprehensive case study.
The Internet of Things (IoT) is becoming an active research area because of its largescale challenges and implementation. But security is the major concern while seeing the dramatic expansion in its applications and s...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
暂无评论