In this paper, we propose a novel tiny hardware assisted hypervisor, called Aquarius, to introspect the commodity OSes in a non-bypassable way. Compared to previous hypervisor-based approaches, Aquarius offers three d...
详细信息
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clou...
详细信息
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
This paper presents a method for locating text based on a simplified pulse coupled neural network (PCNN). The PCNN generates a firings map in a similar way to the human visual system with non-linear image processing...
详细信息
This paper presents a method for locating text based on a simplified pulse coupled neural network (PCNN). The PCNN generates a firings map in a similar way to the human visual system with non-linear image processing. The PCNN is used to segment the original image into different planes and edges detected using both the PCNN firings map and a phase congruency detector. The different edges are integrated using an automatically adjusted weighting coefficient. Both the simplified PCNN and the phase congruency energy model in the frequency domain imitate the human visual system. This paper shows how to use PCNN by changing the compute space from the spatial domain to the frequency domain for solving the text location problem. The algorithm is a simplified PCNN edge-based (PCNNE) algorithm. Three comparison tests are used to evaluate the algorithm. Tests on large data sets show PCNNE efficiently detects texts with various colors, font sizes, positions, and uneven illumination. This method outperforms several traditional methods both in text detection rate and text detection accuracy.
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with Beehi...
详细信息
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with BeehiveZ. Four types of queries are all supported in BeehiveZ, i.e. exact query based on structure, similarity query based on structure, exact query based on behavior, similarity query based on behavior. BeehiveZ provides different indexes to facilitate the efficient query processing of different types of queries. To make BeehiveZ more applicable, label similarity is considered.
We propose an approach to recognize group activities which involve several persons based on modeling the interactions between human bodies. Benefitted from the recent progress in pose estimation [1], we model the acti...
详细信息
We propose an approach to recognize group activities which involve several persons based on modeling the interactions between human bodies. Benefitted from the recent progress in pose estimation [1], we model the activities as the interactions between the parts belong to the same person (intra-person) and those between the parts of different persons (inter-person). Then a unified, discriminative model which integrates both types of interactions is developed. The experiments on the UT-Interaction Dataset [2] show the promising results and demonstrate the power of the interacting models.
In order to set up universal criteria for measuring and evaluating network security and survivability, this paper presents a novel index system. This index system was built according to the Protection-Detection-Respon...
详细信息
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boo...
详细信息
The Multi-Label Classification (MLC) problem has aroused wide concern in these years since the multi-labeled data appears in many applications, such as page categorization, tag recommendation, mining of semantic web d...
详细信息
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ...
详细信息
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on the special properties of single cycle T-function and an algorithm due to Wei, linear complexities of these four kinds of sequence are all acquired. The results show that single cycle T-function sequences have high linear complexity. Therefore, T-function satisfies the essential requirements being a basic component of stream cipher.
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO s...
详细信息
ISBN:
(纸本)9781467321006
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO sparse channel,the prevalent compressed sensing (CS) theory is *** to random pilot construction,a deterministic pilot de- sign method is exploited to form the measurement matrix by deterministically extracting some rows of Fourier matrix that satisfies Restricted Isometry Property (RIP).Two families of continuous functions,namely f1 -SL0 and f 2-SL0,are investi- gated in this paper to approximate A 0norm for MIMO sparse channel *** results suggest that the de- terministic pilot design scheme performs as well as the random one at both low and high signal noise ratio (SNR).Moreover,f1 - SL0 and f 2-SL0 outperform A 1-dantzig algorithm with faster running time and better anti-noisy performance.
暂无评论