We consider the problem of optimally assigning p sniffers to K channels to monitor the transmission activities in a multi-channel wireless network. The activity of users is initially unknown to the sniffers and is to ...
详细信息
Data availability is a desirable feature for all cloud providers. However, data reliability and disaster recovery cost are always two incompatible goals because adoption of data redundancy will bring incremental cost....
详细信息
We are proud to present this special issue of the Elsevier journal Information Security Technical Report, which contains eight of the most outstanding papers of ARES 2012 (7th International Conference on Availability,...
详细信息
We are proud to present this special issue of the Elsevier journal Information Security Technical Report, which contains eight of the most outstanding papers of ARES 2012 (7th International Conference on Availability, Reliability and Security) and co-located workshops held at the University of Economics in Prague, Czech Republic, from 20 to 24 August, 2012. Together, they span the whole gamut of the conference's topics, from access control and privacy to security issues, risk assessment, and digital forensics.
RNA interactions are fundamental in many cellular processes, which can involve two or more RNA molecules. Multiple RNA interactions are also believed to be much more complex than pairwise interactions. Recently, multi...
详细信息
The security of the Cipher-State (CS) mode was proposed to NIST as an authenticated encryption (AE) scheme in 2004. The usual SPRP blockcipher security for AE schemes may not guarantee its security. By constructing a ...
详细信息
Cyber-Physical Systems (CPS) are a logical step towards integrating classical IT systems further into physical or virtual surroundings. In consequence this means that CPS will be targets for new security threats, e.g....
详细信息
Cyber-Physical Systems (CPS) are a logical step towards integrating classical IT systems further into physical or virtual surroundings. In consequence this means that CPS will be targets for new security threats, e.g. by manipulating the system both at the IT system level and within its surroundings. In this paper, we first discuss these new types of security threats before suggesting a novel system architecture that extends ideas from the domain of Organic computing. Finally, we present a research agenda towards building future secure CPS.
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illu...
详细信息
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illumination changes and the other is processing speed. In this paper, first, histograms of oriented gradient (HOG) features are extracted to resolve the problem of illumination changes. Second, AdaBoost based algorithm is used in detection phase to increase the processing speed. Finally, RBF-SVM classifier is used for recognition. Experimental results show a high detection and recognition accuracy and the processing speed is about 10 frames per second.
This paper aims to discuss learning style implementation into an e-learning environment. The relationship between learning style and adaptive system is identified and connected. Elements gained from traditional learni...
详细信息
This paper aims to discuss learning style implementation into an e-learning environment. The relationship between learning style and adaptive system is identified and connected. Elements gained from traditional learning style researches are adapted into e-learning system to support Personalized Collaborative Learning (PCL) online learning environment. PCL embed Human Computer Interaction (HCI) elements in its environment. Learner model in terms of learning style, learners’ needs and references are smaller, hence it should be broadened to integrate more personalized features into an adaptive system. Therefore, knowledge/materials sharing, question well formation and freedom option support the design of depth personalization into adaptive system like iYu to balance between Personalized Learning Environment (PLE) and collaborative learning. Apart from that, theories overlapping, generalization and time constraits are among the factors that may cause failure to e-learning system effectiveness. In addition, learners’ learning style is found to be dynamic during a learning process or self-reflection occurence in PCL framework. Results showed that learners were able to reflect and discover themselves with the presentation of iYu user interface.
software interaction test suites serve two complementary roles. They are employed to systematically verify that, for some strength t, no t-way interaction of a system's parameters causes a fault. They are also emp...
详细信息
software interaction test suites serve two complementary roles. They are employed to systematically verify that, for some strength t, no t-way interaction of a system's parameters causes a fault. They are also employed to locate a faulty configuration, when at least one interaction fault remains. Algorithms to find such test suites employing a number of tests close to the minimum have been extensively explored, in order to test all t-way interactions. However, when faults remain, the expected number of tests needed to reveal an interaction fault is also important. One might anticipate that the test suites of minimum size also have the lowest expected time to detection of an interaction fault;or, at the very least, that some test suite of minimum size does. However, in this paper it is shown that minimum test suite size and lowest expected time to fault detection are incompatible objectives. This underlies a challenging problem of how to generate test suites that have early coverage of t-way interactions, in order to reduce time to fault detection. A hybrid approach is developed that combines a simple greedy algorithm with heuristic search to construct one test at a time while attempting to maximize the number of t-way interactions covered by the earliest tests.
The PADS (Process Algebra for Demand and Supply) framework is an approach to model resource demand and supply for the formal analysis of hierarchical scheduling. Inspired by the demand relation in PADS, we propose a w...
详细信息
暂无评论