Secret sharing techniques have been used to ensure data confidentiality and enable secure reconstruction of data. In this paper, we propose a novel secret sharing scheme called ESEC based on Elliptic Curve Cryptograph...
详细信息
Video streaming constitutes the vast majority of Internet traffic and the DASH protocol has become the de-facto standard in the industry of multimedia delivery. The multicast method for information distribution has th...
详细信息
Good user interface (UI) design is key to successful mobile apps. UI latency, which can be considered as the time between the commencement of a UI operation and its intended UI update, is a critical consideration for ...
详细信息
ISBN:
(纸本)9781467390033
Good user interface (UI) design is key to successful mobile apps. UI latency, which can be considered as the time between the commencement of a UI operation and its intended UI update, is a critical consideration for app developers. Current literature still lacks a comprehensive study on how much UI latency a user can tolerate or how to identify UI design defects that cause intolerably long UI latency. As a result, bad UI apps are still common in app markets, leading to extensive user complaints. This paper examines user expectations of UI latency, anddevelops a tool to pinpoint intolerable UI latency in Android apps. To this end, we design an app to conduct a user survey of app UI latency. Through the survey, we find the tendency between user patience and UI latency. Therefore a timely screen update (e.g., loading animations) is critical to heavy-weighted UI operations (i.e. those that incur a long execution time before the final UI update is available). We then design a tool that, by monitoring the UI inputs and updates, can detect apps that do not follow this criterion. The survey and the tool are open-source released on-line. We also apply the tool to many real-world apps. The results demonstrate the effectiveness of the tool in combating app UI design defects.
A critical issue in image interpolation is preserving edge detail and texture information in images when zooming. In this paper, we propose a novel adaptive image zooming algorithm using weighted least-square estimati...
详细信息
A critical issue in image interpolation is preserving edge detail and texture information in images when zooming. In this paper, we propose a novel adaptive image zooming algorithm using weighted least-square estimation that can achieve arbitrary integer-ratio zoom (WLS-AIZ) For a given zooming ratio n, every pixel in a low-resolution (LR) image is associated with an n x n block of high-resolution (HR) pixels in the HR image. In WLS-AIZ, the LR image is interpolated using the bilinear method in advance. Model parameters of every n×n block are worked out through weighted least-square estimation. Subsequently, each pixel in the n × n block is substituted by a combination of its eight neighboring HR pixels using estimated parameters. Finally, a refinement strategy is adopted to obtain the ultimate HR pixel values. The proposed algorithm has significant adaptability to local image structure. Extensive experiments comparing WLS-AIZ with other state of the art image zooming methods demonstrate the superiority of WLS-AIZ. In terms of peak signal to noise ratio (PSNR), structural similarity index (SSIM) and feature similarity index (FSIM), WLS-AIZ produces better results than all other image integer-ratio zoom algorithms.
The increasing popularity of using mobile devices in a work context, has led to the need to be able to support more powerful computation. Users no longer remain in an office or at home to conduct their activities, pre...
详细信息
ISBN:
(纸本)9781479959532
The increasing popularity of using mobile devices in a work context, has led to the need to be able to support more powerful computation. Users no longer remain in an office or at home to conduct their activities, preferring libraries and cafes. In this paper, we consider a mobile cloud computing scenario in which users bring their own mobile devices and are offered a variety of equipment, e.g., desktop computer, smart-TV, or projector, to migrate their applications to, so as to save battery life, improve usability and performance. We formulate a stochastic optimization problem to optimize the allocation of user applications to equipment despite future uncertainties. Furthermore, we extend the scenario to consider multiple locations and geographic migration. The performance evaluation shows the superior benefit, e.g., higher profit, compared with a baseline algorithm.
Routing and security is a major issue in mobile ad-hoc networks due to dynamic network topology. Each node may compromise the packet routing functionality by disrupting the route discovery technique. Clustering divide...
详细信息
Routing and security is a major issue in mobile ad-hoc networks due to dynamic network topology. Each node may compromise the packet routing functionality by disrupting the route discovery technique. Clustering divides a physical network into disjoint virtual sub networks in each cluster consisting of fewer nodes. The cluster based routing schemes in Mobile ad-hoc network are used to reduce the channel contention in networks with a numerous number of nodes. Privacy preservation and protection scheme is proposed to protect mobile ad hoc network link layer and operations of delivering packet over the location based routing or geographical routing.
Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards. Recently, cooperative relaying h...
详细信息
Mobile device based academic monitoring system (AMS) are inherently open systems and thereby vulnerable to various attacks. This paper proposes a security and privacy framework for AMS, which is based on a security mo...
详细信息
Mobile device based academic monitoring system (AMS) are inherently open systems and thereby vulnerable to various attacks. This paper proposes a security and privacy framework for AMS, which is based on a security model with the tree permission hierarchy using bilinear pairing. The proposed framework supports privacy based on anonymity, untraceability, and security for confidentiality, integrity, nonrepudiation, key management, and authentication and so on.
暂无评论