Many recently proposed cryptosystems are based on the assumption that factoring large composite integers is computationally difficult. In this paper we examine this assumption when the cryptanalyst has "side info...
详细信息
In this paper, we present new techniques to detect interposition attacks on stream-based connections in local and wide area networks. The approach developed here is general enough to apply uniformly to all circumstanc...
详细信息
ISBN:
(纸本)9781605585697
In this paper, we present new techniques to detect interposition attacks on stream-based connections in local and wide area networks. The approach developed here is general enough to apply uniformly to all circumstances where the man-in-the-middle attacker achieves interposition by corrupting higher-layer to low-layer address mappings. Thus, both the problem of local area network interposition through ARP poisoning, and the problem wide area interposition through DNS poisoning are addressed as special cases of our work. Like other solutions that reside between Layers 3 and 4 (e.g. IPSEC), our techniques enjoy the property that they do not require redesigning legacy software, as is the case for approaches that reside above Layer 4 (e.g. SSL/TLS). Unlike IPSEC, however, the developed system is tailored only to the detection of interposition attacks, and thus circumvents the overhead and complexity introduced in guaranteeing stream confidentiality and integrity. We describe the design of the system, demonstrate its efficacy, and provide a publicly accessible prototype implementation. Copyright 2009 ACM.
We propose a new approach for measuring similarity between two signals, which is applicable to many machine learning tasks, and to many signal types. We say that a signal S1 is "similar" to a signal S 2 if i...
详细信息
ISBN:
(纸本)9780262195683
We propose a new approach for measuring similarity between two signals, which is applicable to many machine learning tasks, and to many signal types. We say that a signal S1 is "similar" to a signal S 2 if it is "easy" to compose S1 from few large contiguous chunks of S2. Obviously, if we use small enough pieces, then any signal can be composed of any other. Therefore, the larger those pieces are, the more similar S1 is to S2. This induces a local similarity score at every point in the signal, based on the size of its supported surrounding region. These local scores can in turn be accumulated in a principled information-theoretic way into a global similarity score of the entire S1 to S2. "Similarity by Composition" can be applied between pairs of signals, between groups of signals, and also between different portions of the same signal. It can therefore be employed in a wide variety of machine learning problems (clustering, classification, retrieval, segmentation, attention, saliency, labelling, etc.), and can be applied to a wide range of signal types (images, video, audio, biological data, etc.) We show a few such examples.
The biological function of proteins is dependent, to a large extent, on their native three dimensional conformation. Thus, it is important to know the structure of as many proteins as possible. Since experimental meth...
详细信息
The biological function of proteins is dependent, to a large extent, on their native three dimensional conformation. Thus, it is important to know the structure of as many proteins as possible. Since experimental methods for structure determination are very tedious, there is a significant effort to calculate the structure of a protein from its linear sequence. Direct methods of calculating structure from sequence are not available yet. Thus, an indirect approach to predict the conformation of protein, called threading, is discussed. In this approach, known structures are used as constraints, to restrict the search for the native conformation. Threading requires finding good alignments between a sequence and a structure, which is a major computational challenge and a practical bottleneck in applying threading procedures. The Genetic Algorithm paradigm, an efficient search method that is based on evolutionary ideas, is used to perform sequence to structure alignments. A proper representation is discussed in which genetic operators can be effectively implemented. The algorithm performance is tested for a set of six sequence/structure pairs. The effects of changing operators and parameters are explored and analyzed.
Broadcast is an efficient and scalable technique for disseminating data over wireless channels to an arbitrary large number of clients. The prime objective of broadcast schedules, both on-line and off-line, is to mini...
详细信息
This ground-breaking text/reference divergesfrom the traditional view that computer vision (for image analysis) and stringprocessing (for text mining) are separate and unrelated fields of study,propounding that images...
详细信息
ISBN:
(数字)9783319303673
ISBN:
(纸本)9783319303659;9783319807911
This ground-breaking text/reference diverges
from the traditional view that computer vision (for image analysis) and string
processing (for text mining) are separate and unrelated fields of study,
propounding that images and text can be treated in a similar manner for the
purposes of information retrieval, extraction and classification. Highlighting
the benefits of knowledge transfer between the two disciplines, the text
presents a range of novel similarity-based learning (SBL) techniques founded on
this approach. Topics and features: describes a variety of SBL approaches,
including nearest neighbor models, local learning, kernel methods, and
clustering algorithms; presents a nearest neighbor model based on a novel
dissimilarity for images; discusses a novel kernel for (visual) word
histograms, as well as several kernels based on a pyramid representation; introduces
an approach based on string kernels for native language identification; contains
links for downloading relevant open source code.
In this paper, we propose efficient and practical data-driven methods for weather forecasts. We exploit the information brought by historical weather datasets to build machine-learning-based models. These models are e...
详细信息
An important aspect of Web navigation systems is to maintain the users sense of orientation and facilitate navigation within the context of the total information space. Most navigation systems (or browsers) display pa...
详细信息
A common problem that faces many high-tech electronic product companies is how to effectively provide systems support for their products/machines/systems installed at various customer sites using different levels of t...
详细信息
A common problem that faces many high-tech electronic product companies is how to effectively provide systems support for their products/machines/systems installed at various customer sites using different levels of technical personnel. The problem can be viewed as a model with multiple level servers and multiple volume demands. In this paper, a semi-Markov decision process with average criterion has been employed to formulate the dynamics of the system. Optimal policies for human resource allocation decision with minimum costs have been derived and the loss rate for customer requests has been considered. We prove that the embedding Markov chain is ergodic, induced by any stationary deterministic policy. We obtain some related parameters which can answer questions from managers. We also provide some numerical examples.
In »hot potato» packet routing problems, packets need to be routed to their respective destinations on a network. At each time step, each communication link can be traversed by at most one packet. Packets mu...
暂无评论