Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the constructio...
详细信息
Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the construction of high-security quantum information networks. We propose a scheme to implement MDI-QKD, but with continuous variables instead of discrete ones, i.e., with the source of Gaussian-modulated coherent states, based on the principle of continuous-variable entanglement swapping. This protocol not only can be implemented with current telecom components but also has high key rates compared to its discrete counterpart; thus it will be highly compatible with quantum networks.
Petri nets are widely used to model flexible manufacturing systems (FMSs) because they can help analyze the properties and synthesize deadlock-free supervisory controllers of FMS. Weighted System of Simple Sequential ...
详细信息
Petri nets are widely used to model flexible manufacturing systems (FMSs) because they can help analyze the properties and synthesize deadlock-free supervisory controllers of FMS. Weighted System of Simple Sequential Processes with Resources (WS 3 PR) is an important subclass of Petri nets that can well model many FMSs. This work first gives new algorithms to check liveness for a WS3PR net via its subnet trees and structure. Then the computation complexity for the proposed method is shown in this paper, to be polynomial under certain limitations. Finally, sufficient conditions for deciding liveness of a WS 3 PR are established. An example is used to illustrate the results.
Cloud computing has demonstrated tremendous capability in a wide spectrum of online services. Virtualization provides an efficient solution to the utilization of modern multicore processor systems while affording sign...
详细信息
Custom Instruction Identification is an important part in the design of efficient Application-Specific Processors (ASIPs). It consists of profiling of a given application to find patterns of basic operations that are ...
详细信息
Custom Instruction Identification is an important part in the design of efficient Application-Specific Processors (ASIPs). It consists of profiling of a given application to find patterns of basic operations that are frequently executed. Operations of such patterns can be implemented together as a single custom instruction to speedup the execution of the application. Because of the problem's high complexity, several methods have been proposed for specific single-issue (RISC) processors and architectures, limiting the shape and size of custom instructions that can actually be identified and, possibly, implemented. In this paper, we propose and discuss an efficient custom instruction set identification method and corresponding automatic tool for multi-issue VLIW ASIPs, which search for the common operation patterns of the most frequently executed basic blocks of a given application, with different sizes and shapes. The speedup results for the custom instructions identified by our tool are provided for a set of benchmark applications. The speedup is up to 68%, with only a few custom instructions used.
The objective of this work is to define and measure cyber resiliency of the “cloud” in a Moving Target Defense (MTD) environment that applies the Software Behavior Encryption (SBE) method. Implementation of SBE has ...
详细信息
The objective of this work is to define and measure cyber resiliency of the “cloud” in a Moving Target Defense (MTD) environment that applies the Software Behavior Encryption (SBE) method. Implementation of SBE has shown to increase vulnerability tolerance in a particular software system by introducing software diversity and redundant version shuffling to obfuscate the system to attackers. With this in mind, this paper nominates attack surface, confidentiality, integrity, availability, and survivability as the critical components of cyber resiliency, and a notional example is provided to demonstrate the components application and aggregation.
Motion blur is caused by the camera shake during the exposure in which the blur kernel describes the trace of shaking. Based on this generating process of the kernel , we observed that the distribution of the kernel o...
详细信息
Among the various isolated inverter topologies for grid connection of the renewable energies, the differentialmode uk inverter has several outstanding features. It has lower number of devices, which are low-side drive...
详细信息
The ability to nondestructively detect the presence of a single, traveling photon has been a long-standing goal in optics, with applications in quantum information and measurement. Realizing such a detector is complic...
详细信息
The ability to nondestructively detect the presence of a single, traveling photon has been a long-standing goal in optics, with applications in quantum information and measurement. Realizing such a detector is complicated by the fact that photon-photon interactions are typically very weak. At microwave frequencies, very strong effective photon-photon interactions in a waveguide have recently been demonstrated. Here we show how this type of interaction can be used to realize a quantum nondemolition measurement of a single propagating microwave photon. The scheme we propose uses a chain of solid-state three-level systems (transmons) cascaded through circulators which suppress photon backscattering. Our theoretical analysis shows that microwave-photon detection with fidelity around 90% can be realized with existing technologies.
A key component of robotic path planning for monitoring dynamic events is reliable navigation to the right place at the right time. For persistent monitoring applications (e.g., over months), marine robots are beginni...
详细信息
ISBN:
(纸本)9781479969357
A key component of robotic path planning for monitoring dynamic events is reliable navigation to the right place at the right time. For persistent monitoring applications (e.g., over months), marine robots are beginning to make use of the environment for propulsion, instead of depending on traditional motors and propellers. These vehicles are able to realize dramatically higher endurance by exploiting wave and wind energy, however the path planning problem becomes difficult as the vehicle speed is no longer directly controllable. In this paper, we examine Gaussian process models to predict the speed of the Wave Glider autonomous surface vehicle from observable environmental parameters. Using training data from an on-board sensor, and wave parameter forecasts from the WAVEWATCH III model, our probabilistic regression models create an effective method for predicting Wave Glider speed for use in a variety of path planning applications.
A compact ultra-wideband (UWB) bandpass filter with an inherent notched band and steep slopes has been presented and implemented with the low temperature cofired ceramic technology. The filter is realized by a stepped...
详细信息
A compact ultra-wideband (UWB) bandpass filter with an inherent notched band and steep slopes has been presented and implemented with the low temperature cofired ceramic technology. The filter is realized by a stepped-impedance T-shaped resonator (SITR) coupled to a pair of quarter-wavelength input/output feed-lines. The proposed SITR can facilitate not only a notched band, but also sharp roll-off characteristics. Measured results agree well with the HFSS simulated results. The whole size of the UWB filter is only 6.0×6.0×1.92 mm 3 .
暂无评论