Network Coordinate Systems (NCS) allow accurate latency estimation with low measurement overhead. However, NCS are vulnerable to attacks, which makes security issue a crucial concern in their large-scale deployment. T...
详细信息
ISBN:
(纸本)9781849195379
Network Coordinate Systems (NCS) allow accurate latency estimation with low measurement overhead. However, NCS are vulnerable to attacks, which makes security issue a crucial concern in their large-scale deployment. This paper proposes Sniper, a social relationship based defence mechanism for securing NCS. In contrast to prior proposals that allow attacks to occur and then detect them, Sniper can filter out potential malicious nodes before they mount attack. Extensive simulations demonstrate that Sniper can protect NCS against various forms of attacks efficiently and that Sniper can tolerate a large fraction of malicious nodes.
作者:
M. CrostaS. TrilloA. FratalocchiPRIMALIGHT
Faculty of Electrical Engineering Applied Mathematics and Computational Science King Abdullah University of Science and Technology (KAUST) Thuwal 23955-6900 Saudi Arabia Dept. of Physics
Sapienza University of Rome I-00185 Rome Italy Dipartimento di Ingegneria
Università di Ferrara Via Saragat 1 I-44122 Ferrara Italy
We show that the perturbative nonlinearity associated with three-atom interactions, competing with standard two-body repulsive interactions, can change dramatically the evolution of one-dimensional (1D) dispersive sho...
详细信息
We show that the perturbative nonlinearity associated with three-atom interactions, competing with standard two-body repulsive interactions, can change dramatically the evolution of one-dimensional (1D) dispersive shock waves in a Bose-Einstein condensate. In particular, we prove the existence of a rich crossover dynamics, ranging from the formation of multiple shocks regularized by nonlinear oscillations culminating in coexisting dark and antidark matter waves to 1D-soliton collapse. For a given scattering length, all these different regimes can be accessed by varying the density of atoms in the condensate.
Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security definitions for key wrapping schemes. One captures the security against chosen plaintext attacks ...
详细信息
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
In this paper, we introduce a reference model that has compatibility with olfactory information presentation and define metadata for olfactory interaction by analyzing various elements needed in olfactory display tech...
详细信息
ISBN:
(纸本)9781457717666
In this paper, we introduce a reference model that has compatibility with olfactory information presentation and define metadata for olfactory interaction by analyzing various elements needed in olfactory display technology and propose an olfactory interaction model and define metadata for digital information of scent generator and how it can be used. As an application, we designed an interactive virtual space for the multi-purpose hall in Song-Do Future City located in Incheon, Korea.
Latent force models (LFMs) are hybrid models combining mechanistic principles with non-parametric components. In this article, we shall show how LFMs can be equivalently formulated and solved using the state variable ...
详细信息
Latent force models (LFMs) are hybrid models combining mechanistic principles with non-parametric components. In this article, we shall show how LFMs can be equivalently formulated and solved using the state variable approach. We shall also show how the Gaussian process prior used in LFMs can be equivalently formulated as a linear statespace model driven by a white noise process and how inference on the resulting model can be efficiently implemented using Kalman filter and smoother. Then we shall show how the recently proposed switching LFM can be reformulated using the state variable approach, and how we can construct a probabilistic model for the switches by formulating a similar switching LFM as a switching linear dynamic system (SLDS). We illustrate the performance of the proposed methodology in simulated scenarios and apply it to inferring the switching points in GPS data collected from car movement data in urban environment.
The next generation power system based on IEC 61850 is operated by exchanging information, which is modeled and standardized with components of power utility system. Thanks to the defined and standardized data and inf...
详细信息
The performance of computationally intensive scientific applications on the underlying system can be maximized by providing application-level load balancing of loop iterates via the use of dynamic loop scheduling (DLS...
详细信息
Processes in rarefied gases are accurately described by the Boltzmann equation. The solution of the Boltzmann equation using direct numerical methods and direct simulation Monte Carlo methods (DSMC) is very time consu...
Processes in rarefied gases are accurately described by the Boltzmann equation. The solution of the Boltzmann equation using direct numerical methods and direct simulation Monte Carlo methods (DSMC) is very time consuming. An alternative approach can be obtained by using moment equations, which allow the calculation of processes in the transition regime at reduced computational cost. In the current work, a finite volume method is developed for the solution of these moment equations. The numerical scheme is based on kinetic schemes, similar to those developed for the Euler and Navier-Stokes equations by Deshpande (1986), Perthame (1990), Xu et al. (2005), Le Tallec and Perlat (1998), and others.
暂无评论