The increase in popularity of online services has generated interest in developing new algorithms to better protect user privacy. Some services defend individual user records by only releasing statistics like the numb...
详细信息
ISBN:
(纸本)9781467361149
The increase in popularity of online services has generated interest in developing new algorithms to better protect user privacy. Some services defend individual user records by only releasing statistics like the number of users that match certain criteria. If an attacker has access to side information, releasing such summaries can lead to privacy breaches where the records of a certain user are revealed. Differential privacy is a new technique which protects individual user records by altering the released statistics. Many services organize their data as a graph with the edge weights representing statistics. If such services are interested in releasing the information, they must do so in a privacy-preserving manner. We analyze how differential privacy can be used to protect such graph structures. We assess the quality of the released data in relation to the Dijkstra shortest path algorithm. Finally, we propose research directions to improve the performance of the released data.
The pipe programming paradigm is an important Unix innovation which lets processes filter data to obtain a desired output. Extending computation in an Internet distributed environment has led us to design so called lo...
详细信息
ISBN:
(纸本)9781467361408
The pipe programming paradigm is an important Unix innovation which lets processes filter data to obtain a desired output. Extending computation in an Internet distributed environment has led us to design so called long and large pipes which achieve high speed transfer rates between remotely interconnected processes. Our method combines, in a full-fledged client/server application, the use of classical pipes, as a mean of serializing data locally, with multiple parallel TCP connections which yield high bandwidth throughput. The application, called bbftpPRO, brings together the old fashioned techniques of file striping with the new data streaming algorithms at high transfer rates. It includes capabilities for easy traversal of networks protected by firewalls or NAT machines, split-TCP like path support, and last but not least, support for new transmission procedures at variable rate, adapted for multipath implementation at application level. Experimental results have proven the superiority of the proposed data transfer system. Both simple file transfers and arbitrary data streaming were done effectively, efficiently, in parallel, over wide area networks, between pairs of distributed processes connected via extended fast pipes. Our piped approach proved to be portable across heterogeneous systems and most suitable for data intensive computing applications requiring geographically distributed data.
For a class of multi-robot task allocation problems, a theoretical solution and its real time implementation are discussed in this work. The basic problem requires a team of mobile robots to gather randomly spread sam...
详细信息
For a class of multi-robot task allocation problems, a theoretical solution and its real time implementation are discussed in this work. The basic problem requires a team of mobile robots to gather randomly spread samples from an environment and deposit them to a storage facility. The proposed solution considers the environment as being abstracted to a weighted graph and randomly distributed samples in the nodes of this graph. Using a setup consisting of a platform on which mobile robots can move, a computer that controls the robots and an overhead camera that closes the loop between these devices, the real time implementation of the theoretical solution is tested. Experimental results of various sample distributions are conducted and the performance of the entire method is discussed.
The paper presents studies on the improvement and development of cooperation methods for cost optimization in power supply systems using polygeneration technology. A support for cooperating operators, which are respon...
详细信息
The Project is a three devices Microsoft Kinect, Mobile Lego NXT Robot integrated system - and computer. These are controlled in a single application which enables the user to control the NXT Robot remotely by trackin...
详细信息
The Project is a three devices Microsoft Kinect, Mobile Lego NXT Robot integrated system - and computer. These are controlled in a single application which enables the user to control the NXT Robot remotely by tracking calibration using voice commands.
This paper presents the main challenges in a cloud computing architecture relate to the security of the provided services. In the introduction section are described the factors that prove the cloud computing necessity...
详细信息
This paper presents the main challenges in a cloud computing architecture relate to the security of the provided services. In the introduction section are described the factors that prove the cloud computing necessity in the actual IT context. In order to achieve all these benefits, the enterprises experience stated an approach that ensures a smooth migration with optimal results. The first section ends with a synthesized process that explains the main steps that must be performed to move from traditional architecture to cloud computing services. When moving to on-demand services, the consumer can choose one of the available “flavors” of cloud computing services - these are described in Section 2. Despite all obvious advantages and benefits, there are also security challenges in cloud computing architecture structured by Cloud Security Alliance in [1]. The main security domains are mentioned in the third section while the forth section describes our approach that addresses the challenges in the communication between the on-premise and on-demand services.
This paper proposes a modern approach for the methodology that supports the measure the audience for outdoor poster advertising. The classic approach of conducting complex, limited and expensive studies about human da...
详细信息
This paper proposes a modern approach for the methodology that supports the measure the audience for outdoor poster advertising. The classic approach of conducting complex, limited and expensive studies about human daily routes, related just to a limited type of advertising poster may be enriched using the data that resides in the monitoring infrastructure of the cellular telecom operators over digital maps. Well segmented, this kind of data may reveal important features of the population activity at a large scale. Finally, the fine tuning options in analyzing this kind of data are discussed for future improvements.
In the constantly evolving smart building context, an important aspect to address is devices and applications interoperability. The FCINT project provides a service-oriented management framework for smart building fac...
详细信息
ISBN:
(纸本)9781467361408
In the constantly evolving smart building context, an important aspect to address is devices and applications interoperability. The FCINT project provides a service-oriented management framework for smart building facilities through the use of ontologies, intelligent controllers and a Web-based portal. The alarms system presented in this paper is part of the effort to provide a proper framework for enhancing devices and services interoperability in smart buildings environment. Users will benefit of increased comfort, since actions can be taken as soon as an alarm occurs. Alarm conditions and policies can be easily customized and adapted to different scenarios, such as providing support to elderly people or monitoring patients with various medical conditions in their smart home environments. The alarms service provides real time feedback, thus allowing immediate action to be taken.
Operating wind turbines produce infrasound noise thus they act on the environment. This also applies to small wind turbines, which are located in the immediate vicinity of human settlements. Small wind turbines can be...
详细信息
ISBN:
(纸本)9781467330602
Operating wind turbines produce infrasound noise thus they act on the environment. This also applies to small wind turbines, which are located in the immediate vicinity of human settlements. Small wind turbines can be located close to buildings and mounted directly on their walls and roofs. In this case, it is important to determine the level of environmental impact of such type of installation. Measurement results of infrasound noise generated by a small vertical axis wind turbine (VAWT), rated power 1 kW, are presented in the paper. Analysis results of sound pressure level and dependence of signal spectra from different wind speeds are shown. In the analysis of sound pressure level the G weighing curve was used according to the ISO 7196:2002 standard and achieved results were referred to the limits contained in the current legislation, what allowed for evaluation of the infrasound noise impact of the turbine under study.
In the field of industrial control, the numerical devices are widely used. There are more issues that can affect the precision of the numerical control and it can induce significant errors in the control structure. Th...
详细信息
In the field of industrial control, the numerical devices are widely used. There are more issues that can affect the precision of the numerical control and it can induce significant errors in the control structure. These issues, discussed in this article, are: the discretization methods used to elaborate the discrete control algorithms, the value of the sampling rate, the numerical error representation in the computing devices and the quantization error. In this paper we try to make an analysis of these errors and to propose methods that can provide error reduction.
暂无评论