The problem of recovering sparse and low-rank matrices from a given matrix captures many applications. However, this recovery problem is NP-hard and thus not tractable in general. Recently, it has been shown that this...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in wirelesssensornetworks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forwa...
详细信息
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forward a new algorithm for LTE multicast downlink scheduling called the Energy-saving based Inter-group Proportional Fair(EIPF).The basic idea of EIPF is to calculate an appropriate transmitting power for each group according to its data rate respectively,and then follow the inter-group proportional fair principle to allocate RBs among multicast *** results of EIPF simulation show that the proposed algorithm not only can reduce the transmit power of BS effectively but also improve the utilization rate of energy.
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co...
详细信息
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.
In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-de...
详细信息
In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-device-independent quantum key distribution, comparing their performance with the cases of using other existing sources, e.g., the weak coherent source or the heralded single-photon source, and giving out corresponding numerical simulations. Our simulation results show that in both protocols the single-photon-added coherent source can greatly exceed all other existing sources. Moreover, even when taking statistical fluctuation into account, a high key generation rate can still be achieved at long distance by applying this source.
With the continuous development of the converged network, the types of equipment increase and each has different device identification. The existing SNMPv3 program by using enginelD to identify equipment's legal s...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
A new object tracking scheme for multi-camera surveillance with non-overlapping views is proposed in this paper. Brightness transfer function (BTF) is used to establish relative appearance correspondence between diffe...
详细信息
With the explosive growth of web services, the research on how to rapidly find the desired services becomes increasingly important and challenging. In this paper, we focus on non-semantic web services discovery and pr...
详细信息
Trust information search algorithm is one of the most important components of P2P trust model. Considering the large number of nodes and the wide range of information each node contains in P2P network, efficient searc...
详细信息
暂无评论