To overcome the drawback that switched Ethernet does not guarantee the timely delivery of real-time messages in industrial communication, an improved FTT (flexible time-triggered communication) paradigm was proposed f...
详细信息
ISBN:
(纸本)9781424447374;9781424447541
To overcome the drawback that switched Ethernet does not guarantee the timely delivery of real-time messages in industrial communication, an improved FTT (flexible time-triggered communication) paradigm was proposed for hard real-time communications of periodic messages on switched Ethernet. In addition, an optimization condition for feasibility check of periodic messages was given. Particularly, we proposed an EDF-based algorithm to schedule periodic messages to be transmitted within their deadlines over COTS switched Ethernet running in the cut-through mode. Simulation results showed the advantages of the proposed real-time scheduling algorithm in terms of using the aggregated switch throughput.
The differential fault attack is a kind of side channel attacks. This paper proposes a differential fault analysis on the AES key schedule and shows how an entire 128-bit AES key can be retrieved. In the workshop at F...
详细信息
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of ...
详细信息
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of some sensors. To detect these holes is of great importance to both WSN applications and networking functionalities. Holes are described by a set of sensor nodes on their boundaries. In this paper, we study the problem of identifying boundaries of holes in a WSN. By extracting hidden geometric features in the topology of a WSN, we are able to recognize sensor nodes on both inner and outer boundaries of holes. Methods proposed in this paper relies on neither the knowledge of localization nor the unit-disk communication model. We also propose a distributed algorithm to discover holes and identify nodes on boundaries. Simulation results show that our method works well for WSNs with many inner holes and irregular outer boundaries.
In this paper, we derive an efficient nonlinear feature extraction method from naive Kernel Minimum Squared Error (KMSE) method. The most contribution of the derived method is its feature extraction procedure that is ...
详细信息
To make up the limitation of traditional secret sharing schemes that the length of secret can not be extremely great, we use the theory of Jordan matrix factorization and combine with the formulary of Lagrange putting...
详细信息
ISBN:
(纸本)9781424449934
To make up the limitation of traditional secret sharing schemes that the length of secret can not be extremely great, we use the theory of Jordan matrix factorization and combine with the formulary of Lagrange putting forward an algorithm of (r, n) threshold secret sharing with short share and high efficiency. The length of secret share that each participator needs to conserve has no relation with the length of the secret. So our scheme has a very high space, computation and communication efficiency. It has a very important application when the secret is a big privacy file, a big message transmitting in an insecurity channel, a secret data base shared by several participant or magnanimity data in distributed storage.
In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer ...
详细信息
In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer 1 out of k protocol, successfully construct confidential computing protocols of matrix general factorization and QR factorization. On the model of semi-honest, it can meet the confidentiality. At the same time, the method of this protocol is also suitable for confidential computing of matrix other factorizations.
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t...
详细信息
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ...
详细信息
Strong negative association rules can reveal irrelevances hidden between frequent itemsets. Existing research has made significant efforts in discovering both positive and negative association rules from single databa...
详细信息
Strong negative association rules can reveal irrelevances hidden between frequent itemsets. Existing research has made significant efforts in discovering both positive and negative association rules from single database. This paper presents an efficient method for mining strong negative association rules in multi-database. The method produces some strong negative relational patterns (a kind of infrequent itemsets) by pruning and scanning constructed multi-database frequent pattern tree, and extracts strong negative association rules according to the proposed correlation model. The experimental results show the effectiveness and efficiency of the proposed algorithm.
Mining negative association rules in multi-database has attracted more and more attention. Most existing research focuses on unifying all negative rules discovered from different single databases into a single view. T...
详细信息
ISBN:
(纸本)9781424447374;9781424447541
Mining negative association rules in multi-database has attracted more and more attention. Most existing research focuses on unifying all negative rules discovered from different single databases into a single view. This paper presents a novel method for mining global negative association rules in multi-database. This method produces some infrequent itemsets of potential interest by scanning constructed multi-database frequent pattern tree, and extracts negative association rules of interest according to the proposed correlation model from multi-database. Experimental results show the effectiveness and efficiency of the proposed algorithm.
暂无评论