Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a *** such environments,sensor networks are subject to node *...
详细信息
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a *** such environments,sensor networks are subject to node *** energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the *** this paper,an authenticated dynamic key management scheme,ADKM has been *** provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor *** employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for *** of security and performance demonstrate that ADKM is efficient in security of sensor networks.
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption so...
详细信息
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption solution, which is one of the most efficient, provably-secure schemes proposed to date. Our scheme admits provable security in the random oracle model under the bilinear Diffie-Hellman assumption using the definitions proposed by Boyen and it is also forward secure.
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. M...
详细信息
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. Most such systems assume benign fault model which can't depict the malicious actions. The goal of Byzantine Fault Tolerance protocol (BFT for short) is to mask the malicious behaviors and it has been proved that some new proposed BFTs are suitable to support practical applications. But these BFTs still lack in robustness, a simple fault injection may cause significantly decrease in throughput or run in low throughput without violating the BFT safety property. We propose a new robustness-oriented BFT named Nova. Experiments show Nova has comparable throughput as PBFT in normal case and behave stably under the malicious attack. Compared with other BFTs, Nova can support practical applications more effectively.
Aimed at the excellence and shortcoming of the standard median filtering algorithm and the adaptive median filtering algorithm as well as center weighted median filtering algorithm, a new adaptive weighted median filt...
详细信息
The sparse property of the signal to be processed is very important and directly affects the efficiency of compressive sensing. A signal pre-processing method suitable for compressive sensing is given, which is helpfu...
详细信息
The sparse property of the signal to be processed is very important and directly affects the efficiency of compressive sensing. A signal pre-processing method suitable for compressive sensing is given, which is helpful to effective sensing and accurate reconstruction. Under the condition that the sparse characteristic of the signal is unknown, a frequency modulation pattern is introduced to pre-process the signal to increase the sparse proportion of the signal. Then we choose a difference matrix as the reconstruction matrix, the signal could be reconstructed accurately in the process of sparse reconstruction. Theoretical analysis and experimental results show that the proposed pre-processing method for compressive sensing is very effective and efficient.
In this paper, a novel platform-specific executable business model called xBM is proposed to sufficiently represent the business logic process. The metamodel of xBM have been analysed, formalised and illustrated. Trad...
详细信息
In this paper, a novel platform-specific executable business model called xBM is proposed to sufficiently represent the business logic process. The metamodel of xBM have been analysed, formalised and illustrated. Traditional version control idea based on the copy-modify-merge approach is also applied in xBM. Moreover, our approach for model development approach based on xBM is presented for generic web applications. Finally a case study of simplified Provincial Excellent Academic Degree Thesis Review System is demonstrated how to build xBMs and transform them into the final system.
In this paper we have developed a discriminative word alignment method using the liner CRF model for Mongolian-English language pair. Discriminative approaches have the ability to use large variety of features flexibl...
详细信息
In this paper we have developed a discriminative word alignment method using the liner CRF model for Mongolian-English language pair. Discriminative approaches have the ability to use large variety of features flexibly and to combine information from various sources. According to the differences between Mongolian and English, we discuss and select the different features, and experiments on Mongolian-English task demonstrate our word alignment model's superiority in performance over the popular GIZA++.
As a large-scale global parallel file system, Lustre file system plays a key role in High Performance Computing (HPC) system, and the potential performance of such systems can be difficult to predict because the poten...
详细信息
As a large-scale global parallel file system, Lustre file system plays a key role in High Performance Computing (HPC) system, and the potential performance of such systems can be difficult to predict because the potential impact to application performance is not clearly understood. It is important to gain insights into the deliverable Lustre file system IO efficiency. In order to gain a good understanding on what and how to impact the performance of Lustre file system. This paper presents a study on performance evaluation of Lustre file systems and we propose a novel relative performance model to predict overhead under different performance factors. In our previous experiments, we discover that different performance factors have a closed correlation. In order to mining the correlations, we introduce relative performance model to predict performance differences between a pair of Lustre file system equipped with different performance factors. On average, relative model can predict bandwidth within 17%-28%. The results show our relative prediction model can obtain better prediction accuracy.
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because...
详细信息
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because there are multi-phased, multi-sized and interrelated complex chemical and physical reactions during cement hydration. In this paper, a feedforward neural network model is built for predicting the evolution of degree of hydration. In order to reduce the computing time, GPUs are used for acceleration in parallel. Studies have shown that according to the established model, simulation curve of hydration is in good accordance with the observed experimental data.
A lightning prediction model is established to predict the lightning in 24h in Chongqing, the model is based on the character of lightning weather, the advantages of the support vector machine (SVM) method in solving ...
详细信息
暂无评论