Cardinality estimation is the process to survey the quantity of tags in a RFID system. Generally, the cardinality is estimated by exchanging information between reader(s) and tags. To ensure the time efficiency and ac...
详细信息
ISBN:
(纸本)9781467375887
Cardinality estimation is the process to survey the quantity of tags in a RFID system. Generally, the cardinality is estimated by exchanging information between reader(s) and tags. To ensure the time efficiency and accuracy of estimation, numerous probability-based approaches have been proposed, most of which follow a similar way of minimizing the number of required time slots from tags to reader. The overall execution time of the estimator, however, is not necessarily minimized. The estimation accuracy of those approaches also largely depends on the repeated rounds, leading to a dilemma of choosing efficiency or accuracy. In this paper, we propose BFCE, a Bloom Filter based Cardinality Estimator, which only needs a constant number of time slots to meet desired estimation accuracy, regardless of the actual tag cardinality. The overall communication overhead is also significantly cut down, as the reader only needs to broadcast a constant number of messages for parameter setting. Results from extensive simulations under various tag IDs distributions shows that BFCE is accurate and highly efficient. In terms of the overall execution time, BFCE is 30 times faster than ZOE and 2 times faster than SRC in average, the two state-of-the-arts estimation approaches.
If the software system is abstracted as a software network, its quality largely depends on the topology structure. A tiny fraction key function nodes play a critical role in improving the stability, reliability and ro...
详细信息
Certain characteristics of software are often hidden in its structure and can only be discovered when the software is executed dynamically. So mining important patterns from dynamic call graph of software plays an imp...
详细信息
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate...
详细信息
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggre- gate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assump- tion.
In order to realize remote consultation,remote diagnosis and remote education,and reduce the difficulty and expense for patients seeing a doctor in developing *** this paper,we proposed a mobile telemedicine system is...
详细信息
In order to realize remote consultation,remote diagnosis and remote education,and reduce the difficulty and expense for patients seeing a doctor in developing *** this paper,we proposed a mobile telemedicine system is based on a cloud platform to store physiology *** the one hand,it based on Body Area network to collect physiological data;On the other hand it is based on Session Description Protocol and adopts Hole Punching,H.264 video codec,RTP/RTCP real-time transport protocol,which achieves P2 P communication from different *** with traditional telemedicine system,it not only achieves P2 P communication between users and doctors but also can get accurate physiological data of users,such as pressure,blood oxygen,ECG,blood *** avoids inaccurate diagnosis results owing to the subjective feeling of users.
Traditionally, analysis of dynamic network has been focused only on a single snapshot or integrated network obtained over a period of time. However, the temporal feature in dynamic network has been ignored. In this pa...
详细信息
The study on signed social networks community detection has been paid more and more attention. Research shows that two-phase signed social networks community detection algorithm can not correctly divide the network. T...
详细信息
Many researchers are devoted to find frequent pattern in static network. Due to these frequent patterns are usually defined as frequent existence patterns which satisfy given support threshold in network. However, the...
详细信息
There are abundant parameters to estimate if training and testing samples are drawn from the different probability distribution in supervised machine learning algorithm setting. Hypothesis transfer learning is a trick...
详细信息
There are abundant parameters to estimate if training and testing samples are drawn from the different probability distribution in supervised machine learning algorithm setting. Hypothesis transfer learning is a trick to get over this limitation in practical engineering, and the source hypotheses trained on a source domain can only be utilized. In this paper, we define the LTO and RO stability hypothesis for hypothesis transfer learning algorithm, and the statistical error is bounded in terms of these stability hypotheses.
Body sensor networks (BSNs) are deployed around the human body to measure and process physiological signals in real time, which have wide application prospects in intelligent healthcare. Physiological signals measured...
详细信息
ISBN:
(纸本)9781479982622
Body sensor networks (BSNs) are deployed around the human body to measure and process physiological signals in real time, which have wide application prospects in intelligent healthcare. Physiological signals measured and processed by BSNs involve individual privacy, thus security mechanisms must be developed to secure BSNs, and therein adoption of key negotiation protocols is fundamental. Due to stringently limited operation resources, BSNs require these protocols to be low-energy and highly efficient. Recent development has discovered that certain physiological signals can be used for efficiently negotiating common keys among biosensor nodes. These signals and fuzzy technology are used to design lightweight key negotiation protocols, and many solutions have been proposed. In this paper, we explore and classify these solutions, and evaluate their performance by analyzing their merits and demerits. Finally, we present open research issues that should be solved in the future.
暂无评论