Game theory is applied to studying the P2P resource allocation technologies further in this paper. The mechanism of P2P resource pricing, which shows the relation of supply and demand, was presented based on bidding. ...
详细信息
ISBN:
(纸本)9781427629807
Game theory is applied to studying the P2P resource allocation technologies further in this paper. The mechanism of P2P resource pricing, which shows the relation of supply and demand, was presented based on bidding. Subsequently, we designed the utility function of end system and proved the existence and uniqueness of Nash Equilibrium in P2P resource allocation game. At last, we present a P2P resource allocation algorithm (PRANG) based on the resource allocation game model. The results of experiment and simulation show that PRANG algorithm can provide references for the quantity of resource that users demand and regularize the users' bids. Consequently, the allocation of the whole P2P resource tends to be more reasonable.
recently, intelligent home instruments developed fast and have been deployed widely while a crucial problem of how dealing the left devices and properties come up to the top of the water. This paper presents a remote ...
详细信息
in high-voltage substations, poor contacts at the junctions of contacts can generate heat leading to high temperature, arc and fire disaster in serious condition. In this paper, we present a remote temperature monitor...
详细信息
In this paper, we propose a new operator for revising ABoxes in DL-Lite ontologies. We present a graph-based algorithm for ABox revision in DL-Lite, which implements the revision operator and we show it runs in polyno...
详细信息
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i...
详细信息
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas...
详细信息
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications .
A miniature fiber-coupler-based microfluidic system is proposed for trapping of DNA biomolecules. The loop-shaped fiber-coupler is fabricated by using flame tapering technique and integrated in a microfluidic channel....
详细信息
A miniature fiber-coupler-based microfluidic system is proposed for trapping of DNA biomolecules. The loop-shaped fiber-coupler is fabricated by using flame tapering technique and integrated in a microfluidic channel. Probe-DNA immobilized on the fiber-coupler surface enables specific recognition of target DNA sequences and effectively facilitates the trapping of target DNA molecules. The binding characteristics of biomolecules on the fiber-coupler surface have been theoretically analyzed and experimentally demonstrated. Experimental results indicate that the spectral response of the loop-shaped fiber coupler immobilized with probe DNA exhibits a red-shift with the trapping of the DNA biomolecules. The proposed microfluidic system possesses such desirable merits as simple structure, label-free method and high integration, which make it a promising candidate for applications in molecular biology and related bioengineering areas.
The paper makes two contributions to the study of A/V streaming service: (1) introduces a service management mechanism for monitoring and controlling resource utilities to enhance quality of service guarantees;(2) imp...
详细信息
The paper makes two contributions to the study of A/V streaming service: (1) introduces a service management mechanism for monitoring and controlling resource utilities to enhance quality of service guarantees;(2) improves the security of A/V streaming service and reduces the complexity of encryption computations by applying CORBA security services in conjunction of the wavelet compression and encryption technology for multimedia data. An improved CORBA A/V streaming service prototype is implemented based on ORBUS which is a real-time CORBA ORB, and its application in networked manufacturing system is also discussed.
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(W...
详细信息
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes’ reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes’ reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual...
详细信息
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual-functional radar-communication base station detects a malicious radar target nearby and communicates with multiple legitimate users on the other side of the STAR-RIS. We utilize an integrated architecture that combines the fully-connected(FC)-RIS, an emerging type of beyond-diagonal(BD)-RIS, with the time-switching(TS)-STAR-RIS to enhance both the sensing and communications at the cost of possible target intercepting and propose the simultaneous-transmitting-and-reflecting fully-connected RIS(STAR-FCR) schemes to strike a balance between sensing and communications performance. Thereafter, observing the security-reliability performance tradeoff of the downlink ISAMC, we conduct closed-form analyses to compare COPs of round-robin scheduling(RS) and multiuser scheduling(MS) with the aid of a TS-based STAR-FC-RIS. Furthermore, we derive closed-form expressions of the sensing outage probability, communications outage probability(COP), and communications intercept probability, where an average of the three probabilities is exploited to obtain an optimized time allocation(OTA) of the *** results verify that the STAR-FCR-MS scheme outperforms the STAR-FCR-RS scheme in terms of sensing reliability and communications security. Moreover, an OTA remarkably enhances the overall performance of the STAR-FCR schemes of ISAMC systems.
暂无评论