Mention detection is the first and a key stage in most of coreference resolution systems. Singleton mentions are the ones which appear only once and are not mentioned in the following texts. Singleton mentions always ...
详细信息
We propose an alternative Redundant array of independent disks(RAID) data layout, Asymmetrical grouping data organization(AGDO), for object-based data de-duplication backup system. Object-based data deduplication is a...
详细信息
We propose an alternative Redundant array of independent disks(RAID) data layout, Asymmetrical grouping data organization(AGDO), for object-based data de-duplication backup system. Object-based data deduplication is an effective solution for detecting duplicate data for compound files. We designed an asymmetrical grouping strategy, the disk in the array are partitioned into different groups, and in each group parallelism data access scheme is adopted, different types of objects are stored in different groups with maybe different group size, it can set and manage dynamic group size by using dynamic disk group adjustment algorithms. The performance of AGDO is evaluated and proved to be sufficient for the continuous storage application. The result is that disk accesses are concentrated in a part of the disks over a long time period and reduces the power consumption to 25% in a 10-disk configuration. Moreover, object-based de-duplication combined with AGDO has great potential in increasing data restoration speed for compound files. We have shown that this combination makes average restoration speed improved 11%.
with the rapid development of visualization,network visualization has become an important branch,which is applied in many aspects of life such as business,education and virtual *** existed network visualization system...
详细信息
ISBN:
(纸本)9781510820524
with the rapid development of visualization,network visualization has become an important branch,which is applied in many aspects of life such as business,education and virtual *** existed network visualization systems are based on small volume and static *** with the incessant expansion of modern internet scale,traditional tools' practicality *** huge information of network clearly and effectively will be of great *** our paper,large-scale network topology visualization system is finished by using Web 3D technique—*** in process of building and analysis,which can display topology *** middleware,*** can transfer communication data forward or backward instantaneously,which can solve the problem of dynamic and real-time 3D ***-Webkit framework helps realize its cross-platform *** solution can run smoothly and clearly under the 103 order of magnitudes network *** makes large scale network visualization more direct and convenient.
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network e...
详细信息
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network environment. This paper proposes a novel approach for designing a cross-domain group PAKE protocol, that primarily handles with the setting of multi-participant in the multi- domain. Moreover, our protocol is proved secure against active adversary in the Real-or-Random (ROR) model. In our protocol, no interaction occurs between any two domain authentication servers. They are regarded as ephemeral certificate authorities (CAs) to certify key materials that participants might subsequently use to exchange and agree on group session key. We further justify the computational complexity and measure the average computation time of our protocol. To the best of our knowledge, this is the first work to analyze and discuss a provably secure multi-participant cross-domain group PAKE protocol.
Modeling and simulation has received significant attention over the years for its ability to understand and transform real world systems. With the increasing of complexity and scale of the simulated systems, more comp...
详细信息
ISBN:
(纸本)9781509035069
Modeling and simulation has received significant attention over the years for its ability to understand and transform real world systems. With the increasing of complexity and scale of the simulated systems, more computational power is required. Parallel discrete event simulation(PDES) is an important technology to integrate parallel computing into modeling and simulation. Time synchronization algorithm is the core of PDES, which determines the correctness and efficiency of the simulation. Traditional conservative synchronization algorithms, such as Chandy-Misra-Bryant(CMB) null message algorithm, use null message to synchronize the state and avoid deadlock among logical processes(LPs). But hybrid simulation systems contains both continuous models and discrete models, continuously changing states is typically modeled using time steps in hybrid simulation system. Therefore, hybrid systems with large disparity in time step are very common in real simulation systems. However, current conservative synchronization algorithm has not been fully investigated for this type of simulation systems and will generate massive synchronization messages. This paper proposed an enhanced null message algorithm for hybrid simulation systems with large disparity in time step. It extended the CMB algorithm by adding simulation time in null message request messages. This could significantly reduce the number of synchronization messages. Experimental results showed that our synchronization algorithm outperforms the CMB algorithm by reducing a great number of synchronization messages.
Layered SSD/HDD hybrid storage system has been widely used. However, most traditional designs are performance oriented, and not optimized for SSD lifespan. In this paper, SSD lifespan oriented layered model and cache ...
详细信息
Tag Authentication is an essential issue in RFID system which is wildly applied in many areas. Compared to the per-tag-based authentication, the batch-mode authentication has better performance for complex application...
详细信息
Tag Authentication is an essential issue in RFID system which is wildly applied in many areas. Compared to the per-tag-based authentication, the batch-mode authentication has better performance for complex applications. However, many existing batch authentication protocols suffer from security and privacy threats, low efficiency problem or high communication and computation cost. In order to solve these problems better, we propose a new RFID batch authentication protocol. In this protocol, tags are grouped and each key in one group shares the same group key. The connection between the group key and the tag's own key is fully utilized to construct our batch authentication protocol. Meanwhile, based on the proposed batch authentication protocol, we propose a group tags ownership transfer protocol which also supports the tag authorisation recovery. Compared with previous schemes, our scheme achieves stronger security and higher efficiency. In the side of security and privacy, our scheme meets most requirements, such as tag information privacy, forward/backward security, resistance against reply, tracking, and Dos attacks. Then we carry on the theoretical analysis and implement the simulation experiment. Both of them indicate that the performance of our scheme is much efficient than other authentication schemes. Particularly, the simulation results show that the run time of the whole authentication process in our scheme is decreased 20% at least compared with the other existing schemes.
作者:
Huijie ChenFan LiYu WangSchool of Computer Science
Beijing Institute of Technology Beijing Engineering Research Center for High Volume Language Information Processing and Cloud Computing Applications Beijing China Department of Computer Science
College of Computing and Informatics University of North Carolina at Charlotte Charlotte NC USA
Hand tracking systems are becoming increasingly popular as a fundamental HCI approach. The trajectory of moving hand can be estimated through smoothing the position coordinates collected from continuous localization. ...
详细信息
ISBN:
(纸本)9781509028245
Hand tracking systems are becoming increasingly popular as a fundamental HCI approach. The trajectory of moving hand can be estimated through smoothing the position coordinates collected from continuous localization. Therefore, hand localization is a key component of any hand tracking systems. This paper presents EchoLoc, which locates the human hand by leveraging the speaker array in Commercial Off-The-Shelf (COTS) devices (i.e., a smart phone plugged with a stereo speaker). EchoLoc measures the distance from the hand to the speaker array via the Time Of Flight (TOF) of the chirp. The speaker array and hand yield a unique triangle, therefore, the hand can be localized with triangular geometry. We prototype EchoLoc on iOS as an application, and find it is capable of localization with the average resolution within five centimeters of 73% and three centimeters of 48%.
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they p...
详细信息
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they presented a privacy-preserving multi-players grouping-proof protocol based on the elliptic curve cryptography(ECC), and claimed their protocol have the ability to resist five potential attacks, including compromised tag attack, man-in-the-middle attack, colluding tags attack, etc. In this paper, we first take a counterexample to demonstrate their protocol is vulnerable to compromised tag attack. Then we propose a novel secure RFID authentication protocol, and analyze its security by merging formal analysis, provable security, and mathematical inductive method, so as to solve the weakness of Batina and Lee's work. Furthermore, compared with another two classic protocols(secure ownership transfer protocol(SOTP) and secure multiple group ownership transfer protocol(SMGOTP)), the performance analysis show that our protocol provides not only a lower tags' communication cost at about 50.0% and 14.3%, but also a lower reader's computation cost(approximate 14.5% and 55.1% respectively), when transferring a large number of tags.
With the prosperity of network applications, traffic classification serves as a crucial role in network management and malicious attack detection. The widely used encryption transmission protocols, such as the Secure ...
详细信息
With the prosperity of network applications, traffic classification serves as a crucial role in network management and malicious attack detection. The widely used encryption transmission protocols, such as the Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols, leads to the failure of traditional payload-based classification methods. Existing methods for encrypted traffic classification suffer from low accuracy. In this paper, we propose a certificate-aware encrypted traffic classification method based on the Second-Order Markov Chain. We start by exploring reasons why existing methods not perform well, and make a novel observation that certificate packet length in SSL/TLS sessions contributes to application discrimination. To increase the diversity of application fingerprints, we develop a new model by incorporating the certificate packet length clustering into the Second-Order homogeneous Markov chains. Extensive evaluation results show that the proposed method lead to a 30% improvement on average compared with the state-of-the-art method, in terms of classification accuracy.
暂无评论