Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are to solve portability problems instead of rational sharing between different users who are not family members. In this work, we propose an initial step toward this rational sharing and present a general sharing model based on proxy re-encryption. Our model can support the flexible sharing mechanism, with which the user can choose any of the purchased content to share with any legal device, and the content provider can know and limit the number of sharing devices to achieve some novel DRM policies such as pay-per-sharing. To our best knowledge, our sharing model is the first model for content sharing between different users' devices who are not family members using proxy re-encryption. With rational applications, our model can benefit for both the user and content provider to achieve win-win development.
The algorithms in this paper exploit optimal input structure in interference networks and is a major advance from the state-of-the-art. Optimization under multiple linear constraints is important for interference netw...
详细信息
ISBN:
(纸本)9781457705960
The algorithms in this paper exploit optimal input structure in interference networks and is a major advance from the state-of-the-art. Optimization under multiple linear constraints is important for interference networks with individual power constraints, per-antenna power constraints, and/or interference constraints as in cognitive radios. While for single-user MIMO channel transmitter optimization, no one uses general purpose optimization algorithms such as steepest ascent because water-filling is optimal and much simpler, this is not true for MIMO multiaccess channels (MAC), broadcast channels (BC), and the non-convex optimization of interference networks because the traditional water-filling is far from optimal for networks. We recently found the right form of water-filling, polite water-filling, for some capacity/achievable regions of the general MIMO interference networks, named B-MAC networks, which include BC, MAC, interference channels, X networks, and most practical wireless networks as special cases. In this paper, we use weighted sum-rate maximization under multiple linear constraints in interference tree networks, a natural extension of MAC and BC, as an example to show how to design highly efficiency and low complexity algorithms. Several times faster convergence speed and orders of magnitude higher accuracy than the state-of-the-art are demonstrated by numerical examples.
Ternary perfect sequences, which include the binary perfect sequences as special cases, are introduced. The new notions of elementary transformations on ternary perfect sequences are brought forward. Necessary conditi...
详细信息
Ternary perfect sequences, which include the binary perfect sequences as special cases, are introduced. The new notions of elementary transformations on ternary perfect sequences are brought forward. Necessary conditions for ternary perfect sequences with k zero elements are proposed. It is proved that there exist no ternary perfect sequences of even lengths with one zero element, and no ternary perfect sequences of odd lengths with two zero elements. It is also proved that there exist no ternary perfect sequences of any length with two adjacent zero elements. An efficient search algorithm for ternary perfect sequences is given.
The paper proposes an improved algorithm on color image enhancement in Discrete Cosine Transform (DCT) domain, which is based on histogram equalization of the DC images composed of the DC coefficients of Y component i...
详细信息
Fuzzy entropy clustering (FEC) is sensitive to noises the same as fuzzy c-means (FCM) clustering because the probabilistic constraints in their memberships. To solve this noise sensitive problem of FCM, Krishnapuram a...
详细信息
Fuzzy entropy clustering (FEC) is sensitive to noises the same as fuzzy c-means (FCM) clustering because the probabilistic constraints in their memberships. To solve this noise sensitive problem of FCM, Krishnapuram and Keller have presented the possibilistic c-means (PCM) clustering by abandoning the constraints of FCM. A possibilistic type of fuzzy entropy clustering is proposed based on fuzzy entropy clustering and possibilistic c-means clustering. The proposed algorithm deals with noisy data better than FEC. Furthermore, the parameters of PCM is optimized using possibilistic clustering trick. Our experiments show that FEC is sensitive to noises while our proposed algorithm is insensitive to noises and has better clustering accuracy than FEC.
Interference alignment (IA) has been well recognized as a promising technique to obtain a large multiplexing gain in multiple input multiple output (MIMO) interference channels. However, most of the existing IA scheme...
详细信息
ISBN:
(纸本)9781467303217
Interference alignment (IA) has been well recognized as a promising technique to obtain a large multiplexing gain in multiple input multiple output (MIMO) interference channels. However, most of the existing IA schemes require global channel state information (CSI) at the transmitter to design precoding vectors, which causes a large amount of feedback bits. To reduce the feedback overhead, in this paper, we model the evolution and dynamic behavior of the CSI feedback rate control problem using the evolutionary game theory over orthogonal feedback channels with a total bandwidth constraint. The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate, subject to an overall bandwidth constraint. Then, an algorithm for the implementation of the evolution process is also presented. The proposed game-theoretic framework for modeling the interactions among the feedback of multiple users can be used to efficiently control the CSI feedback amount while achieving fairness among all the mobile receivers.
Based on some special advantages of variable precision rough sets model and co-evolutionary particle swarm algorithm, a novel concept lattice mining algorithm (REVPT)using rough entropy with variable precision thresho...
详细信息
Based on some special advantages of variable precision rough sets model and co-evolutionary particle swarm algorithm, a novel concept lattice mining algorithm (REVPT)using rough entropy with variable precision thresholding and co-evolution was proposed to solve some optimization problems of the concept lattice mining. In this algorithm, variable precision rough entropy was used to scale the subpopulations of various concept lattices dynamically, and rough approximation lattices constructed. The global optimization efficiency of concept lattices was improved by sharing search experiences among different populations, which can reduce the scale of the former concept lattices, and deduce the consistent decision rule sets efficiently. The experimental results show that the proposed algorithm is better on the convergence and lattice optimization when the variable precision thresholding β is at a certain appropriate range. Therefore it is of robustness on the rules mining accuracy and efficiency.
A new texture image segmentation algorithm based on hidden Markov tree model (HMT) in the contourlet domain with a modified context scheme is proposed. The dependencies of contourlet coefficients are modeled as HMT, w...
详细信息
Migrating existing Web applications toward SaaS (software-as-a-service) applications can reuse the legacy software assets and cut down the re-development cost and risk. However, it lacked generic migration approaches ...
详细信息
Migrating existing Web applications toward SaaS (software-as-a-service) applications can reuse the legacy software assets and cut down the re-development cost and risk. However, it lacked generic migration approaches and tools. A generic approach was proposed to quickly enable existing Web applications to be multi-tenant based on the data middleware. It introduced the multi-tenancy at a minimum revision of the original application. This approach is transparent and loosely coupled for the application layer.
暂无评论