Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network e...
详细信息
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network environment. This paper proposes a novel approach for designing a cross-domain group PAKE protocol, that primarily handles with the setting of multi-participant in the multi- domain. Moreover, our protocol is proved secure against active adversary in the Real-or-Random (ROR) model. In our protocol, no interaction occurs between any two domain authentication servers. They are regarded as ephemeral certificate authorities (CAs) to certify key materials that participants might subsequently use to exchange and agree on group session key. We further justify the computational complexity and measure the average computation time of our protocol. To the best of our knowledge, this is the first work to analyze and discuss a provably secure multi-participant cross-domain group PAKE protocol.
There is a growing interest in conversation agents and robots which conduct attentive listening. However, the current systems always generate the same or limited forms of backchannels every time, giving a monotonous i...
详细信息
Dennard scaling has ended. Lowering the voltage supply (Vdd) to sub volt levels causes intermittent losses in signal integrity, rendering further scaling (down) no longer acceptable as a means to lower the power requi...
详细信息
ISBN:
(纸本)9781509013715
Dennard scaling has ended. Lowering the voltage supply (Vdd) to sub volt levels causes intermittent losses in signal integrity, rendering further scaling (down) no longer acceptable as a means to lower the power required by a processor core. However, if it were possible to recover the occasional losses due to lower Vdd in an efficient manner, one could effectively lower power. In other words, by deploying the right amount and kind of redundancy, we can strike a balance between overhead incurred in achieving reliability and savings realized by permitting lower Vdd. One promising approach is the Redundant Residue Number System (RRNS) representation. Unlike other error correcting codes, RRNS has the important property of being closed under addition, subtraction and multiplication. Thus enabling correction of errors caused due to both faulty storage and compute units. Furthermore, the incorporated approach uses a fraction of the overhead and is more efficient when compared to the conventional technique used for compute-reliability. In this article, we provide an overview of the architecture of a CREEPY core that leverages this property of RRNS and discuss associated algorithms such as error detection/correction, arithmetic overflow detection and signed number representation. Finally, we demonstrate the usability of such a computer by quantifying a performance-reliability trade-off and provide a lower bound measure of tolerable input signal energy at a gate, while still maintaining reliability.
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations of the molecular dynamics method. Accelerated molecular dynamics has been developed as a solution and the parallel replica method is the simplest and most accurate of the accelerated dynamics techniques. The simulation time scale can reach several orders more than the direct molecular dynamics, while retaining the complete atomic detail. In parallel replica method, the entire system is replicated on each of M available parallel or distributed processors, it is in line with the characteristics of high-performance parallel computing and can be optimized from the program level.
This paper studies social influence from the perspective of users' characteristics. The importance of users' characteristics in word-of-mouth applications has been emphasized in economics and marketing fields....
详细信息
ISBN:
(纸本)9781509056972
This paper studies social influence from the perspective of users' characteristics. The importance of users' characteristics in word-of-mouth applications has been emphasized in economics and marketing fields. We model a category of users called mavens where their unique characteristics nominate them to be the preferable seeds in viral marketing applications. In addition, we developed and verified methods to learn their characteristics from a real dataset. Also, we illustrated ways to maximize information flow through mavens in social networks. Our experiments show that our model successfully detected mavens as well as fulfilled significant roles in maximizing the information flow in a social network comparing to the spread that was a result of traditional influencer users in influence maximization problem. These results showed the compatibility of our model with real marketing approaches.
How to efficiently place virtual machines is an important issue in the cloud data center. Virtual machine placement method based on traditional heuristic algorithm costs long time to reach an optimal allocation so tha...
详细信息
How to efficiently place virtual machines is an important issue in the cloud data center. Virtual machine placement method based on traditional heuristic algorithm costs long time to reach an optimal allocation so that it is difficult to meet the real production environment. To solve this problem, this paper proposes a virtual machine placement method based on improved simulated annealing algorithm (ISA). Firstly, resource utilization model of servers and dynamic placement model for virtual machines are introduced. Secondly, two threshold values and an optimized annealing process are presented in the ISA. Finally, the ISA-based allocation weight vector is computed. Experimental results show that the method determines virtual machine placement in a short time span, achieves load balance and improves resource utilization rate in the cloud data center, as well as reduces the number of active servers.
The problem of determining whether a given quantum state is entangled lies at the heart of quantum information processing, which is known to be an NP-hard problem in general. Despite the proposed many methods such as ...
详细信息
作者:
Huijie ChenFan LiYu WangSchool of Computer Science
Beijing Institute of Technology Beijing Engineering Research Center for High Volume Language Information Processing and Cloud Computing Applications Beijing China Department of Computer Science
College of Computing and Informatics University of North Carolina at Charlotte Charlotte NC USA
Hand tracking systems are becoming increasingly popular as a fundamental HCI approach. The trajectory of moving hand can be estimated through smoothing the position coordinates collected from continuous localization. ...
详细信息
ISBN:
(纸本)9781509028245
Hand tracking systems are becoming increasingly popular as a fundamental HCI approach. The trajectory of moving hand can be estimated through smoothing the position coordinates collected from continuous localization. Therefore, hand localization is a key component of any hand tracking systems. This paper presents EchoLoc, which locates the human hand by leveraging the speaker array in Commercial Off-The-Shelf (COTS) devices (i.e., a smart phone plugged with a stereo speaker). EchoLoc measures the distance from the hand to the speaker array via the Time Of Flight (TOF) of the chirp. The speaker array and hand yield a unique triangle, therefore, the hand can be localized with triangular geometry. We prototype EchoLoc on iOS as an application, and find it is capable of localization with the average resolution within five centimeters of 73% and three centimeters of 48%.
The cloud offers computational resources to customers, such as networking, processing, and storage. Its flexibility and benefits of reducing IT costs are attractive to many companies. However, the cloud also brings wi...
详细信息
暂无评论