Rapid but informed decision-making capabilities at lower echelons are fast becoming a necessity in many coalition operations due to the dynamism associated with such environments. In this paper we investigate technolo...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, every hierarchical node is composed of perceptual nodes which provide resources with the same levels of security. More hierarchical nodes can be modeled as a set of partially ordered classes. With this mode, a deterministic key derivation algorithm is designed, which makes every user and perceptual node possesses a single key material to get some keys, and obtains the resources at the presented class and all descendant classes in the hierarchy. Furthermore, a mechanism of Merkle tree is introduced to guarantee secure and efficient multi-user key material derivation by independent of each hash link. Compared with previous proposals, the scheme is more suitable for multi-user to access resources of perceptual layer in IoT.
A community-based question and answer (CQA) system is an integrated Internet platform for users to share knowledge, and it becomes very popular in recent years. In this paper, we study social network structures of CQA...
详细信息
Data-intensive scientific applications are posing many challenges in distributed computingsystems. In the scientific field, the application data are expected to double every year over the next decade and further. Wit...
详细信息
ISBN:
(纸本)9781479967162
Data-intensive scientific applications are posing many challenges in distributed computingsystems. In the scientific field, the application data are expected to double every year over the next decade and further. With this continuing data explosion, high performance computingsystems are needed to store and process data efficiently, and workflow technologies are facilitated to automate these scientific applications. Scientific workflows are typically very complex. They usually have a large number of tasks and need a long time for execution. Running scientific workflow applications usually need not only high performance computing resources but also massive storage. The emergence of cloud computing technologies offers a new way to develop scientific workflow systems. Scientists can upload their data and launch their applications on the scientific cloud workflow systems from everywhere in the world via the Internet, and they only need to pay for the resources that they use for their applications. As all the data are managed in the cloud, it is easy to share data among scientists. This kind of model is very convenient for users, but remains a big challenge to the system. This paper proposes several research topics of data management in scientific cloud workflow systems, and discusses their research methodologies and state-of-the-art solutions.
The existing collaborative recommendation algorithms have lower robustness against shilling *** this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tuk...
详细信息
The existing collaborative recommendation algorithms have lower robustness against shilling *** this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey ***,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor *** influence of attack profiles on the recommendation results is reduced through adjusting similarities among ***,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature ***,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization *** results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.
Beyond the traditional BitTorrent, a new genre of peer-to-peer communications protocol for worldwide file sharing is rapidly evolving towards private BitTorrent (PT). In recent years, a proliferation of PT communities...
详细信息
In the field of control, observing the nonlinear system state and unknown input have always occupied a very important position. A class of unknown input observer presented in this paper is using the nonsingular termin...
详细信息
In the field of control, observing the nonlinear system state and unknown input have always occupied a very important position. A class of unknown input observer presented in this paper is using the nonsingular terminal sliding mode method which not only improves the accuracy of observer, but also can converges the error to zero in finite time. With the stronger robustness of the system, the sliding mode control signal can track the system state more accurately. Finally, there are the simulation results to verify the feasibility of this design.
Spike neural networks are inspired by animal brains,and outperform traditional neural networks on complicated ***,spike neural networks are usually used on a large scale,and they cannot be computed on commercial,off-t...
详细信息
Spike neural networks are inspired by animal brains,and outperform traditional neural networks on complicated ***,spike neural networks are usually used on a large scale,and they cannot be computed on commercial,off-the-shelf computers.A parallel architecture is proposed and developed for discrete-event simulations of spike neural ***,mechanisms for both parallelism degree estimation and dynamic load balance are emphasized with theoretical and computational *** results show the effectiveness of the proposed parallelized spike neural network system and its corresponding support components.
In this paper, we present a stereovision-only based interactive mobile robot for supporting human-robot face-to-face interaction in the real world. A three-level architecture, which consists of sensor level, perceptio...
详细信息
ISBN:
(纸本)9781479952106
In this paper, we present a stereovision-only based interactive mobile robot for supporting human-robot face-to-face interaction in the real world. A three-level architecture, which consists of sensor level, perception level and behavior level, is designed for the robot in order to perceive, understand and react to the human activity during interaction based only on visual information. A high performance stand-alone stereovision system (RGBD imager), developed in our lab, is applied to obtain the composite of color (RGB) images and dense disparity (D) maps at video rate. The RGBD imager allows the robot a human-like 3-D visual perception ability to (1) autonomously detect the human of interest whom the robot could interact with using the offline learning approaches, and (2) focus exclusively on the target human while both the human and the robot are moving during interaction using on-line learning approaches. We demonstrate and evaluate the performance of our interactive mobile robot in an office environment. The experimental results show that a reliable and dynamic face-to-face interaction is achieved, so that the target human face is always kept in the field of view and at a suitable social distance from the robot.
To improve the accuracy of memory based recommendation while keeping the low time cost, an expected item bias (EIA) based similarity computation is proposed. And a hybrid approach (HA) integrating the global rating in...
详细信息
暂无评论