Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clou...
详细信息
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio s...
详细信息
ISBN:
(纸本)9781467307734
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio signatures are collected and stored for further comparison and matching. Site survey involves intensive costs on manpower and time. In this work, we study unexploited RF signal characteristics and leverage user motions to construct radio floor plan that is previously obtained by site survey. On this basis, we design WILL, an indoor localization approach based on off-the-shelf WiFi infrastructure and mobile phones. WILL is deployed in a real building covering over 1600m 2 , and its deployment is easy and rapid since site survey is no longer needed. The experiment results show that WILL achieves competitive performance comparing with traditional approaches.
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this ...
详细信息
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this paper proposes a model-based approach for customization, multi-tenancy architecture, scalability, and redundancy & recovery techniques for GAE. The ACDATER (Actors, Conditions, Data, Actions, Timing, Events, and Relationship) model is used for various features, and then automated code generation is used to generate code based on the model specified. Simulation can be performed to ensure correctness before deployment.
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this pape...
详细信息
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this paper, we propose a bootstrapping approach for object coreferencing on the Semantic Web. For an object URI, we firstly establish a kernel that consists of semantically equivalent URIs from the same-as, (inverse) functional properties and (max-)cardinalities, and then extend the kernel with respect to the textual descriptions (e.g., labels and local names) of URIs. We also propose a trustworthiness-based method to rank the coreferent URIs in the kernel as well as a similarity-based method for ranking the URIs in the extension of the kernel. We implement the proposed approach, called ObjectCoref, on a large-scale dataset that contains 76 million URIs collected by the Falcons search engine until 2008. The evaluation on precision, relative recall and response time demonstrates the feasibility of our approach. Additionally, we apply the proposed approach to investigate the popularity of the URI alias phenomenon on the current Semantic Web.
To solve the problem of seriously distortion while enlarging images via seam carving,we proposed an improved method in this ***,we enlarged the image with hierarchical interpolation model to the size of power of two t...
详细信息
To solve the problem of seriously distortion while enlarging images via seam carving,we proposed an improved method in this ***,we enlarged the image with hierarchical interpolation model to the size of power of two times of original,which is closest to target size,while applying iterative curvature-based interpolation algorithm to protected areas and nearest interpolation to non-protected *** then,some seams to the target size were avoided via seam carving *** the subjective analysis and objective evaluation,the experiment on both standard library images and spatial images showed that the proposed method gave satisfactory results.
This paper is aimed at the problem of Multifocus image fusion for the same scene and has proposed a multi-focus image fusion algorithm based on NSCT [1](The Nonsubsampled Contourlet Transform).NSCT is the sparse rep...
详细信息
This paper is aimed at the problem of Multifocus image fusion for the same scene and has proposed a multi-focus image fusion algorithm based on NSCT [1](The Nonsubsampled Contourlet Transform).NSCT is the sparse representation of a two-dimension piecewise smooth signals,not only satisfying the anisotropic scaling relation and having the multi-scale,multidirectional characteristics,and shift invariance,but also being able to accurately capture the image information of the contour feature and texture *** proposed algorithm,NSCT transform is first used to decompose source images at each scale and direction to get lowpass sub-band coefficients and band-pass directional sub-band ***,the fusion rule of weighted box-counting dimension is adopted in low-pass subband,as well as the fusion rule of local space frequency in band-pass directional ***,the NSCT inverse transform is employed to get the fused *** check experiment,our algorithm is proved to be simple and effective.
Metric learning is n fundamental problem in computer vision. Different features and algorithms may tackle a problem from different angles, and thus often provide complementary information. In this paper; we propose a ...
详细信息
Metric learning is n fundamental problem in computer vision. Different features and algorithms may tackle a problem from different angles, and thus often provide complementary information. In this paper; we propose a fusion algorithm which outputs enhanced metrics by combining multiple given metrics (similarity measures). Unlike traditional co-training style algorithms where multi-view features or multiple data subsets are used for classification or regression, we focus on fusing multiple given metrics through diffusion process in an unsupervised way. Our algorithm has its particular advantage when the input similarity' matrices are the outputs from diverse algorithms. We provide both theoretical and empirical explanations to our method. Significant improvements over the state-of-the-art results have been observed on various benchmark datasets. For example, we have achieved 100% accuracy (no longer the bull's eye measure) on the MPEG-7 shape dataset. Our method has a wide range of applications in machine learning and computer vision.
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ...
详细信息
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of event correlation, and it makes use of Bayesian network inference algorithm, which analysis of causal relationship of the events to deal with the missing data. This method to consider the interaction between evidence events and sequence relationship, it realizes formalization of the electronic evidence and reduces data redundancy in evidence analysis, which strengthens the pertinence of data process and evidence analysis, forensics system becomes more perfect.
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info...
详细信息
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the information system. At present, Web tree component still has a series of problems in communication efficiency, displaying and updating rate, etc. This paper uses MyEclipse and MySql as development tools to design and implement web tree component based on WebSocket, the component can display and update tree structure dynamically, Theory analysis and experimental results show that the improved scheme provides a better user experience, comparing with the previous traditional long polling based on AJAX technology, it effectively reduces the amount of data transmission, communication overhead, etc.
暂无评论