In this paper, we propose a novel queue-based privacy-preserving data aggregation scheme for additive aggregation function. In the scheme, sensor nodes are divided into clusters in a distributed way first, and then, i...
详细信息
The use of traditional positioning technologies, such as GPS and wireless local positioning, rely on un- derlying infrastructure. However, in a subway environment, such positioning systems are not available for the po...
详细信息
The use of traditional positioning technologies, such as GPS and wireless local positioning, rely on un- derlying infrastructure. However, in a subway environment, such positioning systems are not available for the position- ing tasks, such as the detection of the train arrivals for the passengers in the train. An alternative approach is to exploit the contextual information available in the mobile devices of subway riders to detect train arrivals. To this end, we pro- pose to exploit multiple contextual features extracted from the mobile devices of subway riders to precisely detecting train arrivals. Following this line, we first investigate poten- tial contextual features which may be effective to detect train arrivals according to the observations from 3D accelerome- ters and GSM radio. Furthermore, we propose to explore the maximum entropy (MaxEnt) model for training a train ar- rival detector by learning the correlation between contextual features and train arrivals. Finally, we perform extensive ex- periments on several real-world data sets collected from two major subway lines in the Beijing subway system. Experi- mental results validate both the effectiveness and efficiency of the proposed approach.
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed t...
详细信息
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
Measurements of ZZ production in the ℓ+ℓ−ℓ′+ℓ′− channel in proton–proton collisions at 13 TeV center-of-mass energy at the Large Hadron Collider are presented. The data correspond to 36.1 fb−1 of collisions collec...
详细信息
Measurements of ZZ production in the ℓ+ℓ−ℓ′+ℓ′− channel in proton–proton collisions at 13 TeV center-of-mass energy at the Large Hadron Collider are presented. The data correspond to 36.1 fb−1 of collisions collected by the ATLAS experiment in 2015 and 2016. Here ℓ and ℓ′ stand for electrons or muons. Integrated and differential ZZ→ℓ+ℓ−ℓ′+ℓ′− cross sections with Z→ℓ+ℓ− candidate masses in the range of 66 GeV to 116 GeV are measured in a fiducial phase space corresponding to the detector acceptance and corrected for detector effects. The differential cross sections are presented in bins of twenty observables, including several that describe the jet activity. The integrated cross section is also extrapolated to a total phase space and to all standard model decays of Z bosons with mass between 66 GeV and 116 GeV, resulting in a value of 17.3±0.9[±0.6(stat)±0.5(syst)±0.6(lumi)] pb. The measurements are found to be in good agreement with the standard model. A search for neutral triple gauge couplings is performed using the transverse momentum distribution of the leading Z boson candidate. No evidence for such couplings is found and exclusion limits are set on their parameters.
A distributed signature scheme allows participants in a qualified set to jointly generate a signature which cannot be forged even when all the unqualified participants collude together. In this paper, we propose an ef...
详细信息
The end-to-end packet delay is important for the application of wireless sensor networks. Reducing unnecessary and redundant handshake frame is considered as a promising way to minimize the end-to-end delay. Here, a p...
详细信息
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
详细信息
To reduce pre-bond and post-bond test cost for 3D IP (Three Dimensional Intellectual Property) cores, this paper proposed a test wrapper optimization technique using BFD(Best Fit Decreasing) and GA (Genetic Algorithm)...
详细信息
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content-based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-b...
详细信息
暂无评论