360 Hits in 3.8 sec

Secure Computation of the kth-Ranked Element in a Star Network [article]

Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi
2019 arXiv   pre-print
We consider the problem of securely computing the kth-ranked element in a sequence of n private integers distributed among n parties.  ...  Previous secure computation protocols for the kth-ranked element require a communication channel between each pair of parties.  ...  In summary, we propose different approaches for securely computing the k th -ranked element (KRE) in a star network using either garbled circuits (GC) or additive homomorphic encryption (AHE) or somewhat  ... 
arXiv:1909.08347v1 fatcat:dd36hr3qszejllto5jbhbte2ci

Nonperfect secret sharing schemes [chapter]

Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
1993 Lecture Notes in Computer Science  
Abstract: This paper presents an automatic impedance-matching algorithm that can sequentially realize a simultaneous conjugate-matching state for all the elements in an N-element array antenna.  ...  The McEliece-Sarwate scheme satisfies the defi-Abstract: In wireless positioning, estimating the location of a receiver is extremely challenging since the receiver does not transmit signal and it is invisible  ...  Acknowledgments This paper is supported in part by the grant from Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory and by the National Natural Science  ... 
doi:10.1007/3-540-57220-1_52 fatcat:7qckr4bptrhvrbdxruj32wqet4

A Self-stabilizing One-To-Many Node Disjoint Paths Routing Algorithm in Star Networks [chapter]

Rachid Hadid, Vincent Villain
2020 Lecture Notes in Computer Science  
Given a source node s and a set of D = {d1, d2, ..., dn−1} of n − 1 destination nodes in the n-dimensional star network, our algorithm constructs n − 1 node-disjoints paths P1, P2, ..., Pn−1, where Pi  ...  Two paths in a network are said to be node disjoint if they do not share any nodes except for the endpoints. Our proposed algorithm works on n-dimensional star networks Sn.  ...  Moreover, we use the notation d.j, when the rank h of the process d in DL is omitted, to refer simply to a process d in DL indexed by a label j.  ... 
doi:10.1007/978-3-030-50323-9_12 fatcat:grnpinnghjg75njmkxyp5xqk6a

Localized Space-Time Autoregressive Parameters Estimation for Traffic Flow Prediction in Urban Road Networks

Jianbin Chen, Demin Li, Guanglin Zhang, Xiaolu Zhang
2018 Applied Sciences  
The LSTARIMA model captured the autocorrelation of traffic data locally and dynamically in the road network with a dynamic spatial weight matrix.  ...  AR (STAR).  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app8020277 fatcat:ln7q6o4hkrei7ags3atuuvtzaq

Securing smart grid: cyber attacks, countermeasures, and challenges

Xu Li, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, Haojin Zhu
2012 IEEE Communications Magazine  
A residential network has a star-like topology, composed of a smart meter at the center and a few control switches (if any exist) at the periphery.  ...  Network availability attack It aims to use up or overwhelm the communication and computational resources of smart grid and to result in delay or failure of communication. to syntax for elements and privilege  ... 
doi:10.1109/mcom.2012.6257525 fatcat:hpitd2pqffgozaf7tuli325xvy

Data-Oblivious External-Memory Algorithms for the Compaction, Selection, and Sorting of Outsourced Data [article]

Michael T. Goodrich
2011 arXiv   pre-print
by a logarithmic factor in the external-memory model.  ...  Our methods use a number of new algorithmic techniques, including data-oblivious uses of invertible Bloom lookup tables, a butterfly-like compression network, randomized data thinning, and "shuffle-and-deal  ...  This research was supported in part by the National Science Foundation under grants 0724806, 0713046, 0847968, and 0953071.  ... 
arXiv:1103.5102v1 fatcat:jl4u4cn3wrez5abbacp7hwyuca

Steganography using the minimax eigenvalue decomposition

Chaka A. Allen, Jennifer L. Davidson, Mark S. Schmalz
1998 Mathematics of Data/Image Coding, Compression, and Encryption  
This means that the kth row of uk B ak is equivalent to the kth row of A. Now, the element contained in the kth row and jth column in un Ban, n *" k, is (b n ) kj = Ukn + anj.  ...  Star Wars©.CHAPTER 5: ANALYSIS AND DISCUSSION The algorithm was run on a networked SGI workstation running IRIX.  ... 
doi:10.1117/12.330365 fatcat:yot5dabmy5hu7dlel7z7jw4kfm

Construction of Mobile E-Commerce Platform and Analysis of Its Impact on E-Commerce Logistics Customer Satisfaction

Zhonghui Dong, Zhihan Lv
2021 Complexity  
With the development of mobile network communication technology, online shopping has further become the mainstream way of mass consumption.  ...  The importance is ranked second, first, and third, reaching 48.36%, 50.36%, and 61.64%, respectively.  ...  Second, calculate the candidate item set 2 A 2 according to C 1 * C 1 and calculate the number of occurrences of each element in C 2 according to the minimum support A 2 of the given candidate item set  ... 
doi:10.1155/2021/6636415 fatcat:mvp72emai5ekzhr6dt752inauq

An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment

Partha Ghosh, Chameli Debnath, Dipjyoti Metia, Dr. Ruma Dutta
2014 IOSR Journal of Computer Engineering  
Cloud Computing offers latest computing paradigm where application, data and IT services are provided online over the Internet. One of the significant concerns in Cloud Computing is security.  ...  Since data is exposed to many users, security and privacy have become the key issues of Cloud Computing.  ...  Intrusion Detection System (IDS) plays an important role to provide security and reduce damage of the information system and for the network and computer security system [2] .  ... 
doi:10.9790/0661-16471626 fatcat:ribh3cmflra35fcyv4hjxrblxa

Decentralized Dimensionality Reduction for Distributed Tensor Data Across Sensor Networks

Junli Liang, Guoyang Yu, Badong Chen, Minghua Zhao
2016 IEEE Transactions on Neural Networks and Learning Systems  
in the OVBOV manner each PV can be determined without modifying any tensor data, which simplifies corresponding computations; iii) we cast the decentralized PV determination problem as a set of subproblems  ...  with consensus constraints so that it can be solved in the network environment only via local computations and information communications among neighboring nodes; iv) we introduce the null space and transform  ...  I denotes the identity matrix of an appropriate dimension. x k,l represents the lth element of the related set of the kth node. trace(·) denotes the trace of a matrix, and ⟨·, ·⟩ represents the inner product  ... 
doi:10.1109/tnnls.2015.2469100 pmid:26340788 fatcat:hvqaminjivgwpdpyc5mh3x6oha

Local and Global Influence on Twitter [chapter]

Shan Zong, Richard Khoury, Rachid Benlamri
2017 Lecture Notes in Computer Science  
In this work, the analysis of influence in Twitter, based on users" profile statistics in a real-time scale, was studied and discussed.  ...  This study describes in details these two metrics and shows their implementation for a real social network.  ...  Future Work The influence analysis can be used in various areas to help us understand the crucial element of influencing people in social networks.  ... 
doi:10.1007/978-3-319-57351-9_5 fatcat:uowudy5u4jgepb7vsrhcxu6pzy

Ranking Analysis for Online Customer Reviews of Products Using Opinion Mining with Clustering

S. K. Lakshmanaprabu, K. Shankar, Deepak Gupta, Ashish Khanna, Joel J. P. C. Rodrigues, Plácido R. Pinheiro, Victor Hugo C. de Albuquerque
2018 Complexity  
Also, the novelty of this work—the Dragonfly Algorithm (DA)—recognizes ideal features of the items in sites, and an advanced ideal feature-based positioning procedure will be directed to discover, at long  ...  The goal of this paper is to dissect the high-recommendation web-based business sites with the help of a collection strategy and a swarm-based improvement system.  ...  Acknowledgments This work has been supported by a national funding from the FCT-Fundação para a Ciência e a Tecnologia through the UID/EEA/50008/2013 Project; by the Government of Russian Federation (Grant  ... 
doi:10.1155/2018/3569351 fatcat:zsytws6tgvd7pgarg3vqoxkkha

Deep Learning Methods for Human Behavior Recognition

Jia Lu, Minh Nguyen, Wei Qi Yan
2020 2020 35th International Conference on Image and Vision Computing New Zealand (IVCNZ)  
Since deep learning methods have been well investigated in the past decades, as an end-to-end computational method, it simplifies feature extraction as the operations in a black box.  ...  In this thesis, we explore and exploit the state-of-the-art methods, which are utilized for human behavior recognition.  ...  In recent years, with the increased capacity of computing devices, deep neural networks (DNNs) gained a major attention to attain a variety of computer vision tasks (Lu, Shen, Yan, & Bacic, 2017; Zhang  ... 
doi:10.1109/ivcnz51579.2020.9290640 fatcat:sq4fni6z2nfz5okecnsbmzum6e

SocialRec: A Context-aware Recommendation Framework with Explicit Sentiment Analysis

Rizwana Irfan, Osman Khalid, Muhammad U. S. Khan, Faisal Rehman, Atta Ur Rehman Khan, Raheel Nawaz
2019 IEEE Access  
We propose a greedy heuristic to produce ranking of items based on users' social similarities and matching preferences.  ...  In recent years, recommendation systems have seen significant evolution in the field of knowledge engineering.  ...  Let b j be the feature vector for the jth sentence S j , then the kth element of b j termed as b jk is either 0 or 1 representing the absence and presence of word w k in the jth sentence of a review.  ... 
doi:10.1109/access.2019.2932500 fatcat:tnlp3rdcnva37og7wnzbm7lee4

Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-Hoc Networks

Abdul Rahim Ansari, Nasir Saeed, Mian Imtiaz Ul Haq, Sunghyun Cho
2018 IEEE Access  
VANETs is a special case of mobile ad-hoc network where vehicles are equipped with the capabilities of wireless communication and data processing.  ...  VANETs can also collect and share the information about an area of interest [6] in different applications such as pollution control, public surveillance (photos taken of a violent act in progress) and  ...  The actual distance between the UV and the kth AV is represented by ζ 0k = ρ 0 − ρ k , k = 1, 2, ..., L. (2) The travel time by signal to move from the UV to the kth AV (in the absence of measurement noise  ... 
doi:10.1109/access.2018.2825371 fatcat:pfk332obg5hvre5dlt2r5yauoa
« Previous Showing results 1 — 15 out of 360 results