The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the secrecy performance of half-duplex relay networks. First, we establish a relay broadcasting wiretap channel model using a half-duplex relay with multiple antennas and derive the instantaneous secrecy capacity of this system. With convex optimization, the upper bound on the capacity region is provided. Second, we give the expression for the ergodic secrecy rate and analyze...
The constrained capacity of wireless sensor nodes and harsh, unattended deploy environments make the data collected by sensor nodes usually unreliable. We have proposed a count-min sketch based anomaly detection scheme with the goal of detecting the anomaly data values in WSN. In this paper, we analyze the performance of the proposed scheme thoroughly. We show through experiments with real sensed...
It is commonly recognized that the dual semantics of IP address has brought about serious scaling and security problems in today's Internet. Aiming at addressing these problems, several recent researches propose identifier-based universal network to replace the IP namespace with an identity namespace and a locator namespace. In this architecture, it successfully introduces the mapping idea to accomplish...
An anti-PROXY detecting scheme based on characters is proposed. According the characters of data flow, viz. flow rate character, application character, content character, process character and behavior character, it is identified whether the user is an PROXY object or not. The next step anti-proxy action will be made in terms of practical policies. The scheme includes character collection, modes matching,...
The connotation of intelligent warning is defined from five facets including category, screening, tracing and location of the cause, exhibition and information processing. The warning sets which are commonly used in power system real-time dispatching are classified component level, system level, single, serial, concurrent, combined, sensitivity and gradient warnings; meanwhile, these warnings are...
Software Trustworthiness is a hotspot problem in software engineering, and Software Trustworthy Attribute is the base of Software Trustworthiness. Software defect is the basic reason that influences Software Trustworthiness. Therefore, in this thesis we will attempt to utilize text classification technology to classify the historical software detects according to Software Trustworthy Attributes, in...
DSO is a kind of nifty mechanism used for dynamic linking/loading shared objects. It provides a way to build and load a piece of program code at run-time into the address space of an executable program. When Apache is selected to construct PKI bottom server framework, DSO can be used to create server functional modules. The advantage of DSO object shared and dynamically loaded rest with developing...
Abnormal remarks on World Wide Web, such as violence, threat, superstition, etc. may disturb the social order and public morality. Most traditional methods filter a page as long as it contains a keyword in a predefined blacklist. Such methods cannot provide a quantitative measure of how sensitive the content is. In this paper, we propose a utility-based Web content sensitivity mining approach. Utility...
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past, organizations protected subjects' identities by removing identifiers, such as name and social security number; however, recent investigations illustrate that deidentified genomic data can be ldquoreidentifiedrdquo to named...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.