The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider user selection algorithms for Multi-user MIMO systems with perfect or partial channel state information at the transmitter (CSIT). A novel user selection algorithm based on chordal distance is proposed. The basic principle is to serve the user subset in which one is approximately orthogonal to the others. Since the chordal distance relies only on the channel direction information,...
This paper presents an approach to speed up and enhance matching of virtual network requests to available resources in virtual network provisioning frameworks. The method consists of introducing a weight or score expressing the importance of the resources, their attributes and the values taken by these attributes. The scores are obtained through statistical analysis of the requests for virtual network...
The discrete logarithm problem (DLP) is one of the familiar problem on which some cryptographic schemes rely. In 2006, Cheon proposed an algorithm for solving DLP with auxiliary input which works better than conventional algorithms. In this paper, we show our experimental results of Cheon's algorithm on a pairing-friendly elliptic curve defined over GF(3127). It is shown that the algorithm combined...
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and/or the destination port number. In these previous researches, the chi-square values were calculated from one feature causing the degradation in the False-Positive when the same symbol...
There is an urgent need of effective trust management for vehicular ad-hoc networks (VANETs), given the dire consequences of acting on false information sent out by malicious peers in this context. In this paper, we first discuss the challenges for trust management caused by the important characteristics of VANET environments. We then survey existing trust models in multi-agent systems, mobile ad-hoc...
Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impacts. Detecting and analyzing them is very costly because of their qualities and complexities. There has been some research approaches carried out in order to detect them. The approaches can be classified into two main groups based on their used analysis features: static feature...
A common technique hackers use to break into a computer host is to route their traffic through a chain of stepping-stone hosts. There is no valid reason to use a long connection chain for remote login such as SSH connections. One way to protect a host of being attacked is to identify long connection chains connecting into the host. This paper proposes a novel method to identify long connection chains...
Automated Trust Negotiation aims to securely identify the consensus between two sets of policies consisting of certificates, with minimal disclosure of policies to each other. The paper proposes a new scheme that allows both parties to learn whether or not, both parties agree to transfer a given target certificate to the requesting party. No policy is revealed after performance of the protocol. No...
The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employing data caching for increasing the level of anonymity provided by an anonymity system is presented. This technique is especially effective for user sessions containing bidirectional communication, such as anonymous web browsing...
Nowadays information systems are being shifted to distributed architectures, i.e. Grid and P2P models to obtain the benefits like scalability, autonomy, and fault-tolerance. We consider the peer-to-peer (P2P) model as a fully distributed, scalable system, which is composed of peer processes (peers). A group of multiple peers cooperate with each other. Here, peers have to efficiently and flexibly deliver...
Stepping-stone is the most popular way used to attack other computers. Some insiders use stepping-stone to launch their attacks pretending to be outsiders. In this paper, we propose a novel algorithm to detect stepping-stone insider attacks through comparing outgoing and incoming connections. We modify the existing packet matching algorithm by introducing sliding window to make the algorithm more...
A CAPTCHA is a technique that is used to prevent automated programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already reported, conventional CAPTCHAs could be overcome by state-of-the-art malwares since the capabilities of computers are approaching those of humans. Therefore, CAPTCHAs should be based on even more advanced human-cognitive-processing...
In fully distributed peer-to-peer (P2P) systems, peers are cooperating with each other by accessing to objects distributed in networks. A peer has to collect correct information on target objects like where target objects exsist and how to manipulate target objects. Some peers may hold obsolete, even incorrect information. Hence, a peer has to find trustworthy acquaintances which hold correct information...
Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule - based mechanisms which are tedious and error prone. Other methods are based on statistical modeling, these are unable to identify causal relationships...
Online reviews, as one kind of new marketing methods, are becoming increasingly important in influencing preferences and decision-making of consumers. In view of this, this paper conducts an empirical study on Dangdang Books, constructs a research framework on correlation between product sales and aspects of online reviews, and explores the correction through the panel data econometric model. Compared...
Event-based systems are increasingly gaining widespread attention for applications that require integration with loosely coupled and distributed systems for time-critical problems such as closed loop decision-making on operative levels with low latency. In this paper, we present the event processing language EAExpression for concisely defining event stream operations, such as filter conditions or...
In web service environment, long transactions always take long time to finish, which demands the resources - often the database - to be locked for a long time. This would bring down the performance of the transaction processing system. The normal solution is compensating transaction, which creates a relative transaction with the opposite effect. When the transaction is being executed, the sub-transactions...
We present a protocol designed to solve several consecutive consensus instances in an asynchronous distributed system prone to crash failures and message omissions. The protocol follows the Paxos approach and integrates two different optimizations to reduce the latency of learning a decision value. This protocol is adaptive as it tries to obtain the best performance gain depending on the current context...
This paper presents a modified Hop field neural network (HopfieldNN) for solving the PMC-based system-level fault diagnosis problem of multiprocessor systems which aims at identifying the set of faulty processors. The PMC-based diagnosis model assumes that each processor is tested by a subset of the other processors, and that at most a bounded subset of these processors can permanently fail at the...
We propose a new approach to specifying and reasoning about forward recovery fault tolerant programs. We call it ideal stabilization. The program is ideally stabilizing if its every state is legitimate. Ideal stabilization allows the specification designer to prescribe, with arbitrary degree of precision, not only the fault-free program behavior but also its recovery operation. Unlike the classic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.