The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of power consumption measurements monitored on an Integrated Circuit (IC) computing cryptographic operations. A lot of works have proposed improvements of the attack, but no one focuses on ordering measurements. Our proposal...
For decentralized control problems with quadratically invariant information constraints, the optimal controller may be found efficiently. In this paper, we show that there are systems which are not quadratically invariant but reduce to systems that are. We call the requisite property internal quadratic invariance. We present an associated reduction procedure, and illustrate our method with examples.
Z Formal method not only can improve correctness and reliability of software, but also improve development efficiency. Although Z specifications have been widely studied in literatures, very little work is involved in definition and use of variables. This paper discussed on definition and use of variables by an example. Finally, it is applied to data flow analysis and data dependent analysis.
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
Service-oriented computing advocates the development of new software or services on the basis of existing services. This paradigm shows a great potential of achieving high productivity and low cost, but it faces a challenge in efficiently and correctly using existing services in producing a new application and ensuring its reliability. Building a formal model using a formal specification language...
The IEEE 802.11e and the IEEE 802.11n focus on quality of service (QoS) and enhancements for high throughput respectively. Modern wireless LAN (WLAN) products should integrate both features. This paper presents a design of a high throughput MAC with QoS guarantee which combines the hybrid coordination function (HCF) of the 802.11e with the frame aggregation technique in the 802.11n. The basic idea...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
Nowadays, how to efficiently compose Web services has become a hotspot. In this paper, we introduce a method of recommending an optimal service sequence based on the original service sequence for a composite service. This method uses a Bayesian-based approach and selects the service sequence that has the largest probability as the best choice. Compared with existing methods, this method has two advantages:...
The present paper considers distributed consensus algorithms for agents evolving on a connected compact homogeneous (CCH) manifold. The agents track no external reference and communicate their relative state according to an interconnection graph. The paper first formalizes the consensus problem for synchronization (i.e. maximizing the consensus) and balancing (i.e. minimizing the consensus); it thereby...
This paper studies the ISS (input-to-state stability) for a class of HDS (hybrid dynamical systems). By using the concept of hybrid time for HDS, two kinds of ISS notions are proposed. They are called the first ISS property and the second ISS property of HDS. By employing the ISS properties on continuous and/or discrete dynamics in the HDS, the first and second ISS properties for the whole HDS are...
We present a Chu spaces semantics of typical control flow of BPEL including fault handling and link semantics. BPELcf is proposed as a simplification of this subset of BPEL. For the compositional modeling of BPEL, we present a Chu spaces process algebra consisting of seven operators. These operators allow faults to be thrown at any point of execution and take link-based synchronization into consideration...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
Despite its simplicity (two controllers and otherwise LQG), Witsenhausen's counterexample is one of the long-standing open problems in stochastic distributed control. Recently, it was proved that an asymptotic vector ??relaxation?? can be solved to within a constant factor of the optimal cost. A parallel result is shown here for the original scalar problem. Between linear strategies and explicit-signalling-based...
In the analysis of optimal control problems with state constraints, a key step (establishing `metric regularity') is to show that an arbitrary state trajectory can be approximated by a feasible state trajectory, whose distance from the original state trajectory is linearly related to the state constraint violation. It is then possible, for example, to give conditions for the state constraint maximum...
In this note, the novel representation is proposed for a linear periodic continuous-time system with T-periodic real-valued coefficients. We prove that a T-periodic real-valued factor and two real-valued matrix exponential functions can be extracted from a state transition matrix, while, in the well-known Floquet representation theorem, a 2T-periodic real-valued factor and a real-valued matrix exponential...
In this paper, the problem of feedback equivalence to a passive system is studied for a class of nonlinear stochastic systems. Based on a nonlinear stochastic KYP lemma, we investigate the relationship between a passive system and the corresponding zero-output system, which sustains a different result from the deterministic case. Following the stochastic passivity theory, a sufficient condition is...
We consider generalized noncooperative Nash games with ??shared constraints?? in which there is a common constraint that players' strategies are required to satisfy. We address two shortcomings that the associated generalized Nash equilibrium (GNE) is known to have: (a) shared constraint games usually have a large number (often a manifold) of GNEs and (b) the GNE may not be the appropriate solution...
Braille is the most common means of reading and study for visually handicapped people. The need for converting Braille documents into a computer-readable format has motivated research into the implementation of Braille recognition systems. The most fundamental steps in such recognition are estimating the scaling, spacing, and skewness properties of a given Braille document. In this paper we propose...
Constraints provide an effective means for the high-level modeling and reasoning of various problems. In particular, soft constraints are useful since they treat over-constrained problems that naturally arise in real-life applications. Therefore, researchers have been exploring frameworks for soft constraints. The framework of semiring-based constraint satisfaction problems (CSPs) can express many...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.