首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic Algorithm 基于通用算法的非采样Contourlet域彩色数字水印
Peng Luo, Ping Wei, Yiqun Liu
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obtain high robustness and transparency with respect to the existing algorithms. In our scheme, the embedding factor is controlled locally according to the result of Generic Algorithm (GA) cycle. The simulation results show that the proposed algorithm yields a watermark which is invisible to human eyes and robust to a wide variety of common attacks.
基于非下采样轮廓let变换(NSCT)的彩色图像版权保护水印方法。我们采用遗传算法优化原理和HVS掩蔽技术来获得相对于现有算法的高鲁棒性和透明性。在我们的方案中,根据通用算法(GA)循环的结果局部控制嵌入因子。仿真结果表明,该算法产生的水印对人眼不可见,对各种常见攻击具有较强的鲁棒性。
{"title":"A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic Algorithm","authors":"Peng Luo, Ping Wei, Yiqun Liu","doi":"10.1109/INCoS.2013.128","DOIUrl":"https://doi.org/10.1109/INCoS.2013.128","url":null,"abstract":"A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obtain high robustness and transparency with respect to the existing algorithms. In our scheme, the embedding factor is controlled locally according to the result of Generic Algorithm (GA) cycle. The simulation results show that the proposed algorithm yields a watermark which is invisible to human eyes and robust to a wide variety of common attacks.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Networking Technology Trend in Japan, Toward Earth-Friendly Infrastructure 网络技术在日本的发展趋势——迈向环保基础设施
A. Arutaki
This paper introduces the recent trend of networking technologies in Japan. Especially after the East Japan Mega quake, the importance of saving natural resources has been more seriously recognized than ever. Therefore, the author focuses the explanation on the electric power and radio frequency, which are the part of natural resources and are key players to construct national infrastructures. Many smart grid projects in Japan are supported by the government. Their research and development activities created a number of new technologies. Green ICT is another activity to save energy. Less consumption of electric power in communication devices need to be realized as well as in CPU and storage devices. Finally the author picks TV white space up, which leads to reorganization of VHF/UHF band plan in Japan. Cognitive radio technologies can be applied to share frequencies in the white space in the future.
本文介绍了日本网络技术的最新发展趋势。特别是在东日本大地震之后,节约自然资源的重要性比以往任何时候都更加受到重视。因此,笔者着重对电力和射频进行了说明,电力和射频是自然资源的一部分,是国家基础设施建设的关键。日本的许多智能电网项目都得到了政府的支持。他们的研究和开发活动创造了许多新技术。绿色信息通信技术是另一项节约能源的活动。通信设备以及CPU和存储设备需要实现更少的电力消耗。最后,作者将电视空白区提取出来,从而导致日本VHF/UHF频段计划的重组。未来,认知无线电技术可用于在空白区域共享频率。
{"title":"Networking Technology Trend in Japan, Toward Earth-Friendly Infrastructure","authors":"A. Arutaki","doi":"10.1109/INCoS.2013.158","DOIUrl":"https://doi.org/10.1109/INCoS.2013.158","url":null,"abstract":"This paper introduces the recent trend of networking technologies in Japan. Especially after the East Japan Mega quake, the importance of saving natural resources has been more seriously recognized than ever. Therefore, the author focuses the explanation on the electric power and radio frequency, which are the part of natural resources and are key players to construct national infrastructures. Many smart grid projects in Japan are supported by the government. Their research and development activities created a number of new technologies. Green ICT is another activity to save energy. Less consumption of electric power in communication devices need to be realized as well as in CPU and storage devices. Finally the author picks TV white space up, which leads to reorganization of VHF/UHF band plan in Japan. Cognitive radio technologies can be applied to share frequencies in the white space in the future.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment Network 虚拟网段中基本节点恢复顺序的确定方法
H. Tsuji, A. Fujihara, H. Miwa
Virtual Segment (VS) is an architecture design for delay tolerant network to efficiently perform the store-carry-and-forward routing along traffic flows of vehicles on roadway networks. VS network consists of three types of node: Corresponding Node (CN), Relay Node (RN), and Base Node (BN). CN is a stationary node as the roles of a sender and a receiver of messages, RN is a movable node as a vehicle to relay the messages, and BN is a stationary gateway to the core backbone network connecting all the BNs as a reliable high-speed communication network. The VS network is considered to be effective for message forwarding in disaster situations since RNs are flexible to transfer messages between CNs and BNs. However, effects of breakdown of BNs by disaster have not been well studied even though the failure of message transfer between BNs seriously degrade the performance of the arrival rate of forwarding messages. In this paper, we investigate some disaster scenarios using our traffic simulator of vehicles and also our mathematical model of the VS network to simulate the effects of the disruption of BNs on the performance. We consider some methods to determine the restoration order of broken BNs and numerically compare the performance of the arrival rate. As a result, we found that the performance of the arrival rate is quickly recovered by the preferential restoration of frequently used BNs.
虚拟网段(Virtual Segment, VS)是一种针对容延迟网络的架构设计,目的是为了在道路网络中有效地执行车辆的存储-携带-转发路由。VS网络由三种类型的节点组成:对应节点(CN)、中继节点(RN)和基础节点(BN)。CN是作为消息发送者和接收者角色的固定节点,RN是作为中继消息载体的移动节点,BN是连接所有BN的核心骨干网的固定网关,作为可靠的高速通信网络。由于RNs可以灵活地在CNs和bn之间传递消息,因此VS网络被认为是在灾难情况下有效的消息转发。然而,尽管在bn之间的消息传递失败严重降低了转发消息到达率的性能,但由于灾难导致的bn故障的影响尚未得到很好的研究。在本文中,我们使用我们的车辆交通模拟器和我们的VS网络数学模型来研究一些灾难场景,以模拟bn中断对性能的影响。我们考虑了几种确定破损bn恢复顺序的方法,并对到达率的性能进行了数值比较。结果发现,通过优先恢复频繁使用的bn,可以快速恢复到达率的性能。
{"title":"Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment Network","authors":"H. Tsuji, A. Fujihara, H. Miwa","doi":"10.1109/INCoS.2013.85","DOIUrl":"https://doi.org/10.1109/INCoS.2013.85","url":null,"abstract":"Virtual Segment (VS) is an architecture design for delay tolerant network to efficiently perform the store-carry-and-forward routing along traffic flows of vehicles on roadway networks. VS network consists of three types of node: Corresponding Node (CN), Relay Node (RN), and Base Node (BN). CN is a stationary node as the roles of a sender and a receiver of messages, RN is a movable node as a vehicle to relay the messages, and BN is a stationary gateway to the core backbone network connecting all the BNs as a reliable high-speed communication network. The VS network is considered to be effective for message forwarding in disaster situations since RNs are flexible to transfer messages between CNs and BNs. However, effects of breakdown of BNs by disaster have not been well studied even though the failure of message transfer between BNs seriously degrade the performance of the arrival rate of forwarding messages. In this paper, we investigate some disaster scenarios using our traffic simulator of vehicles and also our mathematical model of the VS network to simulate the effects of the disruption of BNs on the performance. We consider some methods to determine the restoration order of broken BNs and numerically compare the performance of the arrival rate. As a result, we found that the performance of the arrival rate is quickly recovered by the preferential restoration of frequently used BNs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Security Framework on MapReduce MapReduce安全框架的设计
Zhen Guo, Xudong Zhu, Lijun Guo, S. Kang
To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framework which provides strong security and privacy guarantees for distributed computations on sensitive data. The framework is a novel integration of access control via attribute-based encryption, and privacy-preserving aggregate computation via homomorphic encryption. Data providers control the security policy for their sensitive data. Users without security expertise can perform computations on the data, but the framework confines these computations, preventing information leakage beyond the data provider's policy. Our prototype implementation demonstrates the flexibility of the framework on several case studies. It was proved more efficient than fully homomorphic encryption.
为了在云计算上部署Map-Reduce作为数据处理服务,我们必须提供必要的安全机制来保护处理的客户机密数据。本文提出了基于Map-Reduce的分布式计算框架,为敏感数据的分布式计算提供了强大的安全和隐私保障。该框架是通过基于属性的加密实现访问控制和通过同态加密实现保护隐私的聚合计算的新颖集成。数据提供者控制其敏感数据的安全策略。没有安全专业知识的用户可以对数据执行计算,但是框架限制了这些计算,防止信息泄露超出数据提供者的策略。我们的原型实现在几个案例研究中展示了框架的灵活性。它被证明比完全同态加密更有效。
{"title":"Design of a Security Framework on MapReduce","authors":"Zhen Guo, Xudong Zhu, Lijun Guo, S. Kang","doi":"10.1109/INCoS.2013.29","DOIUrl":"https://doi.org/10.1109/INCoS.2013.29","url":null,"abstract":"To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framework which provides strong security and privacy guarantees for distributed computations on sensitive data. The framework is a novel integration of access control via attribute-based encryption, and privacy-preserving aggregate computation via homomorphic encryption. Data providers control the security policy for their sensitive data. Users without security expertise can perform computations on the data, but the framework confines these computations, preventing information leakage beyond the data provider's policy. Our prototype implementation demonstrates the flexibility of the framework on several case studies. It was proved more efficient than fully homomorphic encryption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IDPKC-to-TPKC Construction of Multi-receiver Signcryption 多接收方签名的IDPKC-to-TPKC构造
Xiaotong Fu, Xiaowei Li, Wen Liu
Multi-receiver signcrption is useful in many applications such as secure email systems. In this paper, we propose a new efficient construction of multi-receiver signcryption from identity-based public key cryptosystem to traditional public key cryptosystem. The new scheme enables a user in IDPKC successfully broadcast messages, not only in authentic way but also in privately way, to users in TPKC. Furthermore, the security proof shows the proposed scheme is secure under the hardness of Generalized Bilinear Diffie-Hellman Problem in the random oracle.
多接收者签名在安全电子邮件系统等许多应用中都很有用。本文提出了一种从基于身份的公钥密码体制到传统公钥密码体制的高效的多接收方签名加密结构。新方案使IDPKC中的用户能够成功地向TPKC中的用户广播消息,不仅以真实的方式,而且以私有的方式。此外,安全性证明表明,该方案在随机预测中的广义双线性Diffie-Hellman问题的硬度下是安全的。
{"title":"IDPKC-to-TPKC Construction of Multi-receiver Signcryption","authors":"Xiaotong Fu, Xiaowei Li, Wen Liu","doi":"10.1109/INCoS.2013.62","DOIUrl":"https://doi.org/10.1109/INCoS.2013.62","url":null,"abstract":"Multi-receiver signcrption is useful in many applications such as secure email systems. In this paper, we propose a new efficient construction of multi-receiver signcryption from identity-based public key cryptosystem to traditional public key cryptosystem. The new scheme enables a user in IDPKC successfully broadcast messages, not only in authentic way but also in privately way, to users in TPKC. Furthermore, the security proof shows the proposed scheme is secure under the hardness of Generalized Bilinear Diffie-Hellman Problem in the random oracle.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116699818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Entropy Model for Anonymity Measurement 匿名度量的信息熵模型
Jun Ye, Yong Ding, Xin-Guo Li
Along with anonymous communications system being widely researched, anonymity measurement becomes more and more significant. However, there is still no desired mathematical model for this. In this paper, some necessary features for anonymity measurement model are analyzed and a dynamic model based on information entropy is proposed. Then some analyses, as well as the practicality of our model illustrated with some examples are given. Finally, comparisons with other models are made to show advantages of our model.
随着匿名通信系统的广泛研究,匿名度量变得越来越重要。然而,仍然没有理想的数学模型。本文分析了匿名度量模型的一些必要特征,提出了一个基于信息熵的动态模型。然后对该模型进行了分析,并通过实例说明了该模型的实用性。最后,通过与其他模型的比较,说明了本模型的优越性。
{"title":"Information Entropy Model for Anonymity Measurement","authors":"Jun Ye, Yong Ding, Xin-Guo Li","doi":"10.1109/INCoS.2013.58","DOIUrl":"https://doi.org/10.1109/INCoS.2013.58","url":null,"abstract":"Along with anonymous communications system being widely researched, anonymity measurement becomes more and more significant. However, there is still no desired mathematical model for this. In this paper, some necessary features for anonymity measurement model are analyzed and a dynamic model based on information entropy is proposed. Then some analyses, as well as the practicality of our model illustrated with some examples are given. Finally, comparisons with other models are made to show advantages of our model.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125609456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BDI Goal Recognition for Agent Program Learning 智能体程序学习的BDI目标识别
Hongyun Xu, Youqun Shi, Qiying Cao
Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications or processes. We develop and implement techniques for inferring agent plans, specifically inferring agent goals. We propose two ways to infer goals for plans without and with a goal library respectively. Besides, a preferred goal is considered when a goal library is provided, using the notions of consistency, maximal entailment and minimality. The complexity of the plan recognition framework is analyzed and the experimental results show that the average runtime for generating Belief-Desire-Intention (BDI) plans relying on the number of expansion nodes, choice branching factor and parallel branching factor in workflow nets (WF-nets), and that the plan recognition framework is feasible and computable.
代理应用程序通常被认为在商业环境中开发和维护成本过高。组织经常满足于使用不那么复杂和更传统的软件来代替代理技术,因为(通常是错误的)担心代理技术的开发和维护成本,并且经常错误地认为传统软件提供更好的投资回报。本文旨在通过开发一个智能体程序学习的计划识别框架来纠正这一问题,其中挖掘遗留应用程序(甚至手动执行的过程)的行为日志,以提取最终可能取代这些应用程序或过程的智能体代码的“草案”版本。我们开发并实现了推断代理计划的技术,特别是推断代理目标的技术。我们分别提出了两种方法来推断没有目标库和有目标库的计划的目标。此外,在提供目标库时,使用一致性、最大蕴涵和最小性的概念考虑首选目标。分析了该计划识别框架的复杂性,实验结果表明,基于工作流网络(WF-nets)中扩展节点数、选择分支因子和并行分支因子的BDI (Belief-Desire-Intention)计划生成的平均运行时间,证明了该计划识别框架的可行性和可计算性。
{"title":"BDI Goal Recognition for Agent Program Learning","authors":"Hongyun Xu, Youqun Shi, Qiying Cao","doi":"10.1109/INCoS.2013.72","DOIUrl":"https://doi.org/10.1109/INCoS.2013.72","url":null,"abstract":"Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications or processes. We develop and implement techniques for inferring agent plans, specifically inferring agent goals. We propose two ways to infer goals for plans without and with a goal library respectively. Besides, a preferred goal is considered when a goal library is provided, using the notions of consistency, maximal entailment and minimality. The complexity of the plan recognition framework is analyzed and the experimental results show that the average runtime for generating Belief-Desire-Intention (BDI) plans relying on the number of expansion nodes, choice branching factor and parallel branching factor in workflow nets (WF-nets), and that the plan recognition framework is feasible and computable.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed SR-LDPC Codes over Multiple-Access Relay Channel 多址中继信道上的分布式SR-LDPC码
Rong Sun, Jingwei Liu
This paper proposes a novel encoding procedure to realize codes that resemble SR-LDPC codes (rate less codes for erasure correction). For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The two code words are then XOR-ed at the relay. The destination can recover the information from the two sources.
本文提出了一种新的编码方法来实现类似SR-LDPC码(用于擦除校正的低速率码)的编码。对于两个源通过公共中继与单个目的地通信的情况,两个源分别使用SR-LDPC码对自己的信息符号进行编码。然后,这两个码字在继电器上被异或截断。目的地可以从两个源恢复信息。
{"title":"Distributed SR-LDPC Codes over Multiple-Access Relay Channel","authors":"Rong Sun, Jingwei Liu","doi":"10.1109/INCoS.2013.117","DOIUrl":"https://doi.org/10.1109/INCoS.2013.117","url":null,"abstract":"This paper proposes a novel encoding procedure to realize codes that resemble SR-LDPC codes (rate less codes for erasure correction). For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The two code words are then XOR-ed at the relay. The destination can recover the information from the two sources.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolution of Scale-Freeness in a Co-authorship Network 合作网络中无标度性的演化
P. Krömer, M. Kudelka, Z. Horak, V. Snás̃el
Many natural networks including social networks are scale-free, i.e. the distribution of node degrees in the network is heavy-tailed and follows the power law. In this work we analyze the scale-free properties of selected subnets of a complex co-authorship network induced by significant nodes (authors) and the evolution of these properties in time. The subnets induced by significant authors are sampled at different times and the power law parameters are estimated analytically. The study provides an empirical overview of the scale-freeness and evolution of power law parameters in a dynamic co-authorship network.
包括社交网络在内的许多自然网络都是无标度的,即网络中节点度的分布是重尾的,遵循幂律。在这项工作中,我们分析了由重要节点(作者)引起的复杂合著网络中选定子网的无标度特性以及这些特性随时间的演变。在不同时间对重要作者诱导的子网进行采样,并对幂律参数进行分析估计。该研究提供了动态合作网络中幂律参数的无标度性和演化的经验概述。
{"title":"Evolution of Scale-Freeness in a Co-authorship Network","authors":"P. Krömer, M. Kudelka, Z. Horak, V. Snás̃el","doi":"10.1109/INCoS.2013.127","DOIUrl":"https://doi.org/10.1109/INCoS.2013.127","url":null,"abstract":"Many natural networks including social networks are scale-free, i.e. the distribution of node degrees in the network is heavy-tailed and follows the power law. In this work we analyze the scale-free properties of selected subnets of a complex co-authorship network induced by significant nodes (authors) and the evolution of these properties in time. The subnets induced by significant authors are sampled at different times and the power law parameters are estimated analytically. The study provides an empirical overview of the scale-freeness and evolution of power law parameters in a dynamic co-authorship network.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing 基于公共审计的云计算可检索性的有效证明
Jin Li, Xiao Tan, Xiaofeng Chen, D. Wong
Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users to compute the public authentication tags of file blocks. To tackle the challenge, we propose a new cloud storage architecture with two independent cloud servers, that is, the cloud storage server and the cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. The introduction of cloud audit server eliminates the involvement of user in the auditing and in the pre-processing phases.
云计算将应用软件和数据库转移到集中的大型数据中心,在那里对数据和服务的管理可能不完全值得信赖。本文主要研究了云计算中数据存储完整性的保障问题。为了减少用户在数据完整性验证过程中的计算成本,提出了公共可验证性的概念。然而,其挑战在于计算量太大,用户无法计算文件块的公共身份验证标记。为了应对这一挑战,我们提出了一种新的云存储架构,它具有两个独立的云服务器,即云存储服务器和云审计服务器,其中后者被假设为半诚实的。我们特别考虑让云审计服务器代表云用户,在数据上传到云存储服务器之前对数据进行预处理,然后再验证数据的完整性。云审计服务器的引入消除了用户在审计和预处理阶段的参与。
{"title":"An Efficient Proof of Retrievability with Public Auditing in Cloud Computing","authors":"Jin Li, Xiao Tan, Xiaofeng Chen, D. Wong","doi":"10.1109/INCoS.2013.185","DOIUrl":"https://doi.org/10.1109/INCoS.2013.185","url":null,"abstract":"Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users to compute the public authentication tags of file blocks. To tackle the challenge, we propose a new cloud storage architecture with two independent cloud servers, that is, the cloud storage server and the cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. The introduction of cloud audit server eliminates the involvement of user in the auditing and in the pre-processing phases.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1