首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper proposes an inference method to construct the topology of a camera network with overlapping and non-overlapping fields of view for a commercial surveillance system equipped with multiple cameras. It provides autonomous object detection, tracking and recognition in indoor or outdoor urban environments. The camera network topology is estimated from object tracking results among and within FOVs. The merge-split method is used for object occlusion in a single camera and an EM-based approach for extracting the accurate object feature to track moving people and establishing object correspondence across multiple cameras. The appearance of moving people and the transition time between entry and exit zones is measured to track moving people across blind regions of multiple cameras with non-overlapping FOVs. Our proposed method graphically represents the camera network topology, as an undirected weighted graph using the transition probabilities and 8-directional chain code. The training phase and the test were run with eight cameras to evaluate the performance of our method. The temporal probability distribution and the undirected weighted graph are shown in the experiments.  相似文献   

2.
A clocked adversary is a program that can time its operations and base its behavior on the results of those timings. While it is well known that hashing performs poorly in the worst case, recent results have proven that, for reference-string programs, the probability of falling into a bad case can be driven arbitrarily low. We show that this is not true for clocked adversaries. This emphasizes the limits on the appiicability of theorems on the behavior of hashing schemes on reference string programs, and raises a novel set of problems dealing with optimality of and vulnerability to clocked adversaries.Work was supported by DARPA and ONR Contracts N00014-85-C-0456 and N00014-85-K-0465, and by NSF Cooperative Agreement DCR-8420948.  相似文献   

3.
Communication networks provide a larger flexibility for the control design of interconnected systems by allowing the information exchange between the local controllers of the subsystems which can be used to improve the overall system performance. However, the interconnected systems may become unstable due to permanent communication link failures. This article presents a novel two-layer control architecture that allows to jointly improve the system performance which is the decay rate and guarantee the stability of the interconnected system under permanent communication link failures. As a novelty, the design of communication topology between the local controllers is also taken into account. On the other hand, it is still not well understood how significant the role of each possible communication link is in improving the system performance. Another novelty of this article is thus to propose a method based on eigenvalue sensitivity analysis in order to characterize the influence of each possible communication link in improving the performance of the overall system. In addition, for a special class of systems and physical interconnection topology, explicit solutions on communication topology design are derived for the first time. The solutions provide some insights into how the heterogeneity of the subsystem local dynamics, the strength of interconnection and the size of the network affect the optimal communication topology.  相似文献   

4.
针对异类传感器网络提出了一种基于最短路径的分布式拓扑控制(SPD/TC)算法。该算法利用网络中所有节点的局部信息保持网络的连通性,同时,利用最短路径算法计算链接权值的大小来进行拓扑结构的调整。将该算法与DRNG算法的节点度和平均链接长度进行仿真分析,仿真结果表明:该算法能更有效降低干扰,节省网络能量,提高了网络的性能。  相似文献   

5.
《Computer Communications》2007,30(14-15):2774-2785
Wireless sensor network consists of large number of sensor nodes with limited battery power, which are randomly deployed over certain area for several applications. Due to limited energy resource of sensors, each of them should minimize the energy consumption to prolong the network lifetime. In this paper, a distributed algorithm for the multi-hop wireless sensor network is proposed to construct a novel energy efficient tree topology, without having location information of the nodes. Energy conservation of the nodes is accomplished by controlling transmission power of the nodes. Besides, maintenance of the network topology due to energy scarcity of the gateway nodes is also proposed in the protocol. Simulation results show that our distributed protocol can achieve energy conservation up to an optimum level similar to the centralized algorithm that we have considered and can extend the network lifetime as compared to other distributed algorithms without any power control.  相似文献   

6.
This paper considers the problem of topology construction to save energy in wireless sensor networks. The proposed topology construction mechanisms build reduced topologies using the Connected Dominating Set approach in a distributed, efficient, and simple manner. This problem is very challenging because the solution must provide a connected network with complete coverage of the area of interest using the minimum number of nodes possible. Further, the algorithms need to be computationally inexpensive and the protocols simple enough in terms of their message and computation complexity, so they do not consume more energy creating the reduced topology than the energy that they are supposed to save. In addition, it is desirable to reduce or completely eliminate the need of localization mechanisms since they introduce additional costs and energy consumption. To this end, we present the family of A3 distributed topology construction algorithms, four simple algorithms that build reduced topologies with very low computational and message complexity without the need of localization information: A3, A3Cov, A3Lite and A3CovLite. The algorithms are compared in sparse and dense networks versus optimal theoretical bounds for connected-coverage topologies and two distributed heuristics found in the literature using the number of active nodes and the ratio of coverage as the main performance metrics. The results demonstrate that there is no clear winner, and rather, trade offs exist. If coverage is not as critical as energy (network lifetime), it would be better to use A3Lite, as it needs fewer number of nodes and messages. If coverage is very important for the application, then the A3CovLite is the best option mostly because of the lower message complexity.  相似文献   

7.
International Journal on Software Tools for Technology Transfer - Randomized fault-tolerant distributed algorithms pose a number of challenges for automated verification: (i) parameterization in...  相似文献   

8.
In token-based distributed mutual exclusion algorithms a unique object (token) is used to grant the right to enter the critical section. For the movement of the token within the computer network, two possible methods can be considered: perpetual mobility of the token and token-asking method. This paper presents a distributed token-based algorithm scheduling mutually exclusive access to a critical resource by the processes in a distributed network. This network is composed of N nodes that communicate by message exchanges. The proposed hybrid algorithm imposes a logical structure in the form of wraparound two-dimensional array on the network. It applies the concept of perpetual mobility of the token in columns and token-asking in rows of the array. The major purpose of the algorithm is to increase the scalability property and decrease overhead due to additional communication in a system with at least one unresponded critical section request at any given time. In this status, typically, the number of message exchanges is between and under light demand and reduces to message exchanges under heavy demand. Therefore, it outperforms lots of well known algorithms in terms of number of messages exchanged. The algorithm satisfies safety and liveness properties.  相似文献   

9.
Many data mining applications, such as spam filtering and intrusion detection, are faced with active adversaries. In all these applications, the future data sets and the training data set are no longer from the same population, due to the transformations employed by the adversaries. Hence a main assumption for the existing classification techniques no longer holds and initially successful classifiers degrade easily. This becomes a game between the adversary and the data miner: The adversary modifies its strategy to avoid being detected by the current classifier; the data miner then updates its classifier based on the new threats. In this paper, we investigate the possibility of an equilibrium in this seemingly never ending game, where neither party has an incentive to change. Modifying the classifier causes too many false positives with too little increase in true positives; changes by the adversary decrease the utility of the false negative items that are not detected. We develop a game theoretic framework where equilibrium behavior of adversarial classification applications can be analyzed, and provide solutions for finding an equilibrium point. A classifier??s equilibrium performance indicates its eventual success or failure. The data miner could then select attributes based on their equilibrium performance, and construct an effective classifier. A case study on online lending data demonstrates how to apply the proposed game theoretic framework to a real application.  相似文献   

10.
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes are expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a single light-weight scheme which outperforms the others. Using extensive simulation results over real Internet topologies, we demonstrate that our scheme is scalable to very large networks, with up to millions of nodes. The second model we consider is the malicious peers model, where peers can behave arbitrarily, deliberately trying to affect the results of the computation as well as compromising the privacy of other peers. For this model we provide a fourth scheme to defend the execution of the computation against the malicious peers. The proposed scheme has a higher complexity relative to the semi-honest model. Overall, we provide the Peer-to-Peer network designer a set of tools to choose from, based on the desired level of security.  相似文献   

11.
In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.  相似文献   

12.
13.
Topology design of distributed local area networks can be classified as a hard combinatorial optimization problem. The problem has several conflicting objectives, such as cost, reliability, network delay, and number of hops between source and destination. These objectives can conveniently be expressed in linguistic terms - a key component of fuzzy logic. This paper presents an approach based on fuzzy logic that combines the conflicting objectives into a single optimization function. A new fuzzy operator, namely, the unified AND-OR (UAO) operator is also proposed, and a decision-making approach based on fuzzy rules and preference rules is introduced. The UAO operator is empirically compared with the well-known ordered weighted averaging (OWA) operator through application to an evolutionary algorithm. Results show that the UAO operator exhibits comparatively better performance than the OWA operator.  相似文献   

14.
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditional public key cryptography and also to solve the key-escrow problem in identity-based cryptography. Many kinds of security models have been designed for certificateless cryptography and many new schemes have been introduced based on the correspondence of the security models. In generally speaking, a stronger security model can ensure a certificateless cryptosystem with a higher security level, but a realistic model can lead to a more efficient scheme. In this paper, we focus on the efficiency of a certificateless signature (CLS) scheme and introduce an efficient CLS scheme with short signature size. On one hand, the security of the scheme is based on a realistic model. In this model, an adversary is not allowed to get any valid signature under false public keys. On the other hand, our scheme is as efficient as BLS short signature scheme in both communication and computation and, therefore, turns out to be more efficient than other CLS schemes proposed so far. We provide a rigorous security proof of our scheme in the random oracle model. The security of our scheme is based on the k-CAA hard problem and a new discovered hard problem, namely the modified k-CAA problem. Our scheme can be applied to systems where signatures are typed in by human or systems with low-bandwidth channels and/or low-computation power.  相似文献   

15.
Record linkage aims at finding the matching records from two or multiple different databases. Many approximate string matching methods in privacy-preserving record linkage have been presented. In this paper, we study the problem of secure record linkage between two data files in the two-party computation setting. We note that two records are linked when all the Hamming distances between their attributes are smaller than some fixed thresholds. We firstly construct two efficient secure protocols for computing the powers of an encrypted value and implementing zero test on an encrypted value, then present an efficient protocol within constant rounds for computing the Hamming distance based record linkage in the presence of malicious adversaries by transferring these two protocols. We also discuss the extension of our protocol for settling the Levenshtein distance based record linkage problem.  相似文献   

16.
17.
This paper constitutes a sketch of a unified framework for posing and solving problems of optimal control in the presence of uncontrolled disturbances. After laying down the general framework we look closely at a concrete instance where the controller is a scheduler and the disturbances are related to uncertainties in task durations.  相似文献   

18.
19.
This paper presents a new game theory based method to control multi-agent systems under directed and time varying interaction topology. First, the sensing/communication matrix is introduced to cope with information sharing among agents, and to provide the minimal information requirement which ensures the system level objective is desirable. Second, different from traditional methods of controlling multi-agent systems, non-cooperative games are investigated to enforce agents to make rational decisions. And a new game model, termed stochastic weakly acyclic game, is developed to capture the optimal solution to the distributed optimization problem for multi-agent systems with directed topology. It is worth noting that the system level objective can be achieved at the points of the corresponding equilibriums of the new game model. The proposed method is illustrated with an example in smart grid where multiple distributed generators are controlled to reach the fair power utilization profile in the game formulation to ensure the aggregated power output are optimal.  相似文献   

20.
In this paper,we study the system of linear equation problems in the two-party computation setting.Consider that P1 holds an m×m matrix M1 and an m-dimensional column vector B1.Similarly,P2holds M2 and B2.Via executing a secure linear system computation,P1 gets the output x(or⊥)conditioned on(M1+M2)x=(B1+B2),and the rank of matrix M1+M2,while P2 gets nothing.This also can be used to settle other cooperative linear system problems.We firstly design an efficient protocol to solve this problem in the presence of malicious adversaries,then propose a simple way to modify our protocol for having a precise functionality,in which the rank of matrix M1+M2 is not necessary.We note that our protocol is more practical than these existing malicious secure protocols.We also give comparisons with other protocols and extensions to similar functions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号