We introduce the concepts of monitoring paths (MPs) and monitoring cycles (MCs) for unique localization of shared risk linked group (SRLG) failures in all-optical networks. An SRLG failure causes multiple links to break simultaneously due to the failure of a common resource. MCs (MPs) start and end at the same (distinct) monitoring location(s). They are […]
Communication Cost Minimization in Wireless Sensor and Actor Networks for Road Surveillance
In recent years, wireless sensor and actor networks (WSANs) have been extensively deployed to monitor physical environment and facilitate decision making based on data collected. Emerging applications such as road surveillance highlight some interesting research issues in WSANs, including coordination problems in sensor-actor or actor-actor communications. In this paper, the issue of choosing a set […]
Loss Performance Modeling for Hierarchical Heterogeneous Wireless Networks With Speed-Sensitive Call Admission Control
A hierarchical overlay structure is an alternative solution that integrates existing and future heterogeneous wireless networks to provide subscribers with better mobile broadband services. Traffic loss performance in such integrated heterogeneous networks is necessary for an operator’s network dimensioning and planning. This paper investigates the computationally efficient loss performance modeling for multiservice in hierarchical heterogeneous […]
Lossy Compression and Iterative Reconstruction for Encrypted Image
This work proposes a novel scheme for lossy compression of an encrypted image with flexible compression ratio. A pseudorandom permutation is used to encrypt an original image, and the encrypted data are efficiently compressed by discarding the excessively rough and fine information of coefficients generated from orthogonal transform. After receiving the compressed data, with the […]
Computational Perceptual Features for Texture Representation and Retrieval
A perception-based approach to content-based image representation and retrieval is proposed in this paper. We consider textured images and propose to model their textural content by a set of features having a perceptual meaning and their application to content-based image retrieval. We present a new method to estimate a set of perceptual textural features, namely […]
Color Extended Visual Cryptography Using Error Diffusion
Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are […]
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
Although anonymizing Peer-to-Peer (P2P) systems often incurs extra traffic costs, many systems try to mask the identities of their users for privacy considerations. Existing anonymity approaches are mainly path-based: peers have to pre-construct an anonymous path before transmission. The overhead of maintaining and updating such paths is significantly high. We propose Rumor Riding (RR), a […]
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in-network location anonymization algorithms, namely, resource and quality-aware algorithms, that aim to enable the system to provide high-quality location monitoring […]
Vulnerability Analysis in SOA-Based Business Processes
Business processes and services can more flexibly be combined when based upon standards. However, such flexible compositions practically always contain vulnerabilities, which imperil the security and dependability of processes. Vulnerability management tools require patterns to find or monitor vulnerabilities. Such patterns have to be derived from vulnerability types. Existing analysis methods such as attack trees […]
Improved Division by Invariant Integers
This paper considers the problem of dividing a two-word integer by a single-word integer, together with a few extensions and applications. Due to lack of efficient division instructions in current processors, the division is performed as a multiplication using a precomputed single-word approximation of the reciprocal of the divisor, followed by a couple of adjustment […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 9
- Next Page »