Biblio

Found 5938 results

Filters: First Letter Of Last Name is S  [Clear All Filters]
2017-03-08
Wang, X., Teng, Y., Song, M., Wang, X., Yuan, H..  2015.  Joint Optimization of Coverage and Capacity Based on Power Density Distribution in Heterogeneous Cellular Networks. 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC). :251–255.

The paper presents a joint optimization algorithm for coverage and capacity in heterogeneous cellular networks. A joint optimization objective related to capacity loss considering both coverage hole and overlap area based on power density distribution is proposed. The optimization object is a NP problem due to that the adjusting parameters are mixed with discrete and continuous, so the bacterial foraging (BF) algorithm is improved based on network performance analysis result to find a more effective direction than randomly selected. The results of simulation show that the optimization object is feasible gains a better effect than traditional method.

2018-05-25
Winters, M., Brugarolas, R., Majikes, J., Sherman, B., Bozkurt, A., Roberts, D..  2015.  Knowledge Engineering for Unsupervised Canine Posture Detection Using IMUs. Second International Congress on Animal-Computer Interaction Iskandar, Malaysia. 2015
2018-05-27
Jonathan Root, Jing Qian, Venkatesh Saligrama.  2015.  Learning Efficient Anomaly Detectors from K-NN Graphs. Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, {AISTATS} 2015, San Diego, California, USA, May 9-12, 2015. 38
Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama.  2015.  Learning immune-defectives graph through group tests. {IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015. :66–70.
2017-02-23
Jia, L., Sen, S., Garg, D., Datta, A..  2015.  "A Logic of Programs with Interface-Confined Code". 2015 IEEE 28th Computer Security Foundations Symposium. :512–525.

Interface-confinement is a common mechanism that secures untrusted code by executing it inside a sandbox. The sandbox limits (confines) the code's interaction with key system resources to a restricted set of interfaces. This practice is seen in web browsers, hypervisors, and other security-critical systems. Motivated by these systems, we present a program logic, called System M, for modeling and proving safety properties of systems that execute adversary-supplied code via interface-confinement. In addition to using computation types to specify effects of computations, System M includes a novel invariant type to specify the properties of interface-confined code. The interpretation of invariant type includes terms whose effects satisfy an invariant. We construct a step-indexed model built over traces and prove the soundness of System M relative to the model. System M is the first program logic that allows proofs of safety for programs that execute adversary-supplied code without forcing the adversarial code to be available for deep static analysis. System M can be used to model and verify protocols as well as system designs. We demonstrate the reasoning principles of System M by verifying the state integrity property of the design of Memoir, a previously proposed trusted computing system.

2018-05-25
Martin, Paul, Medvesek, Jan, Symington, Andrew, Srivastava, Mani, Hailes, Stephen.  2015.  Low-Overhead Gaussian-Process Training for Indoor Positioning Systems. Sixth International Conference on Indoor Positioning and Indoor Navigation (IPIN 2015).
2015-11-16
Vijay Kothari, Dartmouth College, Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College.  2015.  Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent Based Modeling. Symposium and Bootcamp on the Science of Security (HotSoS).

Agent-based modeling can serve as a valuable asset to security personnel who wish to better understand the security landscape within their organization, especially as it relates to user behavior and circumvention. In this paper, we ar- gue in favor of cognitive behavioral agent-based modeling for usable security, report on our work on developing an agent- based model for a password management scenario, perform a sensitivity analysis, which provides us with valuable insights into improving security (e.g., an organization that wishes to suppress one form of circumvention may want to endorse another), and provide directions for future work.

Sean Smith, Dartmouth College, Ross Koppel, University of Pennsylvania, Jim Blythe, University of Southern California, Vijay Kothari, Dartmouth College.  2015.  Mismorphism: A Semiotic Model of Computer Security Circumvention.

In real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and improve the activities of human agents in the corresponding non-cyber worlds. However, talking to actual users (instead of just computer security experts) reveals endemic circumvention of the computer-embedded rules. Good-intentioned users, trying to get their jobs done, systematically work around security and other controls embedded in their IT systems.

This paper reports on our work compiling a large corpus of such incidents and developing a model based on semiotic triads to examine security circumvention. This model suggests that mismorphisms— mappings that fail to preserve structure—lie at the heart of circumvention scenarios; differential percep- tions and needs explain users’ actions. We support this claim with empirical data from the corpus.

2015-11-17
Sean Smith, Dartmouth College, Ross Koppel, University of Pennsylvania, Jim Blythe, University of Southern California, Vijay Kothari, Dartmouth College.  2015.  Mismorphism: A Semiotic Model of Computer Security Circumvention (poster abstract). Symposium and Bootcamp on the Science of Security (HotSoS).

In real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and im- prove the activities of human agents in the corresponding non-cyber worlds. However, talking to actual users (instead of just computer security experts) reveals endemic circum- vention of the computer-embedded rules. Good-intentioned users, trying to get their jobs done, systematically work around security and other controls embedded in their IT systems.

This poster reports on our work compiling a large corpus of such incidents and developing a model based on semi- otic triads to examine security circumvention. This model suggests that mismorphisms—mappings that fail to preserve structure—lie at the heart of circumvention scenarios; dif- ferential perceptions and needs explain users’ actions. We support this claim with empirical data from the corpus.

2016-12-13
2018-05-27
Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama.  2015.  Non-adaptive group testing with inhibitors. 2015 {IEEE} Information Theory Workshop, {ITW} 2015, Jerusalem, Israel, April 26 - May 1, 2015. :1–5.
2018-05-15
2018-03-29
Zhang, Desheng, He, Tian, Lin, Shan, Munir, Sirajum, Stankovic, John A.  2015.  pCruise: Online Cruising Mile Reduction for Large-Scale Taxicab Networks. IEEE Transactions on Parallel and Distributed Systems. :}keywords={TPDS.
2017-03-08
Saurabh, A., Kumar, A., Anitha, U..  2015.  Performance analysis of various wavelet thresholding techniques for despeckiling of sonar images. 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN). :1–7.

Image Denoising nowadays is a great Challenge in the field of image processing. Since Discrete wavelet transform (DWT) is one of the powerful and perspective approaches in the area of image de noising. But fixing an optimal threshold is the key factor to determine the performance of denoising algorithm using (DWT). The optimal threshold can be estimated from the image statistics for getting better performance of denoising in terms of clarity or quality of the images. In this paper we analyzed various methods of denoising from the sonar image by using various thresholding methods (Vishnu Shrink, Bayes Shrink and Neigh Shrink) experimentally and compare the result in terms of various image quality parameters. (PSNR,MSE,SSIM and Entropy). The results of the proposed method show that there is an improvenment in the visual quality of sonar images by suppressing the speckle noise and retaining edge details.

2018-05-14
2016-12-09
2018-05-17
Hurd, Sam, Camp, Carmen, White, Jules.  2015.  Quality assurance in additive manufacturing through mobile computing. Mobile Computing, Applications, and Services: 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12–13, 2015, Revised Selected Papers. :203-220.
2017-03-08
Shen, M., Liu, F..  2015.  Query of Uncertain QoS of Web Service. 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associate. :1780–1785.

Quality of service (QoS) has been considered as a significant criterion for querying among functionally similar web services. Most researches focus on the search of QoS under certain data which may not cover some practical scenarios. Recent approaches for uncertain QoS of web service deal with discrete data domain. In this paper, we try to build the search of QoS under continuous probability distribution. We offer the definition of two kinds of queries under uncertain QoS and form the optimization approaches for specific distributions. Based on that, the search is extended to general cases. With experiments, we show the feasibility of the proposed methods.

2018-05-25
Symington, Andrew, Medvesek, Jan, Martin, Paul, Srivastava, Mani, Hailes, Stephen.  2015.  Real-time Indoor Localization using Magnetic, Time of Flight, and Signal Strength Inference Maps. Indoor Location Competition at the ACM/IEEE Information Processing in Sensor Networks (IPSN).
2018-05-28
2018-05-23
2018-05-15
2018-05-14
David Broman, Lev Greenberg, Edward A. Lee, Michael Masin, Stavros Tripakis, Michael Wetter.  2015.  Requirements for hybrid cosimulation standards. Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, HSCC'15, Seattle, WA, USA, April 14-16, 2015. :179–188.
2018-05-17
Botha, Hermanus V., Boddhu, Sanjay K., McCurdy, Helena B., Gallagher, John C., Matson, Eric T., Kim, Yongho.  2015.  A Research Platform for Flapping Wing Micro Air Vehicle Control Study. Robot Intelligence Technology and Applications 3: Results from the 3rd International Conference on Robot Intelligence Technology and Applications. :135–150.

The split-cycle constant-period frequency modulation for flapping wing micro air vehicle control in two degrees of freedom has been proposed and its theoretical viability has been demonstrated in previous work. Further consecutive work on developing the split-cycle based physical control system has been targeted towards providing on-the-fly configurability of all the theoretically possible split-cycle wing control parameters with high fidelity on a physical Flapping Wing Micro Air Vehicle (FWMAV). Extending the physical vehicle and wing-level control modules developed previously, this paper provides the details of the FWMAV platform, that has been designed and assembled to aid other researchers interested in the design, development and analysis of high level flapping flight controllers. Additionally, besides the physical vehicle and the configurable control module, the platform provides numerous external communication access capabilities to conduct and validate various sensor fusion study for flapping flight control.

2018-05-15
G. Bianchin, F. Pasqualetti, S. Zampieri.  2015.  The Role of Diameter in the Controllability of Complex Networks. {IEEE} Conference on Decision and Control. :980–985.