期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Modeling and analysis of the ocean dynamic with Gaussian complex network 被引量:1
1
作者 Xin Sun Yongbo Yu +3 位作者 Yuting Yang Junyu Dong Christian Bohm Xueen Chen 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第10期588-597,共10页
The techniques for oceanographic observation have made great progress in both space-time coverage and quality, which make the observation data present some characteristics of big data. We explore the essence of global... The techniques for oceanographic observation have made great progress in both space-time coverage and quality, which make the observation data present some characteristics of big data. We explore the essence of global ocean dynamic via constructing a complex network with regard to sea surface temperature. The global ocean is divided into discrete regions to represent the nodes of the network. To understand the ocean dynamic behavior, we introduce the Gaussian mixture models to describe the nodes as limit-cycle oscillators. The interacting dynamical oscillators form the complex network that simulates the ocean as a stochastic system. Gaussian probability matching is suggested to measure the behavior similarity of regions. Complex network statistical characteristics of the network are analyzed in terms of degree distribution, clustering coefficient and betweenness. Experimental results show a pronounced sensitivity of network characteristics to the climatic anomaly in the oceanic circulation. Particularly, the betweenness reveals the main pathways to transfer thermal energy of El Niño–Southern oscillation. Our works provide new insights into the physical processes of ocean dynamic, as well as climate changes and ocean anomalies. 展开更多
关键词 complex networks ocean dynamic Gaussian mixture model physical processes
原文传递
Concealed Integrity Monitoring for Wireless Sensor Networks
2
作者 Bjorn Stelte Thomas Bühring 《Wireless Sensor Network》 2011年第1期10-17,共8页
Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infr... Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol. 展开更多
关键词 Covert Channel Integrity Monitoring Wireless Sensor Network
暂未订购
t-Private and t-Secure Auctions
3
作者 Markus Hinkelmann Andreas Jakoby Peer Stechert 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期694-710,共17页
In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically se... In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties 展开更多
关键词 multi-party private and secure computation garbled circuits private auctions
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部