31,184 research outputs found
Data Exchange Problem with Helpers
In this paper we construct a deterministic polynomial time algorithm for the
problem where a set of users is interested in gaining access to a common file,
but where each has only partial knowledge of the file. We further assume the
existence of another set of terminals in the system, called helpers, who are
not interested in the common file, but who are willing to help the users. Given
that the collective information of all the terminals is sufficient to allow
recovery of the entire file, the goal is to minimize the (weighted) sum of bits
that these terminals need to exchange over a noiseless public channel in order
achieve this goal. Based on established connections to the multi-terminal
secrecy problem, our algorithm also implies a polynomial-time method for
constructing the largest shared secret key in the presence of an eavesdropper.
We consider the following side-information settings: (i) side-information in
the form of uncoded packets of the file, where the terminals' side-information
consists of subsets of the file; (ii) side-information in the form of linearly
correlated packets, where the terminals have access to linear combinations of
the file packets; and (iii) the general setting where the the terminals'
side-information has an arbitrary (i.i.d.) correlation structure. We provide a
polynomial-time algorithm (in the number of terminals) that finds the optimal
rate allocations for these terminals, and then determines an explicit optimal
transmission scheme for cases (i) and (ii)
Empathy Gaps Between Helpers and Help-Seekers: Implications for Cooperation
Help-seekers and potential helpers often experience an “empathy gap” – an inability to understand each other’s unique perspectives. Both parties are concerned about their reputation, self-esteem, and relationships, but these concerns differ in ways that lead to misinterpretation of the other party’s actions, and, in turn, missed opportunities for cooperation. In this article, we review research that describes the role-specific concerns of helpers and help-seekers. We then review studies of emotional perspective-taking, which can help explain why help-seekers and helpers often experience empathy gaps. We go on to discuss recent work that illustrates the consequences of empathy gaps between helpers and help-seekers—social prediction errors that prevent helping and misguided intentions that can lead to unhelpful help. Finally, we discuss some promising directions for future research
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
IC-Service: A Service-Oriented Approach to the Development of Recommendation Systems
Recommendation systems have proven to be useful in various application domains. However, current solutions are usually ad-hoc systems which are tightly-coupled with the application domain. We present the IC-Service, a recommendation service that can be included in any system in a loosely coupled way. The implementation follows the principles of service oriented computing and provides a solution to various problems arising in recommendation systems, e.g. to the problem of meta-recommendation systems development. Moreover, when properly configured, the IC-Service can be used by different applications (clients), and several independent instances of the IC-Service can collaborate to produce better recommendations. Service architecture and communication protocols are presented. The paper describes also ongoing work and applications based on the IC-Service
- …