6,776 research outputs found

    Games for Cybersecurity Decision-making

    Get PDF

    Comments on "Unified analysis of switched-capacitor resonant converters"

    Get PDF
    Author name used in this publication: Henry S. H. ChungAuthor name used in this publication: Chi K. Tse2006-2007 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud

    Full text link
    The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and logistics. However, NLPs are usually too computationally expensive for resource-constrained users. Fortunately, cloud computing provides an alternative and economical service for resource-constrained users to outsource their computation tasks to the cloud. However, one major concern with outsourcing NLPs is the leakage of user's private information contained in NLP formulations and results. Although much work has been done on privacy-preserving outsourcing of computation tasks, little attention has been paid to NLPs. In this paper, we for the first time investigate secure outsourcing of general large-scale NLPs with nonlinear constraints. A secure and efficient transformation scheme at the user side is proposed to protect user's private information; at the cloud side, generalized reduced gradient method is applied to effectively solve the transformed large-scale NLPs. The proposed protocol is implemented on a cloud computing testbed. Experimental evaluations demonstrate that significant time can be saved for users and the proposed mechanism has the potential for practical use.Comment: Ang Li and Wei Du equally contributed to this work. This work was done when Wei Du was at the University of Arkansas. 2018 EAI International Conference on Security and Privacy in Communication Networks (SecureComm

    CP violation Beyond the MSSM: Baryogenesis and Electric Dipole Moments

    Full text link
    We study electroweak baryogenesis and electric dipole moments in the presence of the two leading-order, non-renormalizable operators in the Higgs sector of the MSSM. Significant qualitative and quantitative differences from MSSM baryogenesis arise due to the presence of new CP-violating phases and to the relaxation of constraints on the supersymmetric spectrum (in particular, both stops can be light). We find: (1) spontaneous baryogenesis, driven by a change in the phase of the Higgs vevs across the bubble wall, becomes possible; (2) the top and stop CP-violating sources can become effective; (3) baryogenesis is viable in larger parts of parameter space, alleviating the well-known fine-tuning associated with MSSM baryogenesis. Nevertheless, electric dipole moments should be measured if experimental sensitivities are improved by about one order of magnitude.Comment: 33 pages, 6 figure

    Open Access in Perspectives of Authors and Readers

    Get PDF

    Coincidental Occlusion of Arteries

    Get PDF

    Sunshine Policy for Internet Gaming

    Get PDF

    Sleep Disorder of Shift Workers

    Get PDF

    Decrease and Increase of Burden of Doctors

    Get PDF

    Neurofeedback = Mirror of Brain

    Get PDF
    corecore