6,444 research outputs found

    PATH: Person Authentication using Trace Histories

    Full text link
    In this paper, a solution to the problem of Active Authentication using trace histories is addressed. Specifically, the task is to perform user verification on mobile devices using historical location traces of the user as a function of time. Considering the movement of a human as a Markovian motion, a modified Hidden Markov Model (HMM)-based solution is proposed. The proposed method, namely the Marginally Smoothed HMM (MSHMM), utilizes the marginal probabilities of location and timing information of the observations to smooth-out the emission probabilities while training. Hence, it can efficiently handle unforeseen observations during the test phase. The verification performance of this method is compared to a sequence matching (SM) method , a Markov Chain-based method (MC) and an HMM with basic Laplace Smoothing (HMM-lap). Experimental results using the location information of the UMD Active Authentication Dataset-02 (UMDAA02) and the GeoLife dataset are presented. The proposed MSHMM method outperforms the compared methods in terms of equal error rate (EER). Additionally, the effects of different parameters on the proposed method are discussed.Comment: 8 pages, 9 figures. Best Paper award at IEEE UEMCON 201

    Inflation from Tachyon Condensation, Large N Effects

    Full text link
    Using only general properties of the tachyon potential we show that inflation may be generic when many branes and anti-branes become coincident. Inflation may occur because of: (1) the assistance of the many diagonal tachyon fields; (2) when the tachyons condense in a staggered fashion; or (3) when some of them condense very late. We point out that such inflation is in some sense a stringy implementation of chaotic inflation and may have important applications for ``regularizing'' a lopsided or singular cosmological compact surface.Comment: 24 pages, 1 figur

    Human Development in a Changing World

    Get PDF
    human development, growth, financing development, equity, reform

    Formal certification and compliance for run-time service environments

    Get PDF
    With the increased awareness of security and safety of services in on-demand distributed service provisioning (such as the recent adoption of Cloud infrastructures), certification and compliance checking of services is becoming a key element for service engineering. Existing certification techniques tend to support mainly design-time checking of service properties and tend not to support the run-time monitoring and progressive certification in the service execution environment. In this paper we discuss an approach which provides both design-time and runtime behavioural compliance checking for a services architecture, through enabling a progressive event-driven model-checking technique. Providing an integrated approach to certification and compliance is a challenge however using analysis and monitoring techniques we present such an approach for on-going compliance checking

    Conditions for State and Control Constraint Activation in Coordination of Connected and Automated Vehicles

    Full text link
    Connected and automated vehicles (CAVs) provide the most intriguing opportunity to reduce pollution, energy consumption, and travel delays. In earlier work, we addressed the optimal coordination of CAVs using Hamiltonian analysis. In this paper, we investigate the nature of the unconstrained problem and provide conditions under which the state and control constraints become active. We derive a closed-form analytical solution of the constrained optimization problem and evaluate the solution using numerical simulation
    corecore