5,721 research outputs found

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Full text link
    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute- Based Encryption (ABE) have been proposed recently. However, the privacy problem of cloud computing is yet to be solved. This paper presents an anonymous privilege control scheme AnonyControl to address the user and data privacy problem in a cloud. By using multiple authorities in cloud computing system, our proposed scheme achieves anonymous cloud data access, finegrained privilege control, and more importantly, tolerance to up to (N -2) authority compromise. Our security and performance analysis show that AnonyControl is both secure and efficient for cloud computing environment.Comment: 9 pages, 6 figures, 3 tables, conference, IEEE INFOCOM 201

    Long-Time Behavior of Quasilinear Thermoelastic Kirchhoff-Love Plates with Second Sound

    Get PDF
    We consider an initial-boundary-value problem for a thermoelastic Kirchhoff & Love plate, thermally insulated and simply supported on the boundary, incorporating rotational inertia and a quasilinear hypoelastic response, while the heat effects are modeled using the hyperbolic Maxwell-Cattaneo-Vernotte law giving rise to a 'second sound' effect. We study the local well-posedness of the resulting quasilinear mixed-order hyperbolic system in a suitable solution class of smooth functions mapping into Sobolev HkH^{k}-spaces. Exploiting the sole source of energy dissipation entering the system through the hyperbolic heat flux moment, provided the initial data are small in a lower topology (basic energy level corresponding to weak solutions), we prove a nonlinear stabilizability estimate furnishing global existence & uniqueness and exponential decay of classical solutions.Comment: 46 page

    The Horse in Pre-Imperial China

    Get PDF
    This dissertation investigates the role of the domestic horse in pre-imperial China motivated by the rise of studies on the horse as an interdisciplinary field. Among archaeological finds of the pre-imperial era, horse corpses and horse harnesses have been an essential part of cultural relics. Documentary sources on the horse can be traced back to the earliest Chinese writings. In this dissertation it is suggested that the domestication was a long, staged process, and the transmission route of the horse from the Urals to China via Central Asia will be proposed. A comprehensive survey of the archaeological remains related to the horse in the pre-imperial era constitutes the second main aspect of this dissertation, while documentary sources focusing on the use of the horse in civil and military affairs and the interaction of the horse and human beings . After comparing the role of the horse in China with that in other ancient civilizations, such as Greece, India and Persia, the discussion will end up with a summary of the contributions of the domesticated horse to pre-imperial China. Thousands of miles of roads were constructed for equestrian transport, and politically the horse accelerated the pace of militaristic expansion and consolidation of territory. The use of the horse also facilitated agriculture and trade, and thus propelled the society forward into the imperial era

    PRODUCT VARIETY, SERVICE VARIETY, AND THEIR IMPACT ON DISTRIBUTORS

    Get PDF
    Despite considerable research relating to product variety, few studies have analyzed the impact of product variety on distributors. Furthermore, compared to research on product variety, service variety has been overlooked in the literature. This dissertation consists of three essays: Essay One examines the direct effect of product variety on sales, its indirect effect on sales through stockouts, as well as the total impact of product variety on sales performance. Essay Two develops a moderated mediation model to investigate how service quality and market performance are affected by service variety and the interaction impacts of different types of services. Essay Three analyzes a dynamic system, which includes influences of product and service variety on demand and costs and their reverse impacts on variety decisions

    Bulk and edge quasihole tunneling amplitudes in the Laughlin state

    Full text link
    The tunneling between the Laughlin state and its quasihole excitations are studied by using the Jack polynomial. We find a universal analytical formula for the tunneling amplitude, which can describe both bulk and edge quasihole excitations. The asymptotic behavior of the tunneling amplitude reveals the difference and the crossover between bulk and edge states. The effects of the realistic coulomb interaction with a background-charge confinement potential and disorder are also discussed. The stability of the tunneling amplitude manifests the topological nature of fractional quantum Hall liquids.Comment: 9 pages, 1 figure

    NBLDA: Negative Binomial Linear Discriminant Analysis for RNA-Seq Data

    Full text link
    RNA-sequencing (RNA-Seq) has become a powerful technology to characterize gene expression profiles because it is more accurate and comprehensive than microarrays. Although statistical methods that have been developed for microarray data can be applied to RNA-Seq data, they are not ideal due to the discrete nature of RNA-Seq data. The Poisson distribution and negative binomial distribution are commonly used to model count data. Recently, Witten (2011) proposed a Poisson linear discriminant analysis for RNA-Seq data. The Poisson assumption may not be as appropriate as negative binomial distribution when biological replicates are available and in the presence of overdispersion (i.e., when the variance is larger than the mean). However, it is more complicated to model negative binomial variables because they involve a dispersion parameter that needs to be estimated. In this paper, we propose a negative binomial linear discriminant analysis for RNA-Seq data. By Bayes' rule, we construct the classifier by fitting a negative binomial model, and propose some plug-in rules to estimate the unknown parameters in the classifier. The relationship between the negative binomial classifier and the Poisson classifier is explored, with a numerical investigation of the impact of dispersion on the discriminant score. Simulation results show the superiority of our proposed method. We also analyze four real RNA-Seq data sets to demonstrate the advantage of our method in real-world applications
    • …
    corecore