307 research outputs found
POSTER: Privacy-preserving Indoor Localization
Upcoming WiFi-based localization systems for indoor environments face a
conflict of privacy interests: Server-side localization violates location
privacy of the users, while localization on the user's device forces the
localization provider to disclose the details of the system, e.g.,
sophisticated classification models. We show how Secure Two-Party Computation
can be used to reconcile privacy interests in a state-of-the-art localization
system. Our approach provides strong privacy guarantees for all involved
parties, while achieving room-level localization accuracy at reasonable
overheads.Comment: Poster Session of the 7th ACM Conference on Security & Privacy in
Wireless and Mobile Networks (WiSec'14
Simulation of an autonomous power supply system based on lithium-iron-phosphate (LiFePO[4])
Optimization of equipment composition and operation mode of power supply systems with renewable energy sources is an important and urgent task. As a result of the study, graphs of generation and consumption of electrical energy, charge-discharge characteristics of electric energy storage devices were constructed, the type and capacity of storage batteries were selected, the solar power plant scheme was developed and the main equipment was selected in accordance with the scheme, the economic efficiency of the solar power plant project was estimated and the payback period was determined
Описание динамики движения валков лабораторной модели валкового грохота с вибрационным приводом
Вивчена динаміка коливальної системи валків лабораторної моделі валкового грохоту з вібраційним приводом. Виведено рівняння руху валків даної установки.Изучена динамика колебательной системы валков лабораторной модели валкового грохота с вибрационным приводом. Выведено уравнение движения валков данной установки
Strengthening Canonical Pattern Databases with Structural Symmetries
Symmetry-based state space pruning techniques have proved to greatly improve heuristic search based classical planners. Similarly, abstraction heuristics in general and pattern databases in particular are key ingredients of such planners. However, only little work has dealt with how the abstraction heuristics behave under symmetries. In this work, we investigate the symmetry properties of the popular canonical pattern databases heuristic. Exploiting structural symmetries, we strengthen the canonical pattern databases by adding symmetric pattern databases, making the resulting heuristic invariant under structural symmetry, thus making it especially attractive for symmetry-based pruning search methods. Further, we prove that this heuristic is at least as informative as using symmetric lookups over the original heuristic. An experimental evaluation confirms these theoretical results
PDDL+ Planning with Hybrid Automata: Foundations of Translating Must Behavior
Planning in hybrid domains poses a special challenge due to the involved mixed discrete-continuous dynamics. A recent solving approach for such domains is based on applying model checking techniques on a translation of PDDL+ planning problems to hybrid automata. However, the proposed translation is limited because must behavior is only overapproximated, and hence, processes and events are not re- flected exactly. In this paper, we present the theoretical foundation of an exact PDDL+ translation. We propose a schema to convert a hybrid automaton with must transitions into an equivalent hybrid automaton featuring only may transitions
Recommended from our members
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
As sensor networks get increasingly deployed in real-world scenarios such as home and industrial automation, there is a similarly growing demand in analyzing, consolidating, and storing the data collected by these networks. The dynamic, on-demand resources offered by today’s cloud computing environments promise to satisfy this demand. However, prevalent security concerns still hinder the integration of sensor networks and cloud computing. In this paper, we show how recent progress in standardization can provide the basis for protecting data from diverse sensor devices when outsourcing data processing and storage to the cloud. To this end, we present our Sensor Cloud Security Library (SCSlib) that enables cloud service developers to transparently access cryptographically protected sensor data in the cloud. SCSlib specifically allows domain specialists who are not security experts to build secure cloud services. Our evaluation proves the feasibility and applicability of SCSlib for commodity cloud computing environments
Sleep Sets Meet Duplicate Elimination
The sleep sets technique is a path-dependent pruning method for state space search. In the past, the combination of sleep sets with graph search algorithms that perform duplicate elimination has often shown to be error-prone. In this paper, we provide the theoretical basis for the integration of sleep sets with common search algorithms in AI that perform du- plicate elimination. Specifically, we investigate approaches to safely integrate sleep sets with optimal (best-first) search algorithms. Based on this theory, we provide an initial step towards integrating sleep sets within A∗ and additional state pruning techniques like strong stubborn sets. Our experiments show slight, yet consistent improvements on the number of generated search nodes across a large number of standard domains from the international planning competitions
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
Although Cloud Computing promises to lower IT costs and increase users'
productivity in everyday life, the unattractive aspect of this new technology
is that the user no longer owns all the devices which process personal data. To
lower scepticism, the project SensorCloud investigates techniques to understand
and compensate these adoption barriers in a scenario consisting of cloud
applications that utilize sensors and actuators placed in private places. This
work provides an interdisciplinary overview of the social and technical core
research challenges for the trustworthy integration of sensor and actuator
devices with the Cloud Computing paradigm. Most importantly, these challenges
include i) ease of development, ii) security and privacy, and iii) social
dimensions of a cloud-based system which integrates into private life. When
these challenges are tackled in the development of future cloud systems, the
attractiveness of new use cases in a sensor-enabled world will considerably be
increased for users who currently do not trust the Cloud.Comment: 14 pages, 3 figures, published as technical report of the Department
of Computer Science of RWTH Aachen Universit
- …