44,347 research outputs found

    Fast and secure laptop backups with encrypted de-duplication

    Get PDF
    Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure. Conventional backup solutions are not well suited to this environment, and backup regimes are frequently inadequate. This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements. This algorithm supports client-end per-user encryption which is necessary for confidential personal data. It also supports a unique feature which allows immediate detection of common subtrees, avoiding the need to query the backup system for every file. We describe a prototype implementation of this algorithm for Apple OS X, and present an analysis of the potential effectiveness, using real data obtained from a set of typical users. Finally, we discuss the use of this prototype in conjunction with remote cloud storage, and present an analysis of the typical cost savings.

    Quantum Strongly Secure Ramp Secret Sharing

    Get PDF
    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced. This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can no longer be leaked.Comment: svjour3.cls, 14 pages, 1 figure. Versions 1&2 were wrong. V3 is mathematically correct. The first author was moved to the secon

    Adaptive Cut Generation Algorithm for Improved Linear Programming Decoding of Binary Linear Codes

    Full text link
    Linear programming (LP) decoding approximates maximum-likelihood (ML) decoding of a linear block code by relaxing the equivalent ML integer programming (IP) problem into a more easily solved LP problem. The LP problem is defined by a set of box constraints together with a set of linear inequalities called "parity inequalities" that are derived from the constraints represented by the rows of a parity-check matrix of the code and can be added iteratively and adaptively. In this paper, we first derive a new necessary condition and a new sufficient condition for a violated parity inequality constraint, or "cut," at a point in the unit hypercube. Then, we propose a new and effective algorithm to generate parity inequalities derived from certain additional redundant parity check (RPC) constraints that can eliminate pseudocodewords produced by the LP decoder, often significantly improving the decoder error-rate performance. The cut-generating algorithm is based upon a specific transformation of an initial parity-check matrix of the linear block code. We also design two variations of the proposed decoder to make it more efficient when it is combined with the new cut-generating algorithm. Simulation results for several low-density parity-check (LDPC) codes demonstrate that the proposed decoding algorithms significantly narrow the performance gap between LP decoding and ML decoding

    A numerical study of two-phase flow with dynamic capillary pressure using an adaptive moving mesh method

    Get PDF
    Motivated by observations of saturation overshoot, this paper investigates numerical modeling of two-phase flow incorporating dynamic capillary pressure. The effects of the dynamic capillary coefficient, the infiltrating flux rate and the initial and boundary values are systematically studied using a travelling wave ansatz and efficient numerical methods. The travelling wave solutions may exhibit monotonic, non-monotonic or plateau-shaped behaviour. Special attention is paid to the non-monotonic profiles. The travelling wave results are confirmed by numerically solving the partial differential equation using an accurate adaptive moving mesh solver. Comparisons between the computed solutions using the Brooks-Corey model and the laboratory measurements of saturation overshoot verify the effectiveness of our approach

    Monitoring of liquid flow through microtubes using a micropressure sensor

    No full text
    The pressure-driven liquid flow through microtubes was studied in a range of very low Reynolds numbers (<0.15) by monitoring the pressure change in situ. Cylindrical microtubes with diameters ranging from 50 ?m to 500 ?m were examined and two types of tube material, namely PEEK polymer and fused silica were compared. A good linear relation for the pressure drop versus flow rate was obtained. Apparent deviations between the measured slopes with those calculated using conventional theory were attributed to uncertainties in the calculated values which are dominated by the uncertainties in the microtube diameters. It was found that a period of stabilisation time was required for reaching a steady flow after the syringe pump was switched on/off or to a different flow rate. The stabilisation time was likely due to the compressibility of the fluid. Insignificant difference between PEEK polymer and fused silica microtubes in terms of flow resistance was observed. The in-situ measurement of pressure drops provides a convenient approach for monitoring fluid flow through microtubes and detecting dimensional changes within microchannels in Lab-on-a-Chip and microreactor systems

    Outlier detection techniques for wireless sensor networks: A survey

    Get PDF
    In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier identity, and outlier degree
    corecore