44,347 research outputs found
Fast and secure laptop backups with encrypted de-duplication
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure. Conventional backup solutions are not well suited to this environment, and backup regimes are frequently inadequate. This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements. This algorithm supports client-end per-user encryption which is necessary for confidential personal data. It also supports a unique feature which allows immediate detection of common subtrees, avoiding the need to query the backup system for every file. We describe a prototype implementation of this algorithm for Apple OS X, and present an analysis of the potential effectiveness, using real data obtained from a set of typical users. Finally, we discuss the use of this prototype in conjunction with remote cloud storage, and present an analysis of the typical cost savings.
Quantum Strongly Secure Ramp Secret Sharing
Quantum secret sharing is a scheme for encoding a quantum state (the secret)
into multiple shares and distributing them among several participants. If a
sufficient number of shares are put together, then the secret can be fully
reconstructed. If an insufficient number of shares are put together however, no
information about the secret can be revealed. In quantum ramp secret sharing,
partial information about the secret is allowed to leak to a set of
participants, called an unqualified set, that cannot fully reconstruct the
secret. By allowing this, the size of a share can be drastically reduced. This
paper introduces a quantum analog of classical strong security in ramp secret
sharing schemes. While the ramp secret sharing scheme still leaks partial
information about the secret to unqualified sets of participants, the strong
security condition ensures that qudits with critical information can no longer
be leaked.Comment: svjour3.cls, 14 pages, 1 figure. Versions 1&2 were wrong. V3 is
mathematically correct. The first author was moved to the secon
Adaptive Cut Generation Algorithm for Improved Linear Programming Decoding of Binary Linear Codes
Linear programming (LP) decoding approximates maximum-likelihood (ML)
decoding of a linear block code by relaxing the equivalent ML integer
programming (IP) problem into a more easily solved LP problem. The LP problem
is defined by a set of box constraints together with a set of linear
inequalities called "parity inequalities" that are derived from the constraints
represented by the rows of a parity-check matrix of the code and can be added
iteratively and adaptively. In this paper, we first derive a new necessary
condition and a new sufficient condition for a violated parity inequality
constraint, or "cut," at a point in the unit hypercube. Then, we propose a new
and effective algorithm to generate parity inequalities derived from certain
additional redundant parity check (RPC) constraints that can eliminate
pseudocodewords produced by the LP decoder, often significantly improving the
decoder error-rate performance. The cut-generating algorithm is based upon a
specific transformation of an initial parity-check matrix of the linear block
code. We also design two variations of the proposed decoder to make it more
efficient when it is combined with the new cut-generating algorithm. Simulation
results for several low-density parity-check (LDPC) codes demonstrate that the
proposed decoding algorithms significantly narrow the performance gap between
LP decoding and ML decoding
A numerical study of two-phase flow with dynamic capillary pressure using an adaptive moving mesh method
Motivated by observations of saturation overshoot, this paper investigates
numerical modeling of two-phase flow incorporating dynamic capillary pressure.
The effects of the dynamic capillary coefficient, the infiltrating flux rate
and the initial and boundary values are systematically studied using a
travelling wave ansatz and efficient numerical methods. The travelling wave
solutions may exhibit monotonic, non-monotonic or plateau-shaped behaviour.
Special attention is paid to the non-monotonic profiles. The travelling wave
results are confirmed by numerically solving the partial differential equation
using an accurate adaptive moving mesh solver. Comparisons between the computed
solutions using the Brooks-Corey model and the laboratory measurements of
saturation overshoot verify the effectiveness of our approach
Monitoring of liquid flow through microtubes using a micropressure sensor
The pressure-driven liquid flow through microtubes was studied in a range of very low Reynolds numbers (<0.15) by monitoring the pressure change in situ. Cylindrical microtubes with diameters ranging from 50 ?m to 500 ?m were examined and two types of tube material, namely PEEK polymer and fused silica were compared. A good linear relation for the pressure drop versus flow rate was obtained. Apparent deviations between the measured slopes with those calculated using conventional theory were attributed to uncertainties in the calculated values which are dominated by the uncertainties in the microtube diameters. It was found that a period of stabilisation time was required for reaching a steady flow after the syringe pump was switched on/off or to a different flow rate. The stabilisation time was likely due to the compressibility of the fluid. Insignificant difference between PEEK polymer and fused silica microtubes in terms of flow resistance was observed. The in-situ measurement of pressure drops provides a convenient approach for monitoring fluid flow through microtubes and detecting dimensional changes within microchannels in Lab-on-a-Chip and microreactor systems
Outlier detection techniques for wireless sensor networks: A survey
In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier identity, and outlier degree
- …