Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analysis methods in Secure 2-party Computation (S2C) framework illustrated by the following scenario: two parties, each having a secret data set, want to conduct the statistical analysis on their joint data, but neither party is willing to disclose its private data to the other party or any third party. The current statistical analysis techniques cannot be used directly to support this kind of computation because they require all parties to send the necessary data to a central place. In this paper, We define two Secure 2-party multivariate statistical analysis problems: Secure 2-party Multivariate Linear Regression problem and Secure 2-party Multivariate Classification problem. We have developed a practical security model, based on which we have developed a number of building blocks for solving these two problems.
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags). Their wireless transmission, processing and storage capabilities enable them to support the full automation of many inventory management functions in the industry. This paper studies the practically important problem of monitoring a large set of RFID tags and identifying the missing ones -the objects that the missing tags are associated with are likely to be missing, too. This monitoring function may need to be executed frequently and therefore should be made efficient in terms of execution time, in order to avoid disruption of normal inventory operations. Based on probabilistic methods, we design a series of missing-tag identification protocols that employ novel techniques to reduce the execution time. Our best protocol reduces the time for detecting the missing tags by 88.9% or more, when comparing with existing protocols.
Please refer to published version for the most recent bibliographic citation information. If a published version is known of, the repository item page linked to above, will contain details on accessing it.
Abstract-Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physically. After studying the adversary's behavior patterns, we present countermeasures to this problem. We propose a locationprivacy routing protocol (LPR) that is easy to implement and provides path diversity. Combining with fake packet injection, LPR is able to minimize the traffic direction information that an adversary can retrieve from eavesdropping. By making the directions of both incoming and outgoing traffic at a sensor node uniformly distributed, the new defense system makes it very hard for an adversary to perform analysis on locally gathered information and infer the direction to which the receiver locates. We evaluate our defense system based on three criteria: delivery time, privacy protection strength, and energy cost. The simulation results show that LPR with fake packet injection is capable of providing strong protection for the receiver's location privacy. Under similar energy cost, the safe time of the receiver provided by LPR is much longer than other methods, including Phantom routing [1] and DEFP [2]. The performance of our system can be tuned through a couple of parameters that determine the tradeoff between energy cost and the strength of location-privacy protection.
Abstract-Routing is a process of finding a network path from a source node to a destination node. The execution time and the memory requirement of a routing algorithm increase with the size of the network. In order to deal with the scalability problem, large networks are often structured hierarchically by grouping nodes into different domains. The internal topology of each domain is then aggregated into a simple topology that reflects the cost of routing across that domain. This process is called topology aggregation. For delay-bandwidth sensitive networks, traditional approaches represent the property of each link in the aggregated topology as a delay-bandwidth pair, which corresponds to a point on the delay-bandwidth plane. Since each link after aggregation may be the abstraction of many physical paths, a single delay-bandwidth pair results in significant information loss. The major contribution of this paper is a novel quality-of-service (QoS) parameter representation with a new aggregation algorithm and a QoS-aware routing protocol. Our QoS representation captures the state information about the network with much greater accuracy than the existing algorithms. Our simulation results show that the new approach achieves very good performance in terms of delay deviation, success ratio, and crankback ratio.
In this paper, a quasistatic model is extended to describe the double ionization of Helium in intense linearly polarized field, yielding achieve an insight to the two-electron correlation effect in the ionization dynamics. Our numerical calculations reproduce the excessive double ionization and the photoelectron spectra observed experimentally both quantitatively and qualitatively. Moreover, it is shown that the classical collisional trajectories are the main source of the double ionization in the knee regime and responsible for the unusual angular distribution of the photoelectrons.PACS numbers: 32.80. Rm, 42.50.Hz, Recently the excessive double ionization observed in Helium experiments by Fittinghoff et al. [1], Walker et al.[2], and Sheehy et al. [3] draws much attention to the multiple-electron dynamics in the laser-atom interaction. In these experiments the single ionization yields of He in a linearly polarized field is accurately predicted by the single active electron (SAE) approximation [2], well described by the Ammosov-Delone-Krainov (ADK) tunneling theory [4]. However, the case of double ionization is more complicated. In the regime of very high intensities (I > 10 16 W/cm 2 ) where strong double ionization occurs, the double ionization keeps in good agreement with the sequential SAE models as that in the lower intensities regime(I < 10 14 W/cm 2 ). The double ionization yield deviates seriously from the sequential SAE model and shows a great enhancement in a "knee" regime [(0.8-3.0) × 10 15 W/cm 2 ], where the He 2+ /He + yields ratio is close to a constant: 0.002. This surprising large yields of the double ionization obviously indicates that the sequential ionization is no longer the dominating process in this regime and the electron-electron correlation has to be taken into account.Both the "shake-off" model and the "recollision" model are suggested to describe the electron's correlation [1,3,5,6]. However, none of the two nonsequential ionization (NSI) mechanisms can completely explain the experimental observations. For the "shake-off" model, it can not give the reason for the decrease in the double ionization yields as the polarization of the laser field departs from linear [7][8][9]. In the "recollision" model, the returning electrons are known to have a maximum classical kinetic energy of ∼ 3.2U p (U p = e 2 F 2 /4m e ω 2 ), so one can determine a minimum intensity required for the rescattering electron to have enough energy to excite the inner electron. But the double ionization yields observed in experiments have no such an intensity threshold. In fact, the double ionization process is rather complicated and subtle, both of the two NSI processes and the sequential ionization contribute to the double ionization yields and may dominate in the different regimes.The experiments on the double ionization of Helium are mainly confined in the tunneling regime, i.e. the ratio between the tunneling time of the outer electron and the inverse optical frequency (Keldysh parameter) is less than 1. ...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.