Lien-Chun Wang, Wei-Ting Cho, Y. Chiu, Chin-Feng Lai
{"title":"A Parallel Multi-appliance Recognition for Smart Meter","authors":"Lien-Chun Wang, Wei-Ting Cho, Y. Chiu, Chin-Feng Lai","doi":"10.1109/DASC.2013.110","DOIUrl":"https://doi.org/10.1109/DASC.2013.110","url":null,"abstract":"This study proposes a non-invasive smart meter system that considers the power use habits of users unfamiliar with electric appliances, and can be used by inserting the smart meter into an electrical circuit. This study also creates a database mechanism, appliance recognition classification, and a waveform recognition method, in order to solve the large data volume problem in current appliance recognition systems. In comparison to other appliance recognition systems, the low-end embedded system chip used in this study has low power consumption, as well as high expandability and ease of use. This experiment is different from the research environments of other appliance recognition systems by considering parallel multi-appliance recognition and general users' habit of using power. This study will not make any assumption of power utilization in the experiment. The total system recognition rate is 84.42%, and the total recognition rate of a single electric appliance is 93.82%, proving the high feasibility of this study.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133215991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of the Private Set Intersection Protocol Based on Negative Databases","authors":"Dongdong Zhao, Wenjian Luo","doi":"10.1109/DASC.2013.38","DOIUrl":"https://doi.org/10.1109/DASC.2013.38","url":null,"abstract":"Nowadays, data privacy has been widely concerned. The private set intersection means that several parties calculate the intersection of their private sets while without revealing extra information about their private data. The negative database (NDB) is a new technique for preserving privacy, and it stores information in the complementary set of a traditional database (DB). Reversing the NDB to recover the corresponding DB is an NP-hard problem, and this property is the security foundation of the NDB. Moreover, the NDB can directly support some database operations such as intersection, union, select and Cartesian product. However, so far, there is no research work about the secure multi-party computation based on NDBs. In this paper, firstly, a two-party private set intersection protocol based on NDBs is proposed, and its security and efficiency are analyzed. Then, the multi-party private set intersection protocol based on NDBs is given.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DSNOC: A Hybrid Dense-Sparse Network-on-Chip Architecture for Efficient Scalable Computing","authors":"T. Xu, V. Leppänen, M. Forsell","doi":"10.1109/DASC.2013.119","DOIUrl":"https://doi.org/10.1109/DASC.2013.119","url":null,"abstract":"In this paper, we propose a novel hybrid Dense-Sparse Network-on-Chip (DSNOC) design that takes advantage of both dense and sparse networks. The NoC paradigm is introduced to solve the communication bottleneck and improve system scalability for multicore processors with hundreds or even thousands of cores. Dense mesh network has been used widely in NoCs due to the simplicity of the design and implementation. However the scalability of dense network can be a bottleneck in systems with high traffic volume. Sparse network has been proposed to provide higher bandwidth and better scalability than the dense network, while the size of the interconnection system becomes impractical for large systems. By combining the benefits of both networks, system performance and efficiency can be improved with a proper hybrid design. We analyse and investigate router utilization and traffic distribution of typical mesh networks. The hybrid solution is explored with theoretical analysis and implementation considerations. Experiments are performed by using a full system simulation environment. The evaluation results show that, compared with the dense network, the average network latency and energy delay product of DSNOC are improved by 10.3% and 33% respectively.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Lin, Xiangyang Gong, Wendong Wang, Xinpeng Wei, Lei Zhu
{"title":"Tunnel Congestion Exposure and Feedback","authors":"Yi Lin, Xiangyang Gong, Wendong Wang, Xinpeng Wei, Lei Zhu","doi":"10.1109/DASC.2013.123","DOIUrl":"https://doi.org/10.1109/DASC.2013.123","url":null,"abstract":"Tunneling technology has been widely applied in the network, but the lack of effective congestion exposure in the tunnel, seriously affect the performance of the tunnel technology. This document will focus on the tunnel scenario, to design a tunnel congestion exposure and feedback model, and the tunnel congestion marking scheme and congestion information feedback scheme. First, the document describes Tunneling Protocol, Secondly describes the congestion problems in the tunnel, Thirdly proposes a basic tunnel congestion exposure model, Finally, proposes the detail of tunnel congestion marking and feedback scheme for the model. Modifying the ECN tunnel rules of RFC3168 and RFC6040, congestion marking scheme can be applied to the feedback model. Congestion feedback scheme use GRE (Generic Routing Encapsulation) header format extension to carry the feedback information. Content and format of Congestion feedback, and the transmission of feedback information are also discussed in the document.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mei Wang, Jiaoling Zhou, Yue Li, Xiaoling Xia, Jiajin Le
{"title":"A Data Reusing Strategy Based on Column-Stores","authors":"Mei Wang, Jiaoling Zhou, Yue Li, Xiaoling Xia, Jiajin Le","doi":"10.1109/DASC.2013.56","DOIUrl":"https://doi.org/10.1109/DASC.2013.56","url":null,"abstract":"Data reusing is an important way to save storage capacity and improve query efficiency in the management of massive data. The column-store architecture stores data from the same column continuously, which greatly improves the performance of 'read optimization' application and moreover increases the feasibility and flexibility of data reusing. In this paper, we propose a novel reusing method based on the column-store data warehouse. Firstly, we propose an improved iMAP method based on the schema mapping technique to generate as more candidate reusable columns as possible and then conduct further filter on these candidate data, which greatly reduces the complexity of reusable data detection. Based on the column-store architecture, we then propose the reuse implement at the storage layer. The method for query execution based on reusable data is provided finally. The experiment results conducted on the real data sets indicate that the presented strategy can reduce the storage space and query execution time efficiently.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis","authors":"Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao","doi":"10.1109/DASC.2013.37","DOIUrl":"https://doi.org/10.1109/DASC.2013.37","url":null,"abstract":"Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workflow and Role Based Access Control Model for Cloud Manufacturing","authors":"Xianhui Lin, Xiaomei Zhang","doi":"10.1109/DASC.2013.39","DOIUrl":"https://doi.org/10.1109/DASC.2013.39","url":null,"abstract":"Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the \"Software as a Service\" concept to \"Manufacture as a Service\", sharing the \"manufacturing resources and manufacturing capability\". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho
{"title":"Gesture-Based NUI Application for Real-Time Path Modification","authors":"Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho","doi":"10.1109/DASC.2013.104","DOIUrl":"https://doi.org/10.1109/DASC.2013.104","url":null,"abstract":"Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wonsik Lee, Seoungjae Cho, Wei Song, Kyhyun Um, Kyungeun Cho
{"title":"UbiSim: Multiple Sensors Mounted Smart House Simulator Development","authors":"Wonsik Lee, Seoungjae Cho, Wei Song, Kyhyun Um, Kyungeun Cho","doi":"10.1109/DASC.2013.105","DOIUrl":"https://doi.org/10.1109/DASC.2013.105","url":null,"abstract":"It is essential for smart house researchers to have large datasets from actual environments. However, not all researchers have sufficient budgets to build test beds. These researchers need a simulator that can synthesize realistic sensory datasets. To solve this problem, we propose the 'UbiSim' simulator for activity recognition research. UbiSim provides a 3D graphical user interface to enable spatial perception using multiple sensors, including those that detect motion, pressure, vibration, temperature, and contact, along with RFID tags and receivers. The sensors are designed to verify collisions in a virtual space as a means to operate with minimal computational costs. Our proposed methods were tested in a virtual environment. The results show that the smart house simulator achieves real-time performance.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"27 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emulation of Network Path Quality Indicators","authors":"Ruijie Ou, Wenyu Chen, WeiShun Li, LinLi Guo","doi":"10.1109/DASC.2013.91","DOIUrl":"https://doi.org/10.1109/DASC.2013.91","url":null,"abstract":"The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a \"Transparent Bridge\" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125883400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}