Search results for "computer.programming_language"

showing 10 items of 986 documents

An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

2015

Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …

Scheme (programming language)AuthenticationProperty (philosophy)Theoretical computer scienceTraceabilityDatabaseComputer scienceAuthentication schemecomputer.software_genreSignature (logic)Set (abstract data type)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAttribute treecomputercomputer.programming_language
researchProduct

Modeling and Performance Assessment of the Split-Pi Used as a Storage Converter in All the Possible DC Microgrid Scenarios. Part I: Theoretical Analy…

2021

The integration of an electrical storage system (ESS) into a DC microgrid using a bidirectional DC/DC converter provides substantial benefits but requires careful design. Among such converter topologies, the Split-pi converter presents several merits at the cost of non-isolated operation. However, the few works in the literature on the Split-pi presented only closed-loop control with a single control loop; furthermore, they neglected the reactive components’ parasitic resistances and did not perform any experimental validation. This work aimed at investigating the use of the Split-pi converter as a power interface between an ESS and a DC microgrid. Five typical microgrid scenarios are prese…

Scheme (programming language)Bidirectional converter Current control DC microgrid Droop control Electrical storage system Feed-forward control Split-piSplit-pidroop controlTechnologyControl and OptimizationComputer scienceInterface (computing)feed-forward controlEnergy Engineering and Power Technologycurrent controlNetwork topologySettore ING-INF/04 - AutomaticaElectronic engineeringDC microgridElectrical and Electronic Engineeringelectrical storage systemEngineering (miscellaneous)computer.programming_languageRenewable Energy Sustainability and the Environmentbusiness.industryTFeed forwardSplit-pi; bidirectional converter; electrical storage system; DC microgrid; droop control; current control; feed-forward controlPower (physics)bidirectional converterControl systemComputer data storageMicrogridbusinesscomputerEnergy (miscellaneous)Energies
researchProduct

Fast narrowing-driven partial evaluation for inductively sequential programs

2005

Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good results on small programs, it does not scale up well to realistic problems (e.g., interpreter specialization). In this work, we introduce a faster partial evaluation scheme by ensuring the termination of the process offline . For this purpose, we first characterize a class of programs which are quasi-terminating , i.e., the computations performed with needed narrowing—the symbolic computation mechanism of narrowing-driven partial evaluation—only contain finitely many different terms (and, thus, partial evaluation termi…

Scheme (programming language)Class (computer programming)Functional programmingTheoretical computer scienceComputer scienceComputationProgram transformationcomputer.software_genreSymbolic computationComputer Graphics and Computer-Aided DesignPartial evaluationProgram analysisLogical programmingSpecialization (logic)Automatic programmingcomputerSoftwareInterpretercomputer.programming_languageProceedings of the tenth ACM SIGPLAN international conference on Functional programming
researchProduct

Motion Cueing Algorithms: A Review

2017

Robotic motion platforms are commonly used in motion-based vehicle simulation. However, the reproduction of realistic accelerations within a reduced workspace is a major challenge. Thus, high-level control strategies commonly referred to as motion cueing algorithms (MCA) are required to convert the simulated vehicle physical state into actual motion for the motion platform. This paper reviews the most important strategies for the generation of motion cues in simulators, listing the advantages and drawbacks of the different solutions. The motion cueing problem, a general scheme and the four most common approaches – classical washout, adaptive washout, optimal control and model predictive con…

Scheme (programming language)Class (computer programming)business.industryComputer scienceWork (physics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONControl engineeringWorkspaceVirtual realityOptimal controlMotion (physics)Computer visionArtificial intelligenceState (computer science)businessAlgorithmcomputercomputer.programming_languageInternational Journal of Virtual and Augmented Reality
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks

2018

Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...

Scheme (programming language)Computer Networks and Communicationsbusiness.industryComputer science010401 analytical chemistry020206 networking & telecommunications02 engineering and technologyCommunications system01 natural sciences0104 chemical sciencesComputer Science ApplicationsHardware_GENERALHardware and ArchitectureOn demandSignal Processing0202 electrical engineering electronic engineering information engineeringWireless energy harvestingInternet of ThingsbusinessEnergy harvestingcomputerEnergy (signal processing)Information Systemscomputer.programming_languageComputer networkIEEE Internet of Things Journal
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

UCS: Ultimate course search

2016

International audience; In this system prototype demonstration we present, Ultimate Course Search (UCS), a learning tool developed to provide students ways to efficiently search electronic educational materials. UCS integrates slides, lecture videos and textbooks into a single platform. The keywords extracted from the textbooks and the slides are the basis of the indexing scheme. For the videos, UCS relies on slide transitions and metadata to establish the correspondence between slides and video segments. The video segmentation is based on the slides being presented using the meta-data provided by the video recording software and image processing techniques.

Scheme (programming language)Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologycomputer.software_genreCourse (navigation)[SPI]Engineering Sciences [physics]Software[ SPI.NRJ ] Engineering Sciences [physics]/Electric power[ SPI ] Engineering Sciences [physics]ComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringSegmentationcomputer.programming_languageMultimediabusiness.industry4. Education[SPI.NRJ]Engineering Sciences [physics]/Electric powerSearch engine indexing020207 software engineeringImage segmentation[ SPI.TRON ] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsMetadata020201 artificial intelligence & image processingbusinesscomputer2016 14th International Workshop on Content-Based Multimedia Indexing (CBMI)
researchProduct

Adaptive backstepping based consensus tracking of uncertain nonlinear systems with event-triggered communication

2021

Abstract This paper investigates the consensus tracking problem for a class of uncertain high-order nonlinear systems with parametric uncertainties and event-triggered communication. Under a directed communication condition, a totally distributed adaptive backstepping based control scheme is presented. Specifically, a decentralized triggering condition is adopted in this paper such that continuous monitoring of neighboring states, as required in some existing results, can be avoided. Besides, to handle the non-differentiability problem of virtual controllers, which arises from the utilization of neighboring states collected only at the triggering instants, the virtual controllers in each re…

Scheme (programming language)Computer scienceContinuous monitoringTracking (particle physics)Nonlinear systemControl and Systems EngineeringControl theoryBacksteppingUniform boundednessPartial derivativeElectrical and Electronic Engineeringcomputercomputer.programming_languageParametric statisticsAutomatica
researchProduct