Search

Category : "IT and Related" with 239 Results

Quantitative information flow (QIF) is concerned with measuring how much of a secret is leaked to an adversary who observes the result of a computation that uses it. Prior work has shown that QIF techniques based on abstract interpretation with probabilistic polyhedra can be used to analyze the worst-case leakage of a query, on-line, to determine whether that query can be safely answered. While this approach can provide precise estimates, it does not scale well. This paper shows how to solve the scalability problem by augmenting the baseline technique with sampling and symbolic execution. We prove that our approach never underestimates a query’s leakage (it is sound), and detailed experimental results show that we can match the precision of the baseline technique but with orders of magnitude better performance.

Available in :
  • 1
  • 0
0.00
0 reviews

This open access book brings out the state of the art on how informatics-based tools are used and expected to be used in nanomaterials research. There has been great progress in the area in which “big-data” generated by experiments or computations are fully utilized to accelerate discovery of new materials, key factors, and design rules. Data-intensive approaches play indispensable roles in advanced materials characterization. "Materials informatics" is the central paradigm in the new trend. "Nanoinformatics" is its essential subset, which focuses on nanostructures of materials such as surfaces, interfaces, dopants, and point defects, playing a critical role in determining materials properties. There have been significant advances in experimental and computational techniques to characterize individual atoms in nanostructures and to gain quantitative information. The collaboration of researchers in materials science and information science is growing actively and is creating a new trend in materials science and engineering. This book is open access under a CC BY license.

Available in :
  • 1
  • 0

This open access book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book’s arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abate global climate is very much at the forefront of public discourse. It is within the context of these two dynamic thrusts, digitization and global climate change, that the energy industry sees itself undergoing significant change in how it is operated and managed. This book recognizes that they impose five fundamental energy management change drivers: 1.) the growing demand for electricity, 2.) the emergence of renewable energy resources, 3.) the emergence of electrified transportation, 4.) the deregulation of electric power markets, 5.) and innovations in smart grid technology. Together, they challenge many of the assumptions upon which the electric grid was first built. The goal of this book is to provide a single integrated picture of how eIoT can come to transform our energy infrastructure. This book links the energy management change drivers mentioned above to the need for a technical energy management solution. It, then, describes how eIoT meets many of the criteria required for such a technical solution. In that regard, the book stresses the ability of eIoT to add sensing, decision-making, and actuation capabilities to millions or perhaps even billions of interacting “smart" devices. With such a large scale transformation composed of so many independent actions, the book also organizes the discussion into a single multi-layer energy management control loop structure. Consequently, much attention is given to not just network-enabled physical devices but also communication networks, distributed control & decision making, and finally technical architectures and standards. Having gone into the detail of these many simultaneously developing technologies, the book returns to how these technologies when integrated form new applications for transactive energy. In that regard, it highlights several eIoT-enabled energy management use cases that fundamentally change the relationship between end users, utilities, and grid operators. Consequently, the book discusses some of the emerging applications for utilities, industry, commerce, and residences. The book concludes that these eIoT applications will transform today’s grid into one that is much more responsive, dynamic, adaptive and flexible. It also concludes that this transformation will bring about new challenges and opportunities for the cyber-physical-economic performance of the grid and the business models of its increasingly growing number of participants and stakeholders.

Available in :
  • 1
  • 0

Although emerging IoT paradigms in sleep tracking have a substantial contribution to enhancing current healthcare systems, there are several privacy and security considerations that end-users need to consider. End-users can be susceptible to malicious threats when they allow permission to potentially vulnerable or leaky third-party apps. Since the data is migrated to the cloud, it goes over insecure communication channels, all of which have their security concerns. Moreover, there are alternative data violation concerns when the data projects into the proprietor’s cloud storage facility. In this study, we present some of the existing IoT sleep trackers, also we discuss the most common features associated with these sleep trackers. As the majority of end-users are not aware of the privacy and security concerns affiliated with emerging IoT sleep trackers. We review existing solutions that can apply to IoT sleep tracker architecture. Also, we describe a deployed IoT platform that can address these concerns. Finally, we provide some of the recommendations to end-users and service providers to ensure a safer approach while leveraging the IoT sleep tracker in caregiving. This incorporates recommendations for software updates, awareness programs, software installation, and social engineering.

Available in :
  • 1
  • 0

We make a new contribution to the field by providing a new method of using SMT solvers in saturation-based reasoning. We do this by introducing two new inference rules for reasoning with non-ground clauses. The first rule utilises theory constraint solving (an SMT solver) to perform reasoning within a clause to find an instance where we can remove one or more theory literals. This utilises the power of SMT solvers for theory reasoning with non-ground clauses, reasoning which is currently achieved by the addition of often prolific theory axioms. The second rule is unification with abstraction where the notion of unification is extended to introduce constraints where theory terms may not otherwise unify. This abstraction is performed lazily, as needed, to allow the superposition theorem prover to make as much progress as possible without the search space growing too quickly. Additionally, the first rule can be used to discharge the constraints introduced by the second. These rules were implemented within the Vampire theorem prover and experimental results show that they are useful for solving a considerable number of previously unsolved problems. The current implementation focuses on complete theories, in particular various versions of arithmetic.

Available in :
  • 1
  • 0