摘要:
Provided are processes for suppressing jamming signals that may include use of a signal processing circuit. A signal processing circuit can be configured to obtain a jamming signal and a feedback signal, process the jamming signal and the feedback signal to determine a cancellation signal for use in suppressing the jamming signal, and output the cancellation signal to a radio-frequency transmitter. The signal processing circuit may be further configured to obtain a transmission signal, determine a jamming channel from the jamming signal and a feedback channel from the feedback signal, and combine the transmission channel, jamming channel, and feedback channel to determine a transfer function, where the transfer function is configured to determine the cancellation signal.
摘要:
There is set forth herein in on embodiment a method wherein configurations are changed. In one embodiment, configurations are changed in such a way that end-to-end requirements continue to be satisfied, the change is at minimum cost, and that at least one variable from a critical set of variables is changed.
摘要:
In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles).
摘要:
A method for solving the reconfiguration planning problem transforms the requirement that an invariant is always preserved into a constraint on the times at which the configuration parameters change. The method then solves this constraint to obtain the required reconfiguration plan. When this constraint is strengthened with a synthesis constraint, it is ensured that any final configuration that is computed is also reachable. An extension of the method allows parameters to take on multiple intermediate values.
摘要:
Changing a network configuration to restore compliance to one requirement may invalidate the network compliance with another requirement. A method changes a configuration to restore compliance to all requirements at minimum cost. The requirements are a hybrid of symbolic, arithmetic and bit-vector constraints, so traditional optimization techniques such as linear programming, that work only for purely arithmetic constraints, do not apply. The requirements are represented as SMT (satisfiability-modulo-theory) constraints on configuration variables, and then a weighted Max-SAT solver is used to compute the optimal configuration changes in order to minimize the cost.
摘要:
A computer-enabled method of learning the behavior of a program. A processor can execute a target program during a learning interval while varying a plurality of stimuli provided to the target program so as to produce a multiplicity of different sequences of events which differ in combinations of types of events in respective sequences, orders in which the types of events occur in respective sequences, or in the combinations and in the orders in which the types of events occur. The multiplicity of event sequences can be recorded, and a second program can be executed by a processor to: determine a plurality of clusters based on similarities between the event sequences in their entirety; and determine a plurality of signatures corresponding to the plurality of clusters. Each signature can be the longest common subsequence of all sequences in the respective cluster and thus representative of the cluster. In such method, each of the plurality of signatures can be a benchmark representative of acceptable behavior of the target program.
摘要:
A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of a topic as a root and at least one client as a leaf. The server encrypts a key associated with a conditional oblivious transfer protocol using the topic-based key. The server encrypts an item with the key associated with the conditional oblivious transfer protocol. The server transmits the encrypted key and the encrypted item to a plurality of clients. The encrypted item is decryptable by the at least one client with the key associated with the conditional oblivious transfer protocol when the key associated with the conditional oblivious transfer protocol is decryptable with an interest-based key associated with a tree structure having a pseudonym of an interest as a root and the at least one client as a leaf.
摘要:
Multimode light detectors are provided, which combine a plurality of measurements of light to detect information, using a mode transformation device. The light may be light from one or more objects, and the mode transformation device may be configured to transform the light into many single mode light beams. Each measurement of the light may be a measurement of a corresponding single mode light beam. The multimode detectors may include one or more optical receivers, configured to mix one or more single mode light beams with one or more local oscillators, respectively. Methods are provided for detecting information of objects, including obtaining light from the objects, transforming the light into multiple single mode light beams, and collecting (and/or combining) measurements of the single mode light beams.
摘要:
A system, a network node, a router, a method and a program used to determine a bottleneck bandwidth on a multi-hop path between a source and destination node is presented. The method comprises receiving probe packets by a first hop node in the multi-hop path, measuring a bandwidth on a link between the first hop node and a next hop node in the multi-hop path, generating a bandwidth discovery packet including the measured bandwidth, transmitting the BDP to the next hop node, relaying the probe packets to the next hop node, and determining if the next hop node is a last-hop node on the multi-hop path. A last hop node records the measured bandwidth from the BDP, adjusts the delay between the probe packets based upon the bandwidth and relaying the probe packets to the destination node. The destination node determines the bottleneck bandwidth based on the delay between the probe packets.
摘要:
A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.