Article
Computer Science, Hardware & Architecture
B. Meenakshi, D. Karunkuzhali
Summary: Wireless Sensor Network (WSN) is a crucial component of the cyber physical system, consisting of fixed or moving sensors that collectively sense, gather, analyze, and transfer data of detected objects. Intrusion detection schemes in WSNs often suffer from poor identification rate, high computation overhead, and higher false alarm rate. This study proposes an innovative approach that combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks to improve security and adaptability in WSNs.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Gholamali Nejad Hajali Irani, Habib Izadkhah
Summary: Providing models for intelligent decision-making is crucial in software projects. This paper proposes a new model called Sahand, which utilizes a Relational Database Repository (RDP) to store source code and extract necessary information. This model extends open-source tools and provides an infrastructure for developers to extract information using SQL language or its extensions.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Shuqin Liu, Xialin Liu, Wanxuan Huang, Kai Du
Summary: This article introduces a searchable symmetric encryption (SSE) scheme using fuzzy keyword search. A dynamic multi-client scheme is proposed in a single-client setting, achieving forward privacy with multiple trapdoors communication using Intel SGX. Additionally, an enhanced multi-client scheme is presented that achieves forward privacy even with a corrupted user. Security and efficiency evaluations show that these schemes meet the desired security level and are well-suited for real-world applications.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Chengjun Lin, Rui Xue, Xinyi Huang, Shaojun Yang
Summary: This paper discusses the conversion of tag-based signature schemes into digital signature schemes and addresses the issue of allowing k > 1 fold tag-collisions in the lattice environment. It proposes a stateful tag-based signature (STS) scheme based on homomorphic hash functions and hash functions of tags, which allows for k > 1 fold tag-collisions. Two STS schemes based on the CDH and RSA assumptions, respectively, are also introduced using the same technique. The paper further explores the application of the STS schemes and demonstrates the conversion of schemes with field or quasi-field as message space into linearly homomorphic signature (LHS) schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Keqin Li
Summary: In this paper, we propose a computation offloading strategy to satisfy all UEs served by an MEC and develop an efficient method to find such a strategy. By using Markov chains to characterize UE mobility and calculating the joint probability distribution of UE locations, we can obtain the average response time of UEs and predict the overall average response time of tasks. Additionally, we solve the power constrained MEC speed setting problem.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Katharina T. Huber, Leo van Iersel, Remie Janssen, Mark Jones, Vincent Moulton, Yukihiro Murakami, Charles Semple
Summary: This paper investigates the relationship between undirected and directed phylogenetic networks, and provides corresponding algorithms. The study reveals that the directed phylogenetic network is unique under specific conditions. Additionally, an algorithm for directing undirected binary networks is described, applicable to certain classes of directed phylogenetic networks.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Philipp Czerner, Roland Guttenberg, Martin Helfrich, Javier Esparza
Summary: This paper presents a construction method that produces population protocols with a small number of states, while achieving near-optimal expected number of interactions, for deciding Presburger predicates.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang
Summary: This paper proposes a new lattice-based group signature scheme that combines the timestamp with Verifier Local Revocation (VLR) using the complete tree technique. The scheme achieves post-quantum security, almost full anonymity, and traceability, as well as backward unlinkability and effectively reduces the size of the revocation list.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Kui Ma, Guoji Song, Yanwei Zhou, Ran Xu, Bo Yang
Summary: This paper discusses the use of electronic medical systems for remote diagnosis and treatment services, addressing concerns about privacy and proposing an efficient and novel identity authentication protocol with revocation and tracking. The protocol is based on a linear secret sharing scheme and provides security properties such as data integrity, confidentiality, non-repudiation, and data freshness.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal
Summary: Service Oriented Architecture (SOA) is a methodology for promoting cooperation between services with diverse functions. Web service technology has paved the way for microservice architecture, but the increasing number of services has made it challenging to find the most suitable one. Various approaches have been proposed to improve the effectiveness and quality of service discovery, but there is a lack of comprehensive overview of web service discovery techniques. Therefore, a systematic literature review was conducted to analyze and classify existing methodologies and tools for discovering web services.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Yichao Lu, Huilin Li, Le Gao, Jiaxin Yu, Yong Yu, Hexing Su
Summary: In the post-epidemic era, the importance of e-voting in facilitating distributed decision-making is highlighted. This paper proposes a blockchain-based self-tallying e-voting system to address the limitations of existing systems and improve fairness and accountability.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Jose M. Barrera, Alejandro Reina-Reina, Ana Lavalle, Alejandro Mate, Juan Trujillo
Summary: The rise of AI and Deep Learning has made ML a common practice, but successful ML projects require domain knowledge and expertise in algorithms and data processing. This paper presents an approach to capture ML requirements and applies it to real-world projects, showing improved algorithm selection and data preprocessing, and adaptability to different domains.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Liju Ma, Hao Wang, Ziyu Niu, Zhi Li, Lei Wu, Xiaochao Wei, Ye Su
Summary: The problem of private set operation (PSO) has attracted wide attention from researchers in academia and industry as it enables data set analysis while preserving privacy. Over-threshold multi-party private set operation (OT-MP-PSO), a special class of PSO, finds applications in various scenarios such as voting systems and network operations centers. However, existing protocols have exponential computational costs with respect to the threshold t, limiting the range of t for efficient protocols. In this paper, we propose an efficient OT-MP-PSO protocol in the dual cloud setting without any limitation on the range of t. We also design a series of private set fine-grained computation protocols incorporating threshold conditions. Formal security proofs are provided for these protocols, and experimental results demonstrate their efficiency. Our protocol shows significant improvement over the state-of-the-art approach when applied to small data sets ranging from 101 to 103. A typical voting application scenario is also introduced to showcase the practicality of our protocols.
COMPUTER STANDARDS & INTERFACES
(2024)
Correction
Computer Science, Hardware & Architecture
Peter L. Bartlett, Philip M. Long
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Jose Luis de la Vara, Hector Bahamonde, Clara Ayora
Summary: Most safety-critical systems undergo rigorous assurance processes to ensure dependability, often in compliance with standards like DO-178C for aerospace software. However, following these standards can be challenging due to issues in their text, such as imprecision and ambiguity. This study introduces an approach using RQA - Quality Studio for evaluating the text quality of safety standards, identifying common issues like passive voice and imprecise modal verbs in DO-178C.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Flavia Bonomo-Braberman, Nick Brettell, Andrea Munaro, Daniel Paulusma
Summary: This article discusses the convexity and mim-width of bipartite graphs, and it proves that for certain families of graphs 7-t, the 7-t-convex graphs can be solved in polynomial time for NP-complete problems. It also explores the bounded and unbounded mim-width of 7-t-convex graphs for different sets 7-t.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain
Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Carla Binucci, Emilio Di Giacomo, William J. Lenhart, Giuseppe Liotta, Fabrizio Montecchiani, Martin Nollenburg, Antonios Symvonis
Summary: In this study, we investigate the problem of representing a graph as a storyplan, which is a model for dynamic graph visualization. We prove the NP-completeness of this problem and propose two parameterized algorithms as solutions. We also demonstrate that partial 3-trees always admit a storyplan and can be computed in linear time. Additionally, we show that even if the vertex appearance order is given, the problem of choosing how to draw the frames remains NP-complete.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Leszek Gasieniec, Tomasz Jurdzinski, Ralf Klasing, Christos Levcopoulos, Andrzej Lingas, Jie Min, Tomasz Radzik
Summary: This passage describes the Bamboo Garden Trimming Problem and presents approximation algorithms for both Discrete BGT and Continuous BGT.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Francesco Betti Sorbelli, Alfredo Navarra, Lorenzo Palazzetti, Cristina M. Pinotti, Giuseppe Prencipe
Summary: This study discusses the deployment of IoT sensors in an area that needs to be monitored. Drones are used to collect data from the sensors, but they have energy and storage constraints. To maximize the overall reward from the collected data and ensure compliance with energy and storage limits, an optimization problem called Multiple-drone Data-collection Maximization Problem (MDMP) is proposed and solved using an Integer Linear Programming algorithm.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)