Using Non-uniform Probability Distribution p* to Improve Identification Performance in Dense RFID Reader Environments

Author(s):  
Maria Victoria Bueno Delgado ◽  
Pablo Pavon Marino
2011 ◽  
Vol 2011 ◽  
pp. 1-18
Author(s):  
You Gao ◽  
Huafeng Yu

A new construction of authentication codes with arbitration and multireceiver from singular symplectic geometry over finite fields is given. The parameters are computed. Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.


1966 ◽  
Vol 28 ◽  
pp. 167-177
Author(s):  
Hisao Nomoto

Let Ω be the projective limit space of a sequence of probability space Ωn which is a certain subset of (n − 1)-dimensional sphere with the usual uniform probability distribution on it. T. Hida [2], starting from a sequence of finite dimensional flows which are derived from some one-parameter subgroups of rotations of spheres, constructed a flow {Tt} on Ω as the limit of them. Observing his method, the concept of consistency of flows which approximate {Tt} seems to play an essential role in his work [2]. As will be made clear in the following sections, the concept of consistency is closely related to the projective limiting structure of our basic space Ω. The purpose of this paper is to determine all the flows on Ω which can be approximated in the sense of [2] by finite dimensional flows.


Synthese ◽  
2021 ◽  
Author(s):  
Rush T. Stewart

AbstractEpistemic states of uncertainty play important roles in ethical and political theorizing. Theories that appeal to a “veil of ignorance,” for example, analyze fairness or impartiality in terms of certain states of ignorance. It is important, then, to scrutinize proposed conceptions of ignorance and explore promising alternatives in such contexts. Here, I study Lerner’s probabilistic egalitarian theorem in the setting of imprecise probabilities. Lerner’s theorem assumes that a social planner tasked with distributing income to individuals in a population is “completely ignorant” about which utility functions belong to which individuals. Lerner models this ignorance with a certain uniform probability distribution, and shows that, under certain further assumptions, income should be equally distributed. Much of the criticism of the relevance of Lerner’s result centers on the representation of ignorance involved. Imprecise probabilities provide a general framework for reasoning about various forms of uncertainty including, in particular, ignorance. To what extent can Lerner’s conclusion be maintained in this setting?


2018 ◽  
Vol 12 (3) ◽  
pp. 119-136 ◽  
Author(s):  
Wachirapong Jirakitpuwapat ◽  
Parin Chaipunya ◽  
Poom Kumam ◽  
Sompong Dhompongsa ◽  
Phatiphat Thounthong

Abstract In this paper, we construct some cartesian authentication codes from geometries over finite commutative rings. We only assume the uniform probability distribution over the set of encoding rules in order to be able to compute the probabilities of successful impersonation attack and substitution attack. Our methods are comfortable and secure for users, i.e., our encoding rules reduce the probabilities of successful impersonation attack and substitution attack.


2014 ◽  
Vol 06 (02) ◽  
pp. 1450027
Author(s):  
SHUFANG ZHAO ◽  
ZENGTI LI

In this paper, we construct a Cartesian authentication code from subspaces of singular symplectic space [Formula: see text] and compute its parameters. Assuming that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of successful impersonation attack and substitution attack are also computed.


2002 ◽  
Vol 12 (1) ◽  
Author(s):  
Yu.L. Pavlov ◽  
E.A. Loseva

AbstractWe consider the set of forests consisting of N recursive non-rooted trees with n vertices where the uniform probability distribution is defined. We give the complete description of the asymptotic behaviour of the maximum size of a tree in a forest as n → ∞.


2009 ◽  
Vol 01 (01) ◽  
pp. 105-114 ◽  
Author(s):  
ZENGTI LI ◽  
SUOGANG GAO ◽  
ZHONG WANG ◽  
BHAVANI THURAISINGHAM ◽  
WEILI WU

In this paper, we construct a Cartesian authentication code from subspaces of orthogonal space [Formula: see text] of odd characteristic and compute its parameters. Assuming that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of successful impersonation attack and substitution attack are also computed.


Sign in / Sign up

Export Citation Format

Share Document