Nowadays many intranets are deployed without enforcing any network security policy and just relying on security technologies such as firewalls or antivirus. In addition, the number and type of network entities are no ...
详细信息
ISBN:
(纸本)9783642004865
Nowadays many intranets are deployed without enforcing any network security policy and just relying on security technologies such as firewalls or antivirus. In addition, the number and type of network entities are no longer fixed. Typically, laptops, PDAs or mobile phones need to have access to network resources occasionally. Therefore, it is important to design flexible systems that allow an easy administration of connectivity without compromising security. This article shows how software agents may provide secure configurations to a computer network in a distributed, autonomous and dynamic manner. Thus. here we describe the system architecture of a prototype, the negotiation protocol it uses and how it works in a sample scenario.
softcomputing is a complex of methodologies that includes artificial neural networks, genetic algorithms, fuzzy logic, Bayesian networks, and their hybrids. It admits approximate reasoning, imprecision, uncertainty a...
ISBN:
(数字)9783540880790
ISBN:
(纸本)9783540880783
softcomputing is a complex of methodologies that includes artificial neural networks, genetic algorithms, fuzzy logic, Bayesian networks, and their hybrids. It admits approximate reasoning, imprecision, uncertainty and partial truth in order to mimic the remarkable human capability of making decisions in real-life, ambiguous environments. softcomputing has therefore become popular in developing systems that encapsulate human expertise. 'Applications of softcomputing: Updating the State of Art' contains a collection of papers that were presented at the 12th On-line World Conference on softcomputing in Industrial Applications, held in October 2007. This carefully edited book provides a comprehensive overview of the recent advances in the industrial applications of softcomputing and covers a wide range of application areas, including design, intelligent control, optimization, signal processing, pattern recognition, computer graphics, production, as well as civil engineering and applications to traffic and transportation systems. The book is aimed at researchers and practitioners who are engaged in developing and applying intelligent systems principles to solving real-world problems. It is also suitable as wider reading for science and engineering postgraduate students.
Performance visualization is one of the performance evaluation techniques that can be used to perform a global analysis of a system's behaviour, from its internal point of view. In this work, we describe how a vis...
详细信息
ISBN:
(纸本)9783642004865
Performance visualization is one of the performance evaluation techniques that can be used to perform a global analysis of a system's behaviour, from its internal point of view. In this work, we describe how a visualization tool, initially designed for classical distributed / parallel systems, has been adapted to visualize the internal behaviour of a multi-agent system. We present such an adaptation though a multi-agent application that can be considered as a typical example for analysis and performance study.
Rapid advances in imaging modalities have increased the importance of image segmentation techniques. Image segmentation is a process that divides an image into regions based on the image's internal components to d...
详细信息
ISBN:
(纸本)9783642032011
Rapid advances in imaging modalities have increased the importance of image segmentation techniques. Image segmentation is a process that divides an image into regions based on the image's internal components to distinguish between the component of interest and other components. We use this process to analyze the region of the component of interest and acquire more detailed quantitative data about the component. However, almost all processes of segmentation of anatomical structures have inherent problems such as the presence of image artifacts and the need for complex parameter settings. Here, we present a framework for a semi-automatic segmentation technique that incorporates a local classifier derived from a neighboring image. By using the local classifier, we were able to consider otherwise challenging cases of segmentation merely as two-class classifications without any complicated parameters. Our method is simple to implement and easy to operate. We successfully tested the method on computed tomography images.
A simple and effective web application firewall is presented. This system follows the anomalous approach, therefore it can detect both known and unknown web attacks. The system decides whether the incoming requests ar...
详细信息
ISBN:
(纸本)9783642040900
A simple and effective web application firewall is presented. This system follows the anomalous approach, therefore it can detect both known and unknown web attacks. The system decides whether the incoming requests are attacks or not aided by an XML file. The XML file contains the normal behavior of the target web application statistically characterized and is built from a set of normal requests artificially generated. Any request which deviates from the normal behavior is considered anomalous. The system has been applied to protect a real web application. An increasing number of training requests have been used to train the system. Experiments show that when the XML file has enough data to closely characterize the normal behaviour of the target web application, a very high detection rate is reached while the false alarm rate ramains very low.
This paper provides some insights related to building a working computational model of human-level mind. We propose to take a fresh look at some ideas propounded more than a century ago by William James and Sigmund Fr...
详细信息
ISBN:
(纸本)9783642032011
This paper provides some insights related to building a working computational model of human-level mind. We propose to take a fresh look at some ideas propounded more than a century ago by William James and Sigmund Freud, which were recently reconsidered by Peter Naur and ATR Brain-Building Group, respectively. Naur proposes his Synapse-State Theory of Human Mind (SST), while the research at ATR resulted in the Machine Psychodynamic paradigm (MTD). We argue that SST and MTD propose complementary ideas about implementation of mental functionalities, including those related to the quest of consciousness. The 20(th)-century AI gave machine the ability to learn. The great challenge in the 2 century AI is to make a robot actually want to learn. MTD proposes a solution based on pleasure defined as a measurable quantity to be used as a general reinforcement. SST proposes a neuroscience-inspired architecture, where the key blocks are item-nodes, attention-node, and specious-present excitation. MTD may supplement SST with a pleasure node and related Pleasure Principle.
Web growth has brought several problems to users. The large amount of information that exists nowadays in some particular Websites turns the task of finding useful information very difficult. Knowing users' visiti...
详细信息
ISBN:
(纸本)9783642004865
Web growth has brought several problems to users. The large amount of information that exists nowadays in some particular Websites turns the task of finding useful information very difficult. Knowing users' visiting pattern is crucial to owners, so that they may transform or customize the Website. This problem originated the concept known as Adaptive Website: a Website that adapts itself for the purpose of improving the user's experience. This paper describes a proposal for a doctoral thesis. The main goal of this work is to follow a multi-agent approach for Web adaptation. The idea is that all knowledge administration about the Website and its users, and the use of that knowledge to adapt the site to fulfil user's needs, are made by an autonomous intelligent agent society in a negotiation environment. The complexity of the problem and the inherently distributed nature of the Web, which is an open, heterogeneous and decentralized network, are reasons that justify the multi-agent approach. It is expected that this approach enables real-time Web adaptation with a good level of benefit to the users.
Quite often attacks are enabled by mis-configurations generated by human errors. Policy-based network management has been proposed to cope with this problem: goals are expressed as high-level rules that are then trans...
详细信息
ISBN:
(纸本)9783642040900
Quite often attacks are enabled by mis-configurations generated by human errors. Policy-based network management has been proposed to cope with this problem: goals are expressed as high-level rules that are then translated into low-level configurations for network devices. While the concept is clear, there is a lack of tools supporting this strategy. We propose an ontology-based policy translation approach that mimics the behaviour of expert administrators, without their mistakes. We use ontologies to represent the domain knowledge and then perform reasonings (based on best practice rules) to create the configurations for network-level security controls (e.g., firewall and secure channels). If some information is missing from the ontology, the administrator is guided to provide the missing data. The configurations generated by our approach are represented in a vendor-independent format and therefore can be used with several real devices.
Sensor networks play an increasing role in domains like security surveillance or environmental monitoring. One challenge in such systems is proper adaptation to and interpretation of events in the sensing area of an i...
详细信息
ISBN:
(纸本)9783642032011
Sensor networks play an increasing role in domains like security surveillance or environmental monitoring. One challenge in such systems is proper adaptation to and interpretation of events in the sensing area of an individual node;another challenge is the integration of observations from individual nodes into a common semantic representation of the environment. We describe a novel hierarchical architecture framework called SENSE (smart embedded network of sensing entities)I to meet these challenges. Combining multi-modal sensor information from audio and video modalities to gain relevant information about the sensed environment, each node recognizes a set of predefined behaviors and learns about usual behavior. Neighbor nodes exchange such information to confirm unusual observations and establish a global view. Deviations from "normality" are reported in a way understandable for human operators without special training.
This volume of advances in softcomputing and Lecture Notes in Computer Science vols. 5551, 5552 and 5553, constitute the Proceedings of the 6th International Symposium of Neural Networks (ISNN 2009) held in Wuhan, Ch...
ISBN:
(数字)9783642012167
ISBN:
(纸本)9783642012150
This volume of advances in softcomputing and Lecture Notes in Computer Science vols. 5551, 5552 and 5553, constitute the Proceedings of the 6th International Symposium of Neural Networks (ISNN 2009) held in Wuhan, China during May 26 - 29, 2009. ISNN is a prestigious annual symposium on neural networks with past events held in Dalian (2004), Chongqing (2005), Chengdu (2006), Nanjing (2007) and Beijing (2008). Over the past few years, ISNN has matured into a well-established series of international conference on neural networks and their applications to other fields. Following this tradition, ISNN 2009 provided an academic forum for the participants to disseminate their new research findings and discuss emerging areas of research. Also, it created a stimulating environment for the participants to interact and exchange information on future research challenges and opportunities of neural networks and their applications.
暂无评论