Artificial neural network is a theory and technology developing speedily in intelligence research area of computer in recent years, which is applied in modeling of computer system simulation due to no need of establis...
详细信息
Based on softwareengineering discipline, unit testing play significant rule in testing procedure to determine if the source code fit for use. A unit test is the smallest testable part of an application. In basic lear...
详细信息
AADL supports standard accurate modeling of embedded systems and has been widely used in the embedded field. However, as a new modeling language, modeling and analysis tools of AADL are not mature enough. In the field...
详细信息
This paper describes the application of MIMO technology in CMMB system, proves the MIMO can increase the channel capacity remarkably comparing to traditional CMMB systems. This paper also describes the using of CSIT i...
详细信息
As a kind of feature selection algorithm applied widely in intrusion forensics, information gain could solve the problem of high-dimension and magnanimous, but it neglects correlation between features, which could lea...
详细信息
In this paper we provide an extension of maxmin fairness to the case of multiple objectives and different agent preferences by the definition of the maxmin multi-fairness relation. This generic relation is based on a ...
详细信息
The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distributed but actually aggregated services, such as e...
详细信息
ISBN:
(纸本)9783642191244
The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distributed but actually aggregated services, such as end-to-end data protection, non-repudiation or patient consent management. Currently, there is no support for integrating complex security services in web architectures, nor are approaches from other architectural models easily portable. In this paper we present the architecture of a security middleware, aimed at providing a reusable solution bringing support for complex security requirements into the application architecture, while addressing typical web architecture challenges, such as the tiered model or the lack of sophisticated client-side logic. We both evaluate the security of the middleware and present a case study and prototype implementation, which show how the complexities of a web architecture can be dealt with while limiting the integration effort.
The reliability of measured data, which can be subject to both gross and random errors, is of great importance for the monitoring and evaluation of process performance and the determination of control action. This pap...
详细信息
The active infrared thermography, using external energy source to produce a thermal contrast between the feature of interest and the background, is relatively new NDT technique. The microwaves applied in this method a...
详细信息
Workflow is the technology of implementing automated process. It has a wide use in many fields. The study of workflow engine is a key problem of implement of workflow system. The traditional workflow engine has many l...
详细信息
暂无评论