The quantification of evaluating semantic relatedness among texts has been a challenging issue that pervades much of machine learning and natural language processing. This paper presents a hybrid approach of a text-mi...
详细信息
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning p...
详细信息
ISBN:
(纸本)0769521088
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, Artificial Neural Networks and Fuzzy Inference System, are used to design an Intrusion Detection System. SNORT is used to perform real time traffic analysis and packet logging on IP network during the training phase of the system. Then a signature pattern database is constructed using protocol analysis and Neuro-Fuzzy learning method. Using 1998 DARPA Intrusion Detection Evaluation Data and TCP dump raw data, the experiments are deployed and discussed.
This paper studies two families of codes over Z(4), MacDonald codes of type alpha and type beta. The torsion code, weight distribution, and Gray image properties are studied. Some interesting optimal binary codes are ...
详细信息
ISBN:
(纸本)0769519164
This paper studies two families of codes over Z(4), MacDonald codes of type alpha and type beta. The torsion code, weight distribution, and Gray image properties are studied. Some interesting optimal binary codes are also obtained. Two nonlinear families of binary codes are obtained via the Gray map.
Secure group communication enables only the users in that group securely communicate with each other. Because the users can join or leave the group dynamically, scalability is a major concern. In this paper we propose...
详细信息
This paper discusses the system structure, data organization and Web application development methodology used in the Chinese language distance learning system. An XML based random test generation algorithm is describe...
详细信息
ISBN:
(纸本)0769519164
This paper discusses the system structure, data organization and Web application development methodology used in the Chinese language distance learning system. An XML based random test generation algorithm is described in this paper. Some proposed future improvements to the system are also presented at the end of this paper.
Existing information retrieval methods are mainly based on either term similarity or latent semantics. To reduce irrelevant information searched, this paper presents a new approach for information retrieval by applyin...
详细信息
ISBN:
(纸本)0769519164
Existing information retrieval methods are mainly based on either term similarity or latent semantics. To reduce irrelevant information searched, this paper presents a new approach for information retrieval by applying methodology of association rules mining to a text database. Association semantics among terms of a document and a query are considered, such that the semantic similarity between the document and query may be reduced if they are somewhat irrelevant.
This research investigates the synergies of applying a Rapid Application Development (RAD) process model to support e-Business project management. The paper reports on the results of eleven unstructured interviews wit...
详细信息
ISBN:
(纸本)076951507X
This research investigates the synergies of applying a Rapid Application Development (RAD) process model to support e-Business project management. The paper reports on the results of eleven unstructured interviews with practicing e-Business project managers. The interviews were undertaken (1) to document the current development approaches being used by e-Business project managers and (2) to identify the risks and issues with which they are dealing. The research outcome supports a RAD approach for e-Business development and develops a framework of strategies and tactics which e-Business project managers could use to defend themselves against the threat of failure in a difficult and rapidly changing environment.
The recent proliferation of computing devices and the contexts in which they are used demand diversity in collaborative applications as well. The objective of our research is to enable conferees to share applications ...
详细信息
The role of the System Architect is key to the success of projects. But it has not received the attention necessary to define it separately from the roles of other key players, such as the role of Project Manager. To ...
详细信息
ISBN:
(纸本)0769519164
The role of the System Architect is key to the success of projects. But it has not received the attention necessary to define it separately from the roles of other key players, such as the role of Project Manager. To remedy this lack of study, IEEE Computer Society has attempted, lately, to define Software Engineering processes. It is the author's opinion that it is the System Architect role that should have been studied and articulated rather than the detailed processes. It is recommended that the SWEBOK process be refocused to further define the role.
The proceedings contains 145 papers from the conference on the internationalconference on informationtechnology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer net...
详细信息
ISBN:
(纸本)0769521088
The proceedings contains 145 papers from the conference on the internationalconference on informationtechnology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer networks;semi-fragile watermarking scheme for authentication of JPEG images;mitigating the untrusted terminal problem using conditional signatures;a security protocol for certified e-goods delivery;enhancing anonymity via market competition;a secure account-based mobile payment protocol and accountability logic for mobile payment protocols.
暂无评论