Antimalware applications represent one of the most important research topic in the area of information security threat. Indeed, most computer network issues have malwares as their underlying cause. As a consequence, e...
详细信息
Antimalware applications represent one of the most important research topic in the area of information security threat. Indeed, most computer network issues have malwares as their underlying cause. As a consequence, enhanced systems for analyzing the behavior of malwares are needed in order to try to predict their malicious actions and minimize eventual computer damages. However, because the environments where malwares operate are characterized by high levels of imprecision and vagueness, the conventional data analysis tools lack to deal with these computer safety applications. This work tries to bridge this gap by integrating semantic technologies and computational intelligence methods, such as the Fuzzy Ontologies and Fuzzy Markup Language (FML), in order to propose an advanced semantic decision making system that, as shown by experimental results, achieves good performances in terms of malicious programs identification.
Mobile devices are increasingly popular for the versatile capture and delivery of video content. However, the acquisition and transmission of large amounts of video data on mobile devices face fundamental challenges s...
详细信息
ISBN:
(纸本)9781450305181
Mobile devices are increasingly popular for the versatile capture and delivery of video content. However, the acquisition and transmission of large amounts of video data on mobile devices face fundamental challenges such as power and wireless bandwidth constraints. To support diverse mobile video applications, it is critical to overcome these challenges. We present a design framework that brings together several key ideas to enable energy-efficient mobile video management applications. First, we leverage off-the-shelf smartphones as mobile video sensors. Second, concurrently with video recordings we acquire geospatial sensor meta-data to describe the videos. Third, we immediately upload the meta-data to a server to enable low latency video search. This last step allows for very energy-efficient transmissions, as the sensor data sets are small and the bulky video data can be uploaded on demand, if and when needed. We present the design, a simulation study, and a preliminary prototype of the proposed system. Experimental results show that our approach substantially prolongs the battery life of mobile devices while only slightly increasing the search latency. Copyright 2010 ACM.
Program performance optimization is generally based on measurements of execution behavior of code segments. However, an equally important task for performance optimizations is understanding memory access behaviors and...
详细信息
Program performance optimization is generally based on measurements of execution behavior of code segments. However, an equally important task for performance optimizations is understanding memory access behaviors and thus, data structure access patterns and properties. Because memory-related problems in multi-core applications can have a significant impact on overall performance, optimizations in data access patterns will likely give a big boost to application performance. But effective diagnosis of performance bottlenecks requires that the memory measurements be related to high-level data structures (C, C++ arrays, structures, etc.). In this work, we present a low-overhead tool that captures memory traces and computes several metrics for performance characteristics of source-level data structures. Explicit consideration is given to measurement and diagnosis for multicore chips. Case studies which include (manual) use of the data structure memory access metrics to select and implement optimizations are given.
More and more serious global warming boosters the research on environmental protection from both the industries and academia. The collection of environmental data is a basic block for the environmental protection. Due...
More and more serious global warming boosters the research on environmental protection from both the industries and academia. The collection of environmental data is a basic block for the environmental protection. Due to the mobility and the release of stringent power constraints, vehicular sensor networks (VSN) provides an efficient way to collect environmental data. However, many existing work on the application of VSN in the environmental protection focuses on using the collected data to generate the environmental report. The increasing popularity of social networks motivates our interests in providing more innovative applications by integrating the VSN with social networks. In this paper, we introduce the structure of the integrated system, discuss the applications and the challenging issues.
Recent large-scale hierarchical classification tasks typically have tens of thousands of classes as well as a large number of samples, for which the dominant solution is the top-down method due to computational comple...
详细信息
We describe an experimental methodology for quantifying the effect of veiling glare in high-dynamic-range displays for simple detection tasks using a sensitivity experiment. A Gaussian spot was located on white noise ...
详细信息
ISBN:
(纸本)9781618390967
We describe an experimental methodology for quantifying the effect of veiling glare in high-dynamic-range displays for simple detection tasks using a sensitivity experiment. A Gaussian spot was located on white noise image backgrounds indicated with dark hairline markers and a ring was added to the image as the veiling glare source. A double random staircase technique with one-image-at-a-time paradigm was used to estimate intensity thresholds using published methods. Observer gaze position was recorded in real-time during the experiments and used to provide auditory feedback to ensure fixation on the region where the signal might be present and minimize significant changes in adaptation that would affect the thresholds.
We describe an experimental methodology for quantifying the effect of veiling glare in high-dynamic-range displays for simple detection tasks using a sensitivity experiment. A Gaussian spot was located on white noise ...
详细信息
Digital documents are prone to be compromised, especially the archival records which are intended to be stored for a very long period (say 30+ years). Many modern security mechanisms, such as cryptography, are poorly ...
详细信息
Digital documents are prone to be compromised, especially the archival records which are intended to be stored for a very long period (say 30+ years). Many modern security mechanisms, such as cryptography, are poorly suited to protect these archival records because it is often difficult to maintain decryption keys and update cryptographic systems over decades. An adversary that wants to tamper these archival records may only need to wait until the encryption algorithm used is compromised. In addition, the preservation of encrypted documents is not generally accepted in the international archival community. Thus, in this paper, we propose a framework for the assessment of the trustworthiness of digital records. The framework looks into evidence around digital records. On the assessment of the trustworthiness of a record, it structures the preserved evidence into an evidence tree and assigns evidential values to every pieces of evidence using experts' knowledge or a reputation system. Finally, using the Dempster-Shafer (D-S) theory, the framework combines these evidential values from different evidence in the face of uncertainty, and arrive at the trustworthiness of digital records.
We propose a novel method to generate partial products for reduced area parallel multipliers. Our method reduces the total number of partial product bits of parallel multiplication by about half. We call partial produ...
Patent classification is a large scale hierarchical text classification (LSHTC) task. Though comprehensive comparisons, either learning algorithms or feature selection strategies, have been fully made in the text cate...
详细信息
Patent classification is a large scale hierarchical text classification (LSHTC) task. Though comprehensive comparisons, either learning algorithms or feature selection strategies, have been fully made in the text categorization field, few work was done for a LSHTC task due to high computational cost and complicated structural label characteristics. For the first time, this paper compares two popular learning frameworks, namely, hierarchical support vector machine (SVM) and k -nearest neighbor ( k -NN) that are applied to a LSHTC task. Our experimental results show that the latter outperforms the former for the LSHTC task, which is quite different from the existing results for normal text categorization tasks. In addition, this paper compares different similarity measures and ranking strategies in k -NN framework for LSHTC task. From our empirical study, conclusions can be drawn that k -NN is more appropriate for the LSHTC task than hierarchical SVM. BM25 outperforms other similarity measures and ListWeak gains a better performance than other ranking strategies. Our empirical results also indicate that using all the labels of the retrieved neighbors can remarkably improve classification performance over only using the first label of the retrieved neighbors.
暂无评论