Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices and have special features, such as management of frequent topology ch...
详细信息
ISBN:
(纸本)9789898111845
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices and have special features, such as management of frequent topology changes. At each topology change, the access control policy of all nodes of the network must be automatically modified. In order to manage these access control requirements, Firewalls have been proposed by several researchers. However, many of the problems of traditional firewalls are aggravated due to these networks particularities, as is the case of ACL consistency. A firewall ACL with inconsistencies implies in general design errors, and indicates that the firewall is accepting traffic that should be denied or vice versa. This can result in severe problems such as unwanted accesses to services, denial of service, overflows, etc. Detecting inconsistencies is of extreme importance in the context of highly sensitive applications (e.g. health care). We propose a local inconsistency detection algorithm and data structures to prevent automatic rule updates that can cause inconsistencies. The proposal has very low computational complexity as both theoretical and experimental results will show, and thus can be used in real time environments.
systems development needs to reconcile views from many roles, such as domain experts and engineers. A particular challenge is the multitude of models for requirements and quality, which can get time consuming and erro...
详细信息
ISBN:
(纸本)9781605580234
systems development needs to reconcile views from many roles, such as domain experts and engineers. A particular challenge is the multitude of models for requirements and quality, which can get time consuming and error prone to trace, change, and verify. In this paper we introduce an ontology-supported component-based systemsengineering approach for the production automation domain that describes explicitly stakeholder quality requirements and traces design decisions to generate new system and software versions that implement these requirements. The ontology approach is expected to allow continuous modeling and extracting model views for all roles involved to a) improve the quality assurance of system requirements;b) support more explicit feedback on the quality of intermediate models during systems development;and c) provide better auditing capabilities of the systems development process. Based on an industry case study, we describe the ontology concept of the system, the development process, and how software quality can be measured and improved. Copyright 2008 ACM.
Background: One of the state-of-the-art techniques for question answering frameworks is using linked data by converting the user input into SPARQL which is the query language for linked data. Objective: The main targe...
详细信息
Background Facial features and measurements are utilized to analyze patients’ faces for various reasons, including surgical planning, scientific communications, patient-surgeon communications, and post-surgery evalua...
详细信息
Background Facial features and measurements are utilized to analyze patients’ faces for various reasons, including surgical planning, scientific communications, patient-surgeon communications, and post-surgery evaluations. Objectives There are numerous descriptions regarding these features and measurements scattered throughout the literature, and the authors did not encounter a current compilation of these parameters in the medical literature. Methods A narrative literature review of the published medical literature for facial measurements used for facial analysis in rhinoplasty was conducted through the electronic databases MEDLINE/PubMed and Google Scholar, along with a citation search. Results A total of 61 facial features were identified: 45 points (25 bilateral, 20 unilateral), 5 lines (3 bilateral, 2 unilateral), 8 planes, and 3 areas. A total of 122 measurements were identified: 48 distances (6 bilateral, 42 unilateral), 57 angles (13 bilateral, 44 unilateral), and 17 ratios. Supplemental figures were created to depict all features and measurements utilizing a frontal, lateral, or basal view of the face. Conclusions This paper provides the most comprehensive and current compilation of facial measurements to date. The authors believe this compilation will guide further developments (methodologies and software tools) for analyzing nasal structures and assessing the objective outcomes of facial surgeries, in particular rhinoplasty. Moreover, it will improve communication as a reference for facial measurements of facial surface anthropometry, in particular rhinoplasty.
An Opportunistic Network (OppNet), as opposed to a ubiquitous centralized network, relies on sporadic and opportunistic encounters between nodes to facilitate communication. The uncertainty about the node's nature...
With the rapid development of the next-generation mobile network,the number of terminal devices and applications is growing ***,how to obtain a higher data rate,wider network coverage and higher resource utilization i...
详细信息
With the rapid development of the next-generation mobile network,the number of terminal devices and applications is growing ***,how to obtain a higher data rate,wider network coverage and higher resource utilization in the limited spectrum resources has become the common research goal of ***-to-Device(D2D)communication technology and other frontier communication technologies have ***-to-Device communication technology is the technology that devices in proximity can communicate directly in cellular *** has become one of the key technologies of the fifth-generation mobile communications system(5G).D2D communication technology which is introduced into cellular networks can effectively improve spectrum utilization,enhance network coverage,reduce transmission delay and improve system throughput,but it would also bring complicated and various interferences due to reusing cellular resources at the same *** resource management is one of the most challenging and importing issues to give full play to the advantages of D2D *** resource allocation is an important factor that needs to be addressed in D2D ***,this paper proposes an optimization method based on the game-matching *** main idea is to model the optimization problem of the quality-of-experience based on user fairness and solve it through game-matching *** results show that the proposed algorithm effectively improved the resource allocation and utilization as compared with existing algorithms.
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack...
详细信息
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack of support for their development. Toolkit-level support has beenexploited to solve this problem, but this approach makes it hard to gain platform independence,easy maintenance and easy extension. In this paper a context-aware infrastructure is created,called WEAVER, to provide pen interaction services for both novel pen-based applications andlegacy GUI-based applications. WEAVER aims to support the pen as another standard interactivedevice along with the keyboard and mouse and present a high-level access interface to pen *** employs application context to tailor its service to different applications. By modeling theapplication context and registering the relevant action adapters, WEAVER can offer services,such as gesture recognition, continuous handwriting and other fundamental ink manipulations, toappropriate applications. One of the distinct features of WEAVER is that off-the-shelf GUI-basedsoftware packages can be easily enhanced with pen interaction without modifying the existing *** this paper, the architecture and components of WEAVER are described. In addition, examplesand feedbacks of its use are presented.
The European Higher Education Area is an example of diversity of political systems, higher education systems, socio-cultural and educational traditions, languages, aspirations and expectations. In the light of this di...
详细信息
ISBN:
(纸本)9789898111821
The European Higher Education Area is an example of diversity of political systems, higher education systems, socio-cultural and educational traditions, languages, aspirations and expectations. In the light of this diversity and variety, technical universities set its face to develop their internal quality assurance systems according to the European standards and the guidelines, focusing more on what should be done than how they should be achieved, but also to different factors and sources. This presentation explains the definition of quality policies in a Spanish engineering school, including engineering accreditation, programs, funding programs or improvement plans.
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym...
详细信息
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asymmetry in the credit assessment ***,this research designs a credit risk assessment model based on federated learning and feature selection for micro and small enterprises(MSEs)using multi-dimensional enterprise data and multi-perspective enterprise *** proposed model includes four main processes:namely encrypted entity alignment,hybrid feature selection,secure multi-party computation,and global model ***,a two-step feature selection algorithm based on wrapper and filter is designed to construct the optimal feature set in multi-source heterogeneous data,which can provide excellent accuracy and *** addition,a local update screening strategy is proposed to select trustworthy model parameters for aggregation each time to ensure the quality of the global *** results of the study show that the model error rate is reduced by 6.22%and the recall rate is improved by 11.03%compared to the algorithms commonly used in credit risk research,significantly improving the ability to identify ***,the business operations of commercial banks are used to confirm the potential of the proposed model for real-world implementation.
Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers’ (CSPs) ability to respond to client demands. In cloud market, the requests are announce...
详细信息
暂无评论