作者:
Xu, LinConstraint Systems Laboratory
Department of Computer Science and Engineering University of Nebraska-Lincoln LincolnNE68588-0115 United States
The focus of our research is the design and evaluation of new reformulation techniques for temporal constraint networks. The general temporal constraint satisfaction problem (TCSP) is NP-hard [2]. Although a simplifie...
ISBN:
(纸本)3540439412
The focus of our research is the design and evaluation of new reformulation techniques for temporal constraint networks. The general temporal constraint satisfaction problem (TCSP) is NP-hard [2]. Although a simplified version of it, the simple temporal problem (STP), is tractable [2], techniques are being sought to further reduce the computational effort needed in practice in order to handle time critical conditions. One example is planning of the activities of an autonomous remote agent where some desirable properties such as dispatchability can be guaranteed.
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless...
详细信息
ISBN:
(纸本)1595932267
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications companies offer connections between their networks and the Internet. The ramifications of such connections, however, have not been fully recognized. In this paper, we evaluate the security impact of the SMS interface on the availability of the cellular phone network. Specifically, we demonstrate the ability to deny voice service to cities the size of Washington D.C. and Manhattan with little more than a cable modem. Moreover, attacks targeting the entire United States are feasible with resources available to medium-sized zombie networks. This analysis begins with an exploration of the structure of cellular networks. We then characterize network behavior and explore a number of reconnaissance techniques aimed at effectively targeting attacks on these systems. We conclude by discussing countermeasures that mitigate or eliminate the threats introduced by these attacks. Copyright 2005 ACM.
Open Educational Resources (OERs) are freely accessible materials for teaching, learning, and research that have been made available such that they can be freely used, modified, and shared. Prompted by the potential p...
详细信息
An analysis was carried out of several cyber-attack methods that use Social Networks and Media as their main resource, as well as their different countermeasures to mitigate the vulnerability and risk of information l...
详细信息
The success of affective interfaces lies in the fusion of emotional information coming from different modalities. This paper proposes a scalable methodology for fusing multiple affect sensing modules, allowing the sub...
详细信息
This paper proposes a hybrid genetic-SPSA algorithm based on random fuzzy simulation for solving dependent-chance programming in random fuzzy environments. In the algorithm, random fuzzy simulation is designed to esti...
详细信息
The main goal of the paper is to develop automatic control design methods for flexible aircraft. The motivation for the research is that such automatic control generation enables the inclusion of the control design al...
详细信息
This paper explores the design of dynamic network topologies which adjust to the workload they serve, in an online manner. Such self-adjusting networks (SANs) are enabled by emerging optical technologies, and can be f...
详细信息
As a serious concern of information security, steganography provides a covert communication channel for cyber-terrorism and cyber-crime. The widespread use enables MP3 compressed audio to become an excellent carrier f...
详细信息
In the service-oriented software environment, interactions between components are highly dependent on the exposed service interfaces. Therefore, designing an appropriate service interface is essential. In this paper, ...
详细信息
暂无评论