The Pesticide Identification Assistant (PIA) is a knowledge-based system designed to assist an analytical chemist with the identification of pesticide residues in food products using gas-liquid chromatography. The dat...
详细信息
The Pesticide Identification Assistant (PIA) is a knowledge-based system designed to assist an analytical chemist with the identification of pesticide residues in food products using gas-liquid chromatography. The data are in the form of retention times and detector responses for a particular sample. The PIA system aids the analytic chemist in identifying the corresponding residue. The system has four goals: simplify routine analysis; provide interactive training for new analysts; provide an infallible memory supplement for experienced analysts; and provide a means of capturing expertise vulnerable to loss through retirement. A description is given of the problem domain and implementation concerns are addressed, particularly knowledge representation, inference techniques and user interface design. Particular challenges posed by the problem domain, particularly in the area of uncertainty, are considered. Plans for expansion and further research with the system are indicated.< >
A single-server queuing system with arrivals according to a Poisson process and general service times is considered. The system is assumed to be in steady state. Using linear algebraic techniques only, alternate deriv...
详细信息
A single-server queuing system with arrivals according to a Poisson process and general service times is considered. The system is assumed to be in steady state. Using linear algebraic techniques only, alternate derivations are given for the moments of the waiting time distributions and the Pollaczek-Khinchine transform equation for this queue. An explicit form is given for the residual response time and conditional waiting times. The first moment and the squared coefficient of variation of these distributions are derived, and lower bounds are given.< >
The current state of software engineering practices in medical software development is discussed. The authors focus on patient safety (freedom from harm by a medical device) and patient vulnerability (possible indirec...
详细信息
The current state of software engineering practices in medical software development is discussed. The authors focus on patient safety (freedom from harm by a medical device) and patient vulnerability (possible indirect harm due to erroneous output). A definition of medical software which can be viewed as a three-dimensional model for medical software classification is proposed. To reduce patient vulnerability and enhance patient safety, specific points of control are derived from the model, and the implications of classification and control for medical software are discussed.< >
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent...
详细信息
One of the variations of the Towers of Hanoi puzzle allows for p pegs, and for four pegs the solution to this variation is shown to have a simple structure which can be used to derive an iterative solution to the prob...
ISBN:
(纸本)9780897913485
One of the variations of the Towers of Hanoi puzzle allows for p pegs, and for four pegs the solution to this variation is shown to have a simple structure which can be used to derive an iterative solution to the problem.
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent...
详细信息
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent value of extant protection methods and provide a measure of the potential for inferential compromise through the use of one of the known attack tools. The authors explore the use of the concept of entropy as defined for information by C.E. Shannon (1948; 1951), for the purpose of quantifying information content in a database and develop a measure of vulnerability based on entropy. Use of the measure, when exact disclosure through the use of a tracker is anticipated, is characterized for both static and dynamic databases at design and operational time.< >
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the N...
详细信息
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the Newton's interpolating polynomial. The insertion of a new user/file into the system can be successfully implemented without recomputing all locks/keys. [ABSTRACT FROM AUTHOR]
Proposes two distinct cryptosystems based on Rabin's scheme. The first incorporates coding theory and provides encryption only. The second provides simultaneously both private encryption and digital signature for ...
详细信息
Proposes two distinct cryptosystems based on Rabin's scheme. The first incorporates coding theory and provides encryption only. The second provides simultaneously both private encryption and digital signature for network users. In the cases where the second scheme provides only encryption or only digital signature, the scheme provides that the bit ratio between plaintext and ciphertext is 1:1, i.e. equivalent to that of the RSA scheme.< >
S. Akl and P. Taylor (Proc. Crypto-82, p.237-250, 1982) proposed an elegant solution to the multilevel key distribution problem, using a cryptographic approach. In the present work, two problems associated with the Ak...
详细信息
S. Akl and P. Taylor (Proc. Crypto-82, p.237-250, 1982) proposed an elegant solution to the multilevel key distribution problem, using a cryptographic approach. In the present work, two problems associated with the Akl-Taylor scheme are considered. First, a time-memory tradeoff technique to overcome the problem of the extremely large memory space required by the Akl-Taylor scheme is proposed. Second, an extended scheme that localizes within a small region as much as possible the inserting/deleting problem associated with the Akl-Taylor scheme is proposed.< >
Electronic meeting systems (EMS) have been introduced inside IBM in a cooperative effort between IBM and the University of Arizona to address the demands of an increasingly competitive and turbulent business environme...
详细信息
Electronic meeting systems (EMS) have been introduced inside IBM in a cooperative effort between IBM and the University of Arizona to address the demands of an increasingly competitive and turbulent business environment. This paper presents and integrates the results of two field studies intended to evaluate the implications of electronic meeting system use at IBM. The first study focused on session process and outcome effectiveness, efficiency, and user satisfaction at a single IBM site. The second study collected data on EMS tool use and facilitation approach within sessions at four IBM sites. The two studies are complementary in reflecting the impact of computer-based support on group process and outcome. Effectiveness, efficiency, and user satisfaction are generally enhanced independent of type of activity supported or perspective, e.g., participant, facilitator, or session initiator. Facilitation training is a critical requirement for successful integration and application of electronic meeting system software and procedures in the group processes this paper addresses. [ABSTRACT FROM AUTHOR]
暂无评论