We describe several Markov models derived from the behaviour pattems of many users, which predict which documents a user is likely torequest next. We then present comparative results of the predictive accuracy of the ...
详细信息
Keyword search is a wildly popular way for querying XML document. However, the increasing volume of XML data poses new challenges to keyword search processing. Parallel database is an efficient solution for this probl...
详细信息
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-Task-Agents-Policy-Protocol) framework, which d...
详细信息
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-Task-Agents-Policy-Protocol) framework, which describes the collaboration of a team of agents. According to this framework, team members propose agents to perform a task, and the team applies a voting policy to choose an agent for the task. In this paper, we expand on three parameters of this framework. We model team members that have variable proposal making attitudes, and team members whose performance exhibits different levels of stability. We then consider two new voting policies for group decision-making, and use a simulation-based evaluation to investigate the interaction between the different types of team members and the voting policies. Our results show that our previous optimistic voting policy, which chooses the agent that seems to have the best performance, yields an unstable task performance for teams where even a few agents do not make the best possible proposal. In contrast, our new voting policies yield a stable task performance. Copyright 2005 ACM.
In April, 2021 a ransomware attack occurred on Colonial Pipeline. The details of this attack point to the hacking group DarkSide taking advantage of the design flaws in the Colonial Pipeline network. After extensive r...
详细信息
Due to the decentralized nature and emergence of new practices, tools, and platforms, microservices have become one of the most widely spread software architectures in the modern software industry. Furthermore, the ad...
详细信息
The distance transform (DT) is an operation to convert a binary image consisting of black and white pixels to a representation where each pixel has the distance of the nearest black pixel in a given distance metric. T...
详细信息
Managing the security of big data has become increasingly more complex as threat actors continue to maliciously exploit legacy and outdated systems of smaller and medium-sized firms. In this paper, we explore Astoria ...
详细信息
Across the US Department of Defense (DoD) exist many command and control (C2) systems built before the advent of the Internet or modern microprocessor-based computers. These systems are still in use today, yet they ar...
详细信息
Across the US Department of Defense (DoD) exist many command and control (C2) systems built before the advent of the Internet or modern microprocessor-based computers. These systems are still in use today, yet they are reaching the limits of their designs. In many cases, these legacy systems use non-standard data formats, out of favor programming languages, and specific hardware. In next generation combat systems, our C2 systems must interoperate with not only other DoD systems but also with the systems of our allies. In addition, the newer combat systems should be designed with reuse, extensibility, and loose coupling of components in mind to enable agile evolution of capabilities. Furthermore, these systems must operate in the net-centric environment securely, efficiently, and dynamically. To achieve the many goals of next generation combat systems, software engineers are promoting the use of a serviceoriented enterprise (SOE) to host applications designed with service-oriented architecture (SOA) in mind. The thrust of this effort is to decompose current legacy systems into reusable and manageable Web Services (WS) based on the current WS standards. This paper will describe, analyze, and provide lessons learned from the perspective of a large DoD agency involved in the migration of legacy C2 components to a SOA design.
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified ways that malicious users can exploit so...
详细信息
ISBN:
(纸本)1581138709
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified ways that malicious users can exploit software and how developers can fix the vulnerabilities. They have also built a variety of source code security checking software applications to partially automate the task of performing a security analysis of a program. Although great advances have been made in this area, the core problem of how the security vulnerabilities occur still exists. An answer to this problem could be a paradigm shift from imperative to functional programming techniques. This may hold the key to removing software vulnerabilities altogether. Copyright 2004 ACM.
This study explores Agile software Development (ASD) methodologies' effectiveness in achieving quality software products. It investigates the underexplored application of ChatGPT as a Quality Attribute Extractor i...
详细信息
暂无评论