Recent advances in ubiquitous computing, autonomic computing, and artificial intelligence have led to a desire to better support user-oriented tasks by placing more intelligence In the computing infrastructure. This i...
详细信息
software testing is a very important phase of software development to ensure that the developed system is reliable. Due to huge number of possible combinations involved in testing and the limitation in the time and re...
详细信息
This paper studies Chinese character-based n-grams used in copy detection by Sogou Chinese News Corpus. Texts were compared each other to find out the same news event written by different authors which were viewed as ...
详细信息
This paper studies Chinese character-based n-grams used in copy detection by Sogou Chinese News Corpus. Texts were compared each other to find out the same news event written by different authors which were viewed as plagiarism by variable length (2
This paper investigates a new method for detecting masquerade attacks. A masquerade attack is a form of attack wherein the attacker uses someone else's identity or one system assumes the identity of another system...
详细信息
ISBN:
(纸本)9781595939098
This paper investigates a new method for detecting masquerade attacks. A masquerade attack is a form of attack wherein the attacker uses someone else's identity or one system assumes the identity of another system. One extremely simple and dangerous form of a masquerade attack occurs when an attacker begins using an unattended and unlocked computer. In this paper, we present a new method for detecting this type of masquerade attack, based on the notion of how the current user interacts with the graphical user interface. This method does not use mouse movements or keystroke dynamics, rather profiles how the user manipulates the windows, icons, menus, and pointers that comprise a graphical user interface. In order to evaluate the performance of our method, we conducted some empirical studies in a real operational environment. We consider previously published results and present new analysis concerning the impact of several key demographical factors on the effectiveness of GUI Usage Analysis. Our results indicate that the effectiveness of GUI Usage Analysis is greater in several groups, particularly on users who spend greater amounts of time operating a computer system on an average day. Copyright 2007 ACM.
Decision diagrams are an increasingly important tool in cutting-edge solvers for discrete optimization. However, the field of decision diagrams is relatively new, and is still incorporating the library of techniques t...
详细信息
Mobile Ad Hoc Networks (MANETs) are characterized by wireless connectivity through multi-hops, frequently changing network topology among wireless mobile devices. These characteristics require routing algorithms to be...
详细信息
Network Coding Opportunistic Routing (NCOR) methods are novel routing methods which can fit the broadcast nature of wireless mesh networks better. They can use the multi-user diversity advantage of the wireless channe...
详细信息
This innovative practice full paper describes a new software framework based on JU nit to test student work. Automated testing is an important capability when teaching software development at the college level. Ideall...
详细信息
ISBN:
(纸本)9798350351507
This innovative practice full paper describes a new software framework based on JU nit to test student work. Automated testing is an important capability when teaching software development at the college level. Ideally, a testing system will allow the instructor to efficiently create a thorough set of tests. Also, the software should facilitate grading tasks and produce informative reports that can be distributed to the students in a timely fashion. For Java development, the well-known JUnit framework enables a test suite to be applied to a student's submission. The mutools library presented here extends the JUnit framework in novel ways to accelerate the instructor's task of creating test suites. This new framework allows the instructor to augment tests with directives to control scoring and reporting. The four main capabilities of the software include: 1) An assert statement that does not terminate the test when it has failed. Instead, statistics are maintained regarding the success or failure of each assert statement. 2) Tests that can be configured to award partial credit. This can be useful in situations where the instructor deems it appropriate to award students some credit even in the presence of incorrect asserts. 3) Tests that can be grouped into categories that match a particular rubric item. Java annotations are placed on the test suite to define these categories. For example, @TestCategory(name= 'remove', points=10.0) specifies that 10 points will be awarded for successful implementation of all tests related to removing an item from the collection class. 4) Testing reports that contain varying levels of information. With minimal details, the testing report shows each testing category with the following information: assert statistics, whether the test timed out or had abnormal termination. This software has been used for many semesters and has been found to increase the speed at which the instructor can develop test suites for grading. The framework is av
In recent years, deep reinforcement learning (Deep RL) has been successfully implemented as a smart agent in many systems such as complex games, self-driving cars, and chat-bots. One of the interesting use cases of De...
详细信息
For state and non-state actors with sizable cyber interests, numerous breaches during this decade affirmed the necessity of having cyber counterintelligence (CCI) at the centre of cybersecurity efforts. Concurrent wit...
详细信息
暂无评论