In this paper we point out the relevance of and the need for a theoretical discussion around UX research and practice. Although there is a good coverage of methodological and design related topics in the HCI literatur...
详细信息
In bioinformatics, protein sequence alignment is one of the fundamental tasks that scientists perform. Since the growth of biological data is exponential, there is an ever-increasing demand for computational power. Wh...
详细信息
Distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in ...
详细信息
A concept and practical implementation of a crowd management system which acquires input data by the set of monitoring cameras is presented. Two leading threads are considered. First concerns the crowd behavior analys...
详细信息
Games with remote controls and motion sensors that require the players to move, so-called exergames, have become very popular. Many of these games are also being played by the senior population. Participating in regul...
详细信息
This paper explores data speculation for improving the performance of Hardware Transactional Memory (HTM). We attempt to reduce transactional conflicts by decoupling them from cache coherence conflicts;many HTMs do no...
详细信息
The present work carries out a novel study on the determination of color acceptability thresholds using a Takagi-Sugeno-Kang (TSK) fuzzy approximation, performing an evaluation of the CIEDE2000(KL:KC:K H) color differ...
详细信息
Nowadays, the growth of the computer networks and the expansion of the Internet have made the security to be a critical issue. In fact, many proposals for Intrusion Detection/Prevention Systems (IDS/IPS) have been pro...
详细信息
ISBN:
(纸本)9781601321855
Nowadays, the growth of the computer networks and the expansion of the Internet have made the security to be a critical issue. In fact, many proposals for Intrusion Detection/Prevention Systems (IDS/IPS) have been proposed. These proposals try to avoid that corrupt or anomalous traffic reaches the user application or the operating system. Nevertheless, most of the IDS/IPS proposals only distinguish between normal traffic and anomalous traffic that can be suspected to be a potential attack. In this paper, we present a IDS/IPS approach based on Growing Hierarchical Self-Organizing Maps (GHSOM) which can not only differentiate between normal and anomalous traffic but also identify different known attacks. The proposed system has been trained and tested using the well-known DARPA/NSL-KDD datasets and the results obtained are promising since we can detect over 99, 4% of the normal traffic and over 99, 2 % of attacker traffic. Moreover, the system can be trained on-line by using the probability labeling method presented on this paper.
The Engineering technology National Forum (ETNF) was launched in 2008 by three engineering technology colleagues at Purdue University as an action team to address significant issues of the day affecting the ET educati...
详细信息
Machine translation (MT), with its broad potential use, has gained increased attention from both researchers and software vendors. To generate high quality translations, however, MT decoders can be highly computation ...
详细信息
暂无评论