Today, it has become more difficult for individual designer to fulfill the complicated design work due to the complexity of modern products. Grid provides a supporting environment for collaborative design. Cooperating...
详细信息
ISBN:
(纸本)184000025
Today, it has become more difficult for individual designer to fulfill the complicated design work due to the complexity of modern products. Grid provides a supporting environment for collaborative design. Cooperating work is the key to ensure the success of products design. Developing within the grid-based environment that is suitable to the demand of manufacturing design on special area is a challenge to the traditional methods of software development. In this paper, it creates a framework based manufacturing grid that uses peer-to-peer technology. According to this framework, there is a cooperating design environment, in which designers can make designing of machine tools. It also discusses the schedule of cooperating.
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for active application communication for active networks. JASIAC can work against &qu...
详细信息
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for active application communication for active networks. JASIAC can work against "un-authorization access" and "masquerading" quite well and work efficiently with "malicious access " and "direct DoS attack". It stores the variables and methods to be published in a public variable pool and public method pool respectively, so it makes the security manageable and efficient; it also provides multilevel security mechanisms such as timed variable, hiding inner name, parameter by value and read-only parameter to make the security reliable and flexible.
In distributed diagnosis it may be useful to achieve local consistency among local estimates. For that purpose the Computational Procedure for Local Consistency (CPLC) was proposed to achieve the supremal local suppor...
详细信息
In distributed diagnosis it may be useful to achieve local consistency among local estimates. For that purpose the Computational Procedure for Local Consistency (CPLC) was proposed to achieve the supremal local support, which represents one type of local consistency. It has been shown that if CPLC terminates then the result is in fact the supremal local support. However, in this paper it is shown that, even if all initial estimates are regular languages, the termination of CPLC is undecidable. Moreover, these difficulties are not confined to this specific procedure: it is undecidable whether the supremal local support corresponding to an arbitrary collection of regular initial languages is componentwise empty; consequently, the supremal local support is effectively uncomputable.
This paper develops a wavelet based distributed ID model approach to analyses network traffic in detail. We adopt wavelet technique to analyze and model ID system to find the attack behavior in network. Our model can ...
详细信息
This paper develops a wavelet based distributed ID model approach to analyses network traffic in detail. We adopt wavelet technique to analyze and model ID system to find the attack behavior in network. Our model can post attack characteristic more clearly and, by way of improve the veracity, we compare corresponding network node signals of wavelet decomposition. We simulate attacks and the model can detect attack more precisely than the previous model does.
The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed f...
详细信息
The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed for DNS in terms of security and dependability. However, the current secure DNS (DNSSEC) standard has still several problems that need further consideration. For example, online updates and denial of service attacks are not sufficiently addressed. These problems are serious obstacles that might prevent DNSSEC from replacing the traditional DNS. In this paper we discuss several of these technical and economic problems. To address these issues, we propose a simple extension to the existing DNS. It is SSL based and individual domains can decide independently of each other if and when to adopt the extensions. We show how to implement these extensions with the help of a simple proxy DNS server.
This paper presents novel algorithm for mining frequent itemsets in sparse database, compared with existing algorithm our algorithm has visible advantage. With this algorithm, the scans is less in transaction database...
详细信息
This paper presents novel algorithm for mining frequent itemsets in sparse database, compared with existing algorithm our algorithm has visible advantage. With this algorithm, the scans is less in transaction database, only one time in little and middle transaction database, and not more than two times in large database. In the algorithm, when the transaction database is scanned, the transaction items are saved in unit triplet, and the count of every transaction item is saved in 1-dimension array so that the frequent itemsets are generated in memory. So I/O spending is reduced greatly. The experimental results show that our algorithm is very promising.
We improve, by using register machines, some existing universality results for specific models of P systems. P systems with membrane creation are known to generate all recursively enumerable sets of vectors of non-neg...
详细信息
We improve, by using register machines, some existing universality results for specific models of P systems. P systems with membrane creation are known to generate all recursively enumerable sets of vectors of non-negative integers, even when no region (except the environment) contains more than one object of the same kind. We here show that they generate all recursively enumerable languages, and two membrane labels are sufficient (the same result holds for accepting all recursively enumerable vectors of non-negative integers). Moreover, at most two objects are present inside the system at any time in the generative case. Then we prove that 10 + m symbols are enough to generate any recursively enumerable language over m symbols. P systems with active membranes without polarizations are known to generate all recursively enumerable sets of vectors of non-negative integers. We show that they generate all recursively enumerable languages; four starting membranes with three labels or seven starting membranes with two labels are sufficient. P systems with active membranes and two polarizations are known to generate/accept all recursively enumerable sets of vectors of non-negative integers, only using rules of rewriting and sending objects out. We show that accepting can be done by deterministic systems. Finally, remarks and open questions are presented.
We propose a simulation-based method in the verification of SoC bus system. By the method, constrained-random vector is used to make simulation first;then a coverage analysis is made in the simulation process until a ...
详细信息
We propose a simulation-based method in the verification of SoC bus system. By the method, constrained-random vector is used to make simulation first;then a coverage analysis is made in the simulation process until a certain coverage statistics is obtained. Finally, the test vector is manually generated. We use this method to verify a SoC system and get a satisfactory result by reducing the time of simulation effectively.
Prediction of the secondary structure of a protein from its aminoacid sequence remains an important and difficult task. Up to this moment, three generations of Protein Secondary Structure Algorithms have been defined:...
详细信息
Adaptation is one of the necessary capabilities of any expert system. In a traditional expert system, the evolving environment is often treated in a static view. And the system accepts the change negatively. Our focus...
详细信息
ISBN:
(纸本)0780386531
Adaptation is one of the necessary capabilities of any expert system. In a traditional expert system, the evolving environment is often treated in a static view. And the system accepts the change negatively. Our focus in this paper is to construct an adaptive CBR model which can learn continually through detecting feedbacks from the outside to partially release this. Knowledge base here is improved gradually so to enhance the system's adaptation of solving problems in dynamic environment.
暂无评论