The current best conformant probabilistic planners encode the problem as a bounded length CSP or SAT problem. While these approaches can find optimal solutions for given plan lengths, they often do not scale for large...
详细信息
Security-oriented risk assessment tools are used to determine the impact of certain events on the security status of a network. Most existing approaches are generally limited to manual risk evaluations that are not su...
详细信息
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime reconstruction. Based on a hypothesis of th...
详细信息
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were...
详细信息
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were hardly represented in the participating filters, and not represented at all in the better results. A non-traditional technique - Prediction by Partial Matching (PPM) - performed exceptionally well, at or near the top of every test. Are the TREC results an anomaly? Is PPM really the best method for spam filtering? How are these results to be reconciled with others showing that methods like Support Vector Machines (SVM) are superior? We address these issues by testing implementations of five different classification methods on the TREC public corpus using the online evaluation methodology introduced in TREC. These results are complemented with cross validation experiments, which facilitate a comparison of the methods considered in the study under different evaluation schemes, and also give insight into the nature and utility of the evaluation regimens themselves. For comparison with previously published results, we also conducted cross validation experiments on the Ling-Spam and PU1 datasets. These tests reveal substantial differences attributable to different test assumptions, in particular batch vs. on-line training and testing, the order of classification, and the method of tokenization. Notwithstanding these differences, the methods that perform well at TREC also perform well using established test methods and corpora. Two previously untested methods - one based on Dynamic Markov Compression and one using logistic regression - compare favorably with competing approaches.
A growing number of applications in distributed environment involve very large data sets that are inherently distributed among a large number of autonomous sources over a network. The demand to extend data mining tech...
详细信息
Digital watermarking techniques have been considered as an effective solution to protect the copyright of multimedia data. In this paper, an image watermarking scheme based on discrete wavelet transform is proposed. T...
详细信息
Digital watermarking techniques have been considered as an effective solution to protect the copyright of multimedia data. In this paper, an image watermarking scheme based on discrete wavelet transform is proposed. The watermarks are two-dimension self-orthogonal finite-length sequences which are embedded in the middle frequency wavelet coefficients. Watermark detection is accomplished without the original image by computing the correlation between the watermarked coefficients and the watermarking signal. Experiment results show that the proposed watermarking scheme is perceptual invisible and robust against attacks such as JPEG compression, additive noise and filtering.
Blum and Hewitt first proposed two-dimensional automata as a computational model of two-dimensional pattern processing, and investigated their pattern recognition abilities in 1967. Since then, many researchers in thi...
详细信息
Blum and Hewitt first proposed two-dimensional automata as a computational model of two-dimensional pattern processing, and investigated their pattern recognition abilities in 1967. Since then, many researchers in this field have been investigating a lot of properties about automata on a two-dimensional tape. By the way, the question of whether processing three-dimensional digital patterns is much more difficult than two-dimensional ones is of great interest from the theoretical and practical standpoints. Moreover, the recent advances in motion image processing, robotics and so on prompted us to analyze computational complexity of three-dimensional pattern processing. Thus, the research of three-dimensional automata as a computational model of three-dimensional pattern processing has also been meaningful. From this viewpoint, we introduced a three-dimensional alternating Turing machine (3-ATM) operating in parallel. In this paper, we continue the investigations about 3-AT M's, introduce a three-dimensional synchronized alternating Turing machine (3-SAT M), and investigate some properties of 3-S AT M's whose input tapes are restricted to cubic ones. The main topics of this paper are: (1) hierarchies based on the number of processes of 3-S AT M's, and (2) recognizability of connected pictures by 3-S AT M's.
Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also support additional features that, whil...
详细信息
This paper addresses functional modelling of complex distributed systems via an objective and automatic procedure. The presented methodology uses the structural representation of the system and the notion of causality...
详细信息
Background. Cell growth underlies many key cellular and developmental processes, yet a limited number of studies have been carried out on cell-growth regulation. Comprehensive studies at the transcriptional, proteomic...
Background. Cell growth underlies many key cellular and developmental processes, yet a limited number of studies have been carried out on cell-growth regulation. Comprehensive studies at the transcriptional, proteomic and metabolic levels under defined controlled conditions are currently lacking. Results. Metabolic control analysis is being exploited in a systems biology study of the eukaryotic cell. Using chemostat culture, we have measured the impact of changes in flux (growth rate) on the transcriptome, proteome, endometabolome and exometabolome of the yeast Saccharomyces cerevisiae. Each functional genomic level shows clear growth-rate-associated trends and discriminates between carbon-sufficient and carbon-limited conditions. Genes consistently and significantly upregulated with increasing growth rate are frequently essential and encode evolutionarily conserved proteins of known function that participate in many protein-protein interactions. In contrast, more unknown, and fewer essential, genes are downregulated with increasing growth rate;their protein products rarely interact with one another. A large proportion of yeast genes under positive growth-rate control share orthologs with other eukaryotes, including humans. Significantly, transcription of genes encoding components of the TOR complex (a major controller of eukaryotic cell growth) is not subject to growth-rate regulation. Moreover, integrative studies reveal the extent and importance of post-transcriptional control, patterns of control of metabolic fluxes at the level of enzyme synthesis, and the relevance of specific enzymatic reactions in the control of metabolic fluxes during cell growth. Conclusion. This work constitutes a first comprehensive systems biology study on growth-rate control in the eukaryotic cell. The results have direct implications for advanced studies on cell growth, in vivo regulation of metabolic fluxes for comprehensive metabolic engineering, and for the design of genome-scale s
暂无评论