Problem cognition is often the first step to problem solving. Complex problem solving is often promoted by cooperative cognition. Our research work presented in this paper is initialed by a motivated example. Then met...
详细信息
Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such ...
详细信息
Formal description and verification of interaction protocols is an important field of MAS. In this paper a calculus for describing interaction protocols of MAS is defined. The calculus is based on process algebra and ...
详细信息
Multi-task learning techniques can employ the removed redundant information to improve prediction accuracy. Which features to add to the target and/or the input during multi-task learning is still an open issue. The p...
详细信息
ISBN:
(纸本)7302139229
Multi-task learning techniques can employ the removed redundant information to improve prediction accuracy. Which features to add to the target and/or the input during multi-task learning is still an open issue. The previous study used heuristic search methods. In this paper, a random method of genetic algorithm based multi-task learning (GA-MTL) is proposed to automatically determine the features for the input and/or the target. Experimental results on data sets from the real world show that GA-MTL is easy to use and obtains better performance than heuristic methods.
The reusability of components affects how much benefit we can get from the component based software development (CBSD). For enhancing the reuse of components, we propose an approach to derive the desired behavior from...
详细信息
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result rev...
详细信息
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result reveals that the tools building on finding vulnerable library functions have low false negatives rates but high false positives rates, the constrained based tools have low false positives rates but high false negatives rates, and the module checkers have high true positives rates when finding attacks against given security rules, bat have high false negatives rates when finding many kinds of vulnerabilities.
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses ecl...
详细信息
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses eclipse modeling framework plug-ins and graphical editing framework plug-ins to parse the models into platform specific models, which are responsible for implementation of grid services' clients and servers and their automatic deployment. This paper emphasizes on design method, which uses model drive architecture, and design process, which uses model-view-control.
Earthquakes will do great harms to the people, to estimate the future earthquake situation in Chinese mainland is still an open issue. There have been previous attempts to solve this problem by using artificial neural...
详细信息
The performance of the user's safeguard strategy is a direct factor which touches the reliability and cost of data link network in the whole procedure from fault discovering to trouble shooting. To improve the per...
详细信息
The performance of the user's safeguard strategy is a direct factor which touches the reliability and cost of data link network in the whole procedure from fault discovering to trouble shooting. To improve the performance of network, a novel model of data-link user's safeguard strategy based on reliability theory is designed in this present study. It minimizes the cost of equipments' safeguard procedure and normal running on the premise of the network and solves the problem of redundant management efficiently. An example is given to express the model.
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fo...
详细信息
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fountainhead of the fault quickly from a number of fault phenomenon. To get the fountainhead of the fault of network, a new type of fault detection system is presented. In the study, according to the principle of positive selection, the system builds up its event database. The behavior model whose frequency is higher will be analyzed and processed first. It improves the speed and effectiveness of fault location. The experiment system implemented by this method shows a good diagnostic ability.
暂无评论