Based on the analysis of characteristics of current attacks,a collaborative intrusion detection model using coordination agent is *** this paper defines the inner structure of intrusion detection agents, introduces it...
详细信息
Based on the analysis of characteristics of current attacks,a collaborative intrusion detection model using coordination agent is *** this paper defines the inner structure of intrusion detection agents, introduces its collaboration principle and security solution. On the basis of the above research,an effective algorithm of collaborative detection is put *** this model,the complicated collaboration task is finished by some separate coordination agents,which are responsible for synthetically analyzing the detection task that the lower agents are unable to finish and are able to assign the task to the lower associated *** not only simplifies the building of detection agents and improves the extent and efficiency of collaboration,thus overcoming the shortcomings of direct collaboration among agents in traditional methods,but also enhances the capability of detecting complex *** the same time,an example shows the feasibility and validity of the model and the algorithm.
Based on the analysis of characteristics of current attacks, a collaborative intrusion detection model using coordination agent is proposed. Then we define the inner structure of intrusion detection agents, introduces...
详细信息
Based on the analysis of characteristics of current attacks, a collaborative intrusion detection model using coordination agent is proposed. Then we define the inner structure of intrusion detection agents, introduces its collaboration principle and security solution. On the basis of the above research, an effective algorithm of collaborative detection is put forward. In this model, the complicated collaboration task is finished by some separate coordination agents, which are responsible for synthetically analyzing the detection task that the lower agents are unable to finish and are able to assign the task to the lower associated agents. It not only simplifies the building of detection agents and improves the extent and efficiency of collaboration, thus overcoming the shortcomings of direct collaboration among agents in traditional methods, but also enhances the capability of detecting complex attacks. At the same time, an example shows the feasibility and validity of the model and the algorithm.
A new algorithm is proposed to solve constrained multiobjective problems. The constraints of the MOPs are taken account of in determining Pareto dominance. As a result, the feasibility of solutions is not an issue. At...
详细信息
ISBN:
(纸本)0780378040
A new algorithm is proposed to solve constrained multiobjective problems. The constraints of the MOPs are taken account of in determining Pareto dominance. As a result, the feasibility of solutions is not an issue. At the same time, it takes advantage of both the orthogonal design method to search evenly, and the statistical optimal method to speed up the computation. The output of the technique is a large set of solutions with high precision and even distribution. Notably, for an engineering problem WATER, it finds the Pareto-optimal set, which was previously unknown.
Maintenance and evolution are critical for website since the requirements often change, the developing cycle is short, while the life cycle is long. In order to make progress in this area, we focus on the users' r...
详细信息
ISBN:
(纸本)0769519105
Maintenance and evolution are critical for website since the requirements often change, the developing cycle is short, while the life cycle is long. In order to make progress in this area, we focus on the users' responses and attitudes. So we begin our work at the log files on the side of website server, gathering the users' visiting information and the server's responses. Thus we obtain our weighted structure model. Then, we analyze and discuss such information to identify the key pages, the predominate pages and the users' visiting patterns. And we can improve the testing efficiency based on these knowledge. All these will help to improve the structure of the site, fulfill the functionality of the site, and enhance users' visiting efficiency.
This paper proposes the notion of a greylevel difference classification algorithm in fractal image compression. Then an example of the greylevel difference classification algo rithm is given as an improvement of the q...
详细信息
This paper proposes the notion of a greylevel difference classification algorithm in fractal image compression. Then an example of the greylevel difference classification algo rithm is given as an improvement of the quadrant greylevel and variance classification in the quadtree-based encoding algorithm. The algorithm incorporates the frequency feature in spatial analysis using the notion of average quadrant greylevel difference, leading to an enhancement in terms of encoding time, PSNR value and compression ratio.
An approach based on adaptive congestion control and adaptive error recovery with RS (Reed-Solomon) coding method is presented for efficient video transmission over the Internet. Featured by weighted moving average ra...
详细信息
An approach based on adaptive congestion control and adaptive error recovery with RS (Reed-Solomon) coding method is presented for efficient video transmission over the Internet. Featured by weighted moving average rate control and TCP-friendliness, AVSP, a novel adaptive video streaming protocol, is designed with adjustable rate control parameters so as to respond quickly to the QoS status fluctuation during video transmission over the Internet. Combined with congestion control policy, an adaptive RS coding error recovery scheme with variable parameters is presented to enhance the robustness of MPEG video transmission over the Internet with restriction to the total system bandwidth .
In this paper, the problem of checking a timed automaton for a Duration Cal-culus formula of the form Temporal Duration Property is addressed. It is shown that TemporalDuration Properties are in the class of discretis...
详细信息
In this paper, the problem of checking a timed automaton for a Duration Cal-culus formula of the form Temporal Duration Property is addressed. It is shown that TemporalDuration Properties are in the class of discretisable real-time properties of Timed Automata,and an algorithm is given to solve the problem based on linear programming techniques andthe depth-first search method in the integral region graph of the automaton. The complexityof the algorithm is in the same class as that of the solution of the reachability problem of timedautomata.
Ackermann functions are examples of nonprimitive recursive function which grow so fast with respect to their arguments. In this paper, we present Ackermann functions in detail and introduce its influence on theoretica...
详细信息
Ackermann functions are examples of nonprimitive recursive function which grow so fast with respect to their arguments. In this paper, we present Ackermann functions in detail and introduce its influence on theoretical computerscience.
For small screen devices, such as PDAs, which totally depend on a pen-based user interface, traditional menu-selection/button-clicking based user interface becomes inconvenient for graphics inputting. In this paper, a...
详细信息
User adaptation is critical in the future design of human-computer interaction systems. Many pattern recognition problems, such as handwriting/sketching recognition and speech recognition, are user dependent since dif...
详细信息
User adaptation is critical in the future design of human-computer interaction systems. Many pattern recognition problems, such as handwriting/sketching recognition and speech recognition, are user dependent since different users' handwritings, drawing styles, and accents are different. Hence, the classifiers for solving these problems should provide the functionality of user adaptation so as to let all users experience better recognition results. However, the user adaptation functionality requires the classifiers have the incremental learning ability in order to learn fast. In this paper, an SVM-based incremental active learning algorithm is presented to solve this problem. By utilizing the support vectors and only a small portion of the nonsupport vectors as well, in addition to the new interrogative samples, in the iterative training and reclassification cycle, both the training time and the storage space are saved with only very little classification precision being lost. Theoretical analysis, experimentation, evaluation, and real application samples in our online graphics recognition system are presented to show the effectiveness of this algorithm.
暂无评论