Numerous network traffic classification approaches have recently been proposed. In general, these approaches have focused on correctly identifying a high percentage of total flows. However, on the Internet a small num...
详细信息
ISBN:
(纸本)1595937927
Numerous network traffic classification approaches have recently been proposed. In general, these approaches have focused on correctly identifying a high percentage of total flows. However, on the Internet a small number of "elephant" flows contribute a significant amount of the traffic volume. In addition, some application types like Peer-to-Peer (P2P) and FTP contribute more elephant flows than other applications types like Chat. In this opinion piece, we discuss how evaluating a classifier on flow accuracy alone can bias the classification results. By not giving special attention to these traffic classes and their elephant flows in the evaluation of traffic classification approaches we might obtain significantly different performance when these approaches are deployed in operational networks for typical traffic classification tasks such as traffic shaping. We argue that byte accuracy must also be used when evaluating the accuracy of traffic classification algorithms. Copyright 2007 ACM.
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are frequently used to realise such Servi...
详细信息
ISBN:
(纸本)9780769530642
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are frequently used to realise such Service-Oriented Architectures. In such systems, autonomic principles of self-configuration, self-optimisation, self-healing and self-adapting are desirable to ease management and improve robustness. In this paper we focus on the extension of the self management and autonomic behaviour of a WSRF container connected by a structured P2P overlay network to monitor and rectify its QoS to satisfy its SLAs. The SLA plays an important role during two distinct phases in the life-cycle of a WSRF container Firstly during service deployment when services are assigned to containers in such a way as to minimise the threat of SLA violations, and secondly during maintenance when violations are detected and services are migrated to other containers to preserve QoS. In addition, as the architecture has been designed and built using standardised modem technologies and with high levels of transparency, conventional web services can be deployed with the addition of a SLA specification.
Wireless Local Area Networks (WLANs) have become omnipresent: WLANs are available at airports, coffee shops, university campuses, corporate environments, and homes. This surge in the popularity of WLANs motivates the ...
详细信息
Humans have two distinct features with compared to any other living being;unique physical nature and emotions / feelings. Anybody who studies on humans or trying to construct human like machines should consider these ...
详细信息
RoboCupSoccer domain has several leagues which varies in the rule of play such as specification of players, number of players, field size, and time length. Nevertheless, each RoboCup league is a variant of a soccer le...
详细信息
RoboCupSoccer domain has several leagues which varies in the rule of play such as specification of players, number of players, field size, and time length. Nevertheless, each RoboCup league is a variant of a soccer league and therefore they are based on some basic rules of soccer. A layered design of agents system presented in the work of Garcia et al. (2004) shows a modular approach to build control for a team of robots participating in RoboCupSoccer E-League. Based on this design, we propose a generalized architecture offering flexibility to switch between leagues and programming language while maintaining Prolog as cognitive layer. Prolog is a very convenient tool to design strategies for soccer players using simple rules close to human reasoning. Sometimes this reasoning needs to deal with uncertainty, fuzziness or incompleteness of the information. In these cases it is useful Fuzzy Prolog (Guadarrama et al., 2004), (Munoz-Hernandez and Vaucheret, 2005), (Munoz-Hernandez and Gomez-Perez, 2005), (Munoz-Hernandez and Vaucheret, 2006). In this paper we propose to use a combination of Prolog (that is crisp) and Fuzzy Prolog to implement the cognitive layer in RoboCupSoccer, which has the advantage of incorporating as conventional logic as fuzzy logic in this layer. A prototype of a team based on this architecture has been build for RoboCup soccer simulator, and we show that this approach provides a convenient way of incorporating a team strategy in high level (human-like) manner, where technical details are encapsulated and fuzzy information is represented
Multi-Agent systems (MAS) are collection of loosely coupled intelligent agents. These systems operate in a distributed, highly dynamic, unpredictable and unreliable environment in order to meet their overall goals. Ag...
详细信息
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The successof any gas recognition system depends on its computationalcomplexity and its robustness. In this work,...
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The success
of any gas recognition system depends on its computational
complexity and its robustness. In this work, we propose a
new low-complexity recognition method which is tested and
successfully validated for tin-oxide gas sensor array chip. The
recognition system is based on a vector angle similarity measure
between the query gas and the representatives of the different gas
classes. The latter are obtained using a clustering algorithm based
on the same measure within the training data set. Experimented results on our in-house gas sensors array show more than 98 % of correct recognition. The robustness of the proposed method
is tested by recognizing gas measurements with simulated drift.
Less than 1 % of performance degradation is noted at the worst case
scenario which represents a significant improvement when
compared to the current state-of-the-art.
This paper describes the effect of TSPi (introduction to the team software process) on key performance dimensions in software projects, including the ability to estimate, the quality of the software produced and the p...
详细信息
This paper describes the effect of TSPi (introduction to the team software process) on key performance dimensions in software projects, including the ability to estimate, the quality of the software produced and the productivity achieved. The study examines the impact of the TSPi on the performance of 31 software teams. Finally an analysis comparing the results through two iterations is discussed.
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology for developing security-critical e-commerce applications. We present an approach to model these applications with the Unified Modeling Language (UML) [1] extended by a UML profile to tailor our models to security applications. Our intent is to (semi-) automatically generate a formal specification suitable for verification as well as an implementation from the model. Therefore we offer a development method seamlessly integrating semi-formal and formal methods as well as the implementation. This is a significant advantage compared to other approaches not dealing with all aspects from abstract models down to code. Based on this approach we can prove security properties on the abstract protocol level as well as the correctness of the protocol implementation in Java with respect to the formal model using the refinement approach. In this paper we concentrate on the modeling with UML and some details regarding the transformation of this model into the formal specification. We illustrate our approach on an electronic payment system called Mondex [10]. Mondex has become famous for being the target of the first ITSEC evaluation of the highest level E6 which requires formal specification and verification.
This paper will study and evaluate watermarking technique by Zain and Fauzi [1]. Recommendations will then be made to enhance the technique especially in the aspect of recovery or reconstruction rate for medical image...
详细信息
暂无评论