Relying on dependency packages accelerates software development, but it also increases the exposure to security vulnerabilities that may be present in dependencies. While developers have full control over which depend...
详细信息
IoT is an important part of the new generation of information technologies and the next big thing in the IT industry after the computer and the internet. The IoT has great development potential and a wide range of pos...
详细信息
Genomic variants, which can disrupt cellular functions, present a challenge in distinguishing deleterious from benign instances. While assessing genome-wide functional impacts, many current algorithms neglect protein ...
详细信息
By viewing the training of classifiers as an optimisation problem, we have developed a method in this paper to train a new type of nearest centroid classifier with multiple centroids per class, using Particle Swarm Op...
详细信息
The problem of effectively designing and analyzing software to meet security requirements is an important research topic. This paper presents an approach to model and analyze security aspects for software architecture...
详细信息
ISBN:
(纸本)9781615677191
The problem of effectively designing and analyzing software to meet security requirements is an important research topic. This paper presents an approach to model and analyze security aspects for software architecture. In the approach, security is represented as a set of aspects, which is based on the current research on security patterns. A security aspect is defined in UML, including the aspect's static view and dynamic view. The static view of the aspect is presented in UML class diagram and the dynamic view of the aspect is presented in UML sequence diagram. The aspect definition is based on the corresponding security pattern. Then to analyze security aspects, an architecture design extended with security aspects is translated into formal method Promela. With formal analysis tools, the inconsistency of a security architecture design can be detected. The approach is illustrated using an example security aspect - Data origin authentication aspect and an example system - Domain Name System (DNS).
Performance on multi-hop networks suffers from limited throughput capacity and poor scalability problems as the network size or density increases (Gupta and Kumar, 2000). One way to alleviate these problems is to equi...
详细信息
Performance on multi-hop networks suffers from limited throughput capacity and poor scalability problems as the network size or density increases (Gupta and Kumar, 2000). One way to alleviate these problems is to equip each node with multiple radios. As hardware cost drops, this approach becomes more and more appealing and feasible. By tuning radios into non-interfering channels, the wireless spectrum can be more efficiently utilized, thus enhancing the whole network performance. This work extensively evaluates Dynamic Source Routing Protocol(DSR) (Johnson and Maltz, 1996) for multi-radio multi-hop networks. Through simulations, DSR with multi-radio extensions exhibits an overall performance improvement for throughput, packet delivery rate and latency.
Parametric search is a useful tool in geometric optimization. Invented by Nimrod Megiddo in 1983, it has been widely used in computational geometry. Unfortunately, this technique has rarely been used in the combinator...
详细信息
Parametric search is a useful tool in geometric optimization. Invented by Nimrod Megiddo in 1983, it has been widely used in computational geometry. Unfortunately, this technique has rarely been used in the combinatorial optimization community in China. In this paper, we introduce parametric search via three new geometric optimization applications.
Keywords Parametric search - geometric optimization - facility location
This research presents an enhanced version of the Technology Acceptance Model (TAM), which integrates usability and learning objectives to evaluate the effect of adopting virtual laboratories on student performance. D...
详细信息
In recent years a huge number of online auctions that use Multi Agent systems have been created. As a result there are numerous auctions that provide the same product. In this case each customer can buy a product with...
详细信息
ISBN:
(纸本)1565553195
In recent years a huge number of online auctions that use Multi Agent systems have been created. As a result there are numerous auctions that provide the same product. In this case each customer can buy a product with the lowest possible price. But searching between auctions in terms of finding the suitable product can be time consuming for consumers and also providing products in different markets is a difficult task for suppliers. So the need for an autonomous agent in these types of markets is deeply felt. On the other side the structure of an auction mechanism that provides the environment for traders to operate their trades is vital. Despite all the research that has been done about online auctions, most of them were about single markets. But in real world the stocks and commodities of companies are listed and traded in different markets. There is a growing tendency towards research about online auctions and Market Design. Particularly in recent years CAT (CATallactics) game has provided an important opportunity to develop and test new techniques in this field. In this paper after introducing CAT game and PersianCAT agent, we want to challenge the conventional accepting policy used in stock markets like New York Stock Exchange and provide a better solution that improves the general performance of the markets.
This paper proposes a novel method to address the protection necessary to mitigate flooding attacks in VoIP networks which can produce rapid saturation of a firewall and crippling of a VoIP switch. The paper proposes ...
详细信息
暂无评论