The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs...
详细信息
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who p...
详细信息
Various systems have explored the idea of inferring 3D models from sketched 2D outlines. In all of these systems the underlying modeling methodology limits the complexity of models that can be created interactively. T...
详细信息
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanis...
详细信息
ISBN:
(纸本)3540459162
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanisms to deal noisy. However, noise still can induce the drastic drops in accuracy. In this paper, we present a clustering-based method to filter out hard instances and noise instances from data streams. We also propose a trigger to detect concept drifting and build RobustBoosting, an ensemble classifier, by boosting the hard instances. We evaluated RobustBoosting algorithm and AdaptiveBoosting algorithm [1] on the synthetic and real-life data sets. The experiment results show that the proposed method has substantial advantage over AdaptiveBoosting algorithm in prediction accuracy, and that it can converge to target concepts efficiently with hi h accuracy on datasets with noise level as high as 40%.
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systemsengineering. While agile methods seem to cope well with increasingly changing business env...
详细信息
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systemsengineering. While agile methods seem to cope well with increasingly changing business environments, it is far from obvious how these light-weight processes can best contribute to GSD. In this paper, method rationale is proposed as an analytical tool to understand the values that underpin agile methods and how these map to the GSD domain. Specifically, the paper presents an initial analysis of the values and goals embraced by the 'agile manifesto' and compares briefly with partial results from an ongoing study on the use of agile methods in GSD.
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replicat...
详细信息
ISBN:
(纸本)1595934472
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replication) that are exhibited in certain order in every successful worm infection. Behavioral footprinting complements content-based signature by enriching a worm's profile, which will be used in worm identification, an important task in post worm attack investigation and recovery. We propose an algorithm to extract a worm's behavioral footprint from the worm's traffic traces. Our evaluation with a number of real worms and their variants confirms the existence of worms' behavioral footprints and demonstrates their effectiveness in worm identification. Copyright 2006 ACM.
Publishing information in a virtual organization (VO) has become too easy due to low barriers;hence development of novel mechanisms to assess the quality of collected information has become a necessity. An evaluator m...
详细信息
ISBN:
(纸本)1595931082
Publishing information in a virtual organization (VO) has become too easy due to low barriers;hence development of novel mechanisms to assess the quality of collected information has become a necessity. An evaluator makes such an assessment based on the trust he/she places on the information. This paper presents a model for evaluating information trustworthiness in a data-intensive VO. When some information is derived from various data items gathered from multiple sources (each data item is called an object as used together with the term, subject), it is possible that no data value (called a version of the object) satisfies an evaluator's requirement with regard to information quality, if they are evaluated separately. According to the principle of object trust combination, if the final values of an object calculated by using significantly different methods are similar, then the evaluator places higher level of trust in the results. Intuitively, different versions of the same object that are calculated in different ways but have similar values provides "multiple-proofs" towards their correctness. We assume that a subject has no conflicting information on a given object. This paper uses a formal data structure to represent how a given piece of information (object version) has been formed and develops algorithms (see Section 4) to compare the component structure similarity/dissimilarity between two object versions. This helps in calculating the final trust values of the object. Copyright 2006 ACM.
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ...
详细信息
With the increasing growth of Internet users and the Web contents, it has led to much attention on scalability and availability of file system. Hence the ways to improve the reliability and availability of system, to ...
详细信息
ISBN:
(纸本)9078677015
With the increasing growth of Internet users and the Web contents, it has led to much attention on scalability and availability of file system. Hence the ways to improve the reliability and availability of system, to achieve the expected reduction in operational expenses and to reduce the operations of management of system have become essential issues. In FSG system, it improved the reliability of file system through replication to handle the effects of failures. An efficient consistency control protocol is previously proposed to ensure the consistency among replicas. In this paper, we leveraged the concept of intermediate file handle to cover the heterogeneity of file system and designed a mechanism, named Multi-component LOOKUP to solve the inefficiency problem of full pathname LOOKUP, to reduce the number of RPC requests going across the network and to allow a client to resolve a full path name in one operation. Above all, simplicity is our main design consideration.
Blended learning (BL) is a hybrid of classroom learning and online learning that includes the conveniences of online courses without the complete loss of face-to-face (F2F) contact. Advancements in communication techn...
详细信息
暂无评论