Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondete...
详细信息
Since the establishment of the Unified Modeling Language (UML) as a standard graphical notation for representing knowledge, new ideas have emerged about tools that can automatically extract knowledge from text and rep...
详细信息
ISBN:
(纸本)9781627486620
Since the establishment of the Unified Modeling Language (UML) as a standard graphical notation for representing knowledge, new ideas have emerged about tools that can automatically extract knowledge from text and represent it with UML diagrams. As the targeted representation of knowledge is in a graphical notation, we propose to also represent Natural Language (NL) and the knowledge it carries in a common graphical form, and then translate this Graphical NL (GNL) into another graphical form (UML).
Bandelet is a new image representation method, which can efficiently indicate the local directions and is adapted to the image geometry. The set partitioning in hierarchical trees (SPIHT) algorithm is an efficient met...
详细信息
Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of ...
详细信息
ISBN:
(纸本)9781605582917
Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the target machine collapses and network performance degrades. In this framework, nodes in an intermediate network share information about their local traffc observations, improving their global traffc perspective. In our proposal, we add to each node the ability of learning independently, therefore reacting dierently according to its situation in the network and local traffc conditions. In particular, this frees the administrator from having to guess and manually set the parameters distinguishing attacks from non-attacks: now such thresholds are learned and set from experience or past data. We expect that our framework provides a faster detection and more accuracy in front of distributed flooding attacks than if staticlters or single-machine adaptive mechanisms areused. We show simulations where indeed we observe a high rate of stopped attacks with minimum disturbance to the legitimate users. Copyright 2008 ACM.
Bayesian Reinforcement Learning has generated substantial interest recently, as it provides an elegant solution to the exploration-exploitation trade-off in reinforcement learning. However most investigations of Bayes...
详细信息
Object-oriented programming is supposed to produce better modularized structure than structural programming in that it encourages related state and behavior to be organized together in the form of classes, thus facili...
详细信息
ISBN:
(纸本)9781627486620
Object-oriented programming is supposed to produce better modularized structure than structural programming in that it encourages related state and behavior to be organized together in the form of classes, thus facilitating reuse and maintenance. To test whether classes in object-oriented software are well modularized, we conduct empirical studies on real world object-oriented software. By employing method from network analysis, object-oriented software structures are characterized as networks of methods. Metric and methods from community discovery research are applied to the analysis of modularization. From the empirical results, we conclude that not all object-oriented software classes are well modularized and there is a need for research on modularization improvement for classes of objected-oriented software.
The research in this paper focuses on an approach to reverse engineering web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of web-based legacy systems ...
详细信息
Abstraction is a basic foundation and a powerful means in science and engineering, such as philosophy, mathematics, cognitive informatics, computing, and softwareengineering, because any complex inference process is ...
详细信息
This paper presents an algorithm that permits the identification of apneas - cessations in the sleeping patient's respiratory flow - in the respiratory airflow signal and relates them to the drops in blood oxyhemo...
详细信息
In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised...
详细信息
暂无评论