The AAAI-11 workshop program was held Sunday and Monday, August 7-18, 2011, at the Hyatt Regency San Francisco in San Francisco, California USA. The AAAI-11 workshop program included 15 workshops covering a wide range...
详细信息
In order to exist and develop in an unpredictable and rapidly changing surroundings,it is necessary for enterprise to have an agile information systems to support its *** agile information system is the one can recons...
详细信息
In order to exist and develop in an unpredictable and rapidly changing surroundings,it is necessary for enterprise to have an agile information systems to support its *** agile information system is the one can reconstruct itself and adapt quickly to it's *** article will begin with the focus on one more properties of information system agility,explain its definition,build its evaluating indicator system,provide the hierarchical evaluation model of information system agility,and describe the evaluation process and mathematical ***,by using an example,the practicability and validity of the evaluation model is proved,comprehensive and scientific evaluation of information system agility is achieved.
Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enter...
详细信息
Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud computing platforms. Moreover, the lack of security constraints in the Service Level Agreements between the cloud providers and consumers results in a loss of trust as well. Obtaining a security certificate such as ISO 27000 or NIST-FISMA would help cloud providers improve consumers trust in their cloud platforms' security. However, such standards are still far from covering the full complexity of the cloud computing model. We introduce a new cloud security management framework based on aligning the FISMA standard to fit with the cloud computing model, enabling cloud providers and consumers to be security certified. Our framework is based on improving collaboration between cloud providers, service providers and service consumers in managing the security of the cloud platform and the hosted services. It is built on top of a number of security standards that assist in automating the security management process. We have developed a proof of concept of our framework using. NET and deployed it on a test bed cloud platform. We evaluated the framework by managing the security of a multi-tenant SaaS application exemplar.
This paper presents an algorithm for automatic detection of the orientation of user generated images. The images can initially be into 3 different orientations. The algorithm utilizes SVM classifier trained over featu...
详细信息
This paper presents an algorithm for automatic detection of the orientation of user generated images. The images can initially be into 3 different orientations. The algorithm utilizes SVM classifier trained over feature vectors of the low-level characteristics of the images in the training set. In order to increase classification accuracy, prior to the SVM classification, the images are hierarchically pre-classified into different groups regarding to the semantic cues they contain, like presence and absence of sky, light, or human faces. Then separate SVM classifier is trained for each group. Also, the paper presents the conclusions of an online survey about the user preferences for software for automatic image orientation detection and gives explanation how those conclusions correspond to the accuracy of the proposed algorithm.
With the development of three dimensional media resources, the corresponding intellectual property protection problem also occurs. In this paper, a blind stereoscopic image watermarking algorithm based on the relation...
详细信息
In this paper, a stereoscopic vision based region-of-interest (ROI) classification and the corresponding multiview video coding algorithm is proposed for three-dimensional television (3DTV), which takes advantage of t...
详细信息
Testing is a very important task to build error free software. As the resources and time to market is limited for a software product, it is impossible to perform exhaustive test i.e., to test all combinations of input...
详细信息
Testing is a very important task to build error free software. As the resources and time to market is limited for a software product, it is impossible to perform exhaustive test i.e., to test all combinations of input data. To reduce the number of test cases in an acceptable level, it is preferable to use higher interaction level (t way, where t ≥ 2). Pairwise (2-way or t = 2) interaction can find most of the software faults. This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. Java program has been used to test the performance of the algorithm. The algorithm is able to support both uniform and non-uniform values effectively with performance better than the existing algorithms/tools in terms of number of generated test cases and time consumption.
Testing is a very important task to build error free software. As the resources and time to market is limited for a software product, it is impossible to perform exhaustive test i.e., to test all combinations of input...
详细信息
Testing is a very important task to build error free software. As the resources and time to market is limited for a software product, it is impossible to perform exhaustive test i.e., to test all combinations of input data. To reduce the number of test cases in an acceptable level, it is preferable to use higher interaction level (t way, where t = 2). Pairwise (2- way or t = 2) interaction can find most of the software faults. This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. Java program has been used to test the performance of the algorithm. The performance is better than the existing algorithms/tools in terms of number of generated test cases and time consumption.
CAMSHIFT algorithm and Comaniciu/Meer algorithm are two fundamental frameworks of mean shift procedure for video target *** paper generalizes the two well-known mean shift tracking algorithms,originally due to Bradski...
详细信息
CAMSHIFT algorithm and Comaniciu/Meer algorithm are two fundamental frameworks of mean shift procedure for video target *** paper generalizes the two well-known mean shift tracking algorithms,originally due to Bradski and Comaniciu/Meer.A new general similarity function which defines the distance between the target model and target candidate is employed to calculate the pixel weights and the target *** target size is iteratively estimated and updated based on the zeroth order moment of the pixel *** we prove that both the CAMSHIFT algorithm and the Comaniciu/Meer algorithm can be included in the generalized mean shift tracking *** tracking performances of three mean shift algorithms in the unified framework are shown and compared in the experimental results.
Nowadays, the using of intelligent data mining approaches to predict intrusion in local area networks has been increasing rapidly. In this paper, an improved approach for Intrusion Detection System (IDS) based on comb...
详细信息
Nowadays, the using of intelligent data mining approaches to predict intrusion in local area networks has been increasing rapidly. In this paper, an improved approach for Intrusion Detection System (IDS) based on combining data mining and expert system is presented and implemented in WEKA. The taxonomy consists of a classification of the detection principle as well as certain WEKA aspects of the intrusion detection system such as open-source data mining. The combining methods may give better performance of IDS systems, and make the detection more effective. The result of the evaluation of the new design produced a better result in terms of detection efficiency and false alarm rate from the existing problems. This presents useful information in intrusion detection.
暂无评论