Research efforts in Quality of Service (QoS) management have usually addressed the problem under the network infrastructure perspective whereas a business-oriented perspective, named Service Quality Management (SQM), ...
详细信息
Once Wireless Local Networks (WLAN) and Bluetooth devices share the same frequency band (ISM) there is a potential risk of interference if they are supposed to operate close to each other. Additionally, the signal fad...
详细信息
Currently, one problem faced by the organizations is the inability of the institution to know what it actually knows, in other words, the competences that the organization masters. This problem especially disturbs tea...
详细信息
ISBN:
(纸本)1846000025
Currently, one problem faced by the organizations is the inability of the institution to know what it actually knows, in other words, the competences that the organization masters. This problem especially disturbs team formation for a design project, which must be composed of people with specific knowledge to execute different activities. Simple classification or a keyword approach is not sufficient for competence identification. The expertise of an employee or researcher often differs in small but significant details, and an approach is required to allow the accurate description of people 's competences and to implement a retrieval strategy that will find a person with a specific competence. We propose a technique to identify competences by mining employee documents, especially publications. We have chose a number of criteria, which will be described in this paper, to find people with specific expertise and propose than to projects. Finally, a possible indication for a person's participation in a community is her/his published knowledge and expertise degree.
Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the past decades to simulate various physical phenomena. By taking advantages of the main features of ...
详细信息
ISBN:
(纸本)0769523129
Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the past decades to simulate various physical phenomena. By taking advantages of the main features of such models, coupled with nature based models such as artificial immune systems we present a novel artificial immune and agent based intrusion detection model for large computer networks. Our solution is based upon several security levels, event based model, and a simple computational abstraction where an anomaly detection technique is designed to monitor the users' registrations to the operational targeted system, e.g., UNIX-like implementation. In our model, the events' generation model is processed using the Unix Syslog-ng tool, the events' analysis using the Logcheck tool, while the activities of the users and the execution of the both reactive and pro-active events' activities are implemented within an artificial immune and mobile agent based infrastructure. We have implemented and designed our model to differentiate among attacks, security violations, and several other security levels. In this paper we present our model, and show how mobile agent and artificial immune paradigms can be used to design efficient intrusion detection systems. we also discuss the validation of our model followed by a set of ex periments we have carried out to evaluate the performance of our model using realistic case studies.
This paper- studies different error control schemes in wireless sensor networks with Bluetooth technology. The tradeoff between reliability and energy consumption of Bluetooth packets are analyzed, using different err...
详细信息
MicroRNAs (miRNAs) are small endogenous RNAs of ∼22nt that act as direct post-transcriptional regulators in animals and plants. MicroRNAs generally perform a function by binding to the complementary site on the 3'...
详细信息
In this paper, we start from a case study of an architecture company and move on to a framework of agents to identify and inform conceptual design. The processes and problems exhibited by the company involved are quit...
详细信息
In order to reach competitive advantage, manufacturing firms need not only to coordinate business and cross-border activities, but must also integrate and improve internal processes, coordinate access to internal and ...
详细信息
The activities executed in the scientific environment are extremely dependent on knowledge from their performers. Thus, knowledge management initiatives are very important in this environment. One of the possibilities...
详细信息
ISBN:
(纸本)1846000025
The activities executed in the scientific environment are extremely dependent on knowledge from their performers. Thus, knowledge management initiatives are very important in this environment. One of the possibilities for improving the knowledge flow is to explore past experiences, resulting from the modeling and execution of previous scientific activities and handled by a workflow management system. This work presents Thoth, a system which aims at knowledge reuse in the scientific environment, during the planning, design and execution of scientific activities. This approach is integrated, with a CBR approach, also described in this paper, with workflow systems and the use of ontologies.
暂无评论