Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types and then accomplishing the detection for data package through the collaboration of the detect nodes, the processing efficiency of the intrusion detection system has been improved as a whole.
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid calculation is an important research subject. In this paper, some technique and strategy of allopatric isomeric backup in grid calculation environment are researched by comparing and analyzing the existing technique of database allopatric backup, a remote-data copy method is presented, a remote-data disaster dump system and a allopatric isomeric data Disaster Recovery tool are designed and implemented based on interlayer.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems..
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which ...
详细信息
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which may be used to guide the learning of self-organization feature mapping network. Then this paper presents subsection algorithm, amalgamation algorithm and dynamical adaptive algorithm for SOFM networks so as to solve a kind of problems of classification rule mining. Finally, a practical example shows its flexibility and practicability.
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobj...
详细信息
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobjective genetic algorithm, after the related work is reviewed. The contribution lies on that the selection process of such routing is treated with multiobjective optimization. Different quality criterions in IP network are taken into account for multicast communications. A set of routing trees is generated to approximate the Pareto front of multicast problem. Multiple trees can be selected from the final set of nondominated solutions, and applied to obtain a good overall link cost and balance traffic distribution according to some simulation results.
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe...
详细信息
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) together. By introducing generalized computing into knowledge management, this paper presents a kind of knowledge decision-making model, and a kind of control model of enterprise knowledge flow.
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobj...
详细信息
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobjective genetic algorithm, after the related work is reviewed. The contribution lies on that the selection process of such routing is treated with multiobjective optimization. Different quality criterions in IP network are taken into account for multicast communications. A set of routing trees is generated to approximate the Pareto front of multicast problem. Multiple trees can be selected from the final set of nondominated solutions, and applied to obtain a good overall link cost and balance traffic distribution according to some simulation results.
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet.A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobje...
详细信息
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet.A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobjective genetic algorithm, after the related work is reviewed. The contribution lies on that the selection process of such routing is treated with multiobjective optimization. Different quality criterions in IP network are taken into account for multicast communications. A set of routing trees is generated to approximate the Pareto front of multicast problem. Multiple trees can be selected from the final set of nondominated solutions, and applied to obtain a good overall link cost and balance traffic distribution according to some simulation results.
This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009. The 42 full papers presented together with 26 short papers and the a...
详细信息
ISBN:
(数字)9783642006722
ISBN:
(纸本)9783642006715
This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009. The 42 full papers presented together with 26 short papers and the abstracts of 2 keynote speeches were carefully reviewed and selected for inclusion in the book. The topics covered are query processing, topic-based techniques, Web data processing, multidimensional data analysis, stream data processing, data mining and its applications, and data management support to advanced applications.
暂无评论