Database Management systems (DBMSs) are widely used to efficiently store and retrieve data. DBMSs usually support various metadata, e.g., integrity constraints for ensuring data integrity and indexes for locating data...
详细信息
Border access control, network security mechanism and system access control are three separately access control procedures when user accessing the resource on network. Network access control mechanism, which adding th...
详细信息
This paper proposes an approach to generate emotional music using Interactive Genetic Algorithm. Performance rules are described by the KTH rule system. Different emotional expressions can be modeled by using selectio...
详细信息
This paper discusses the problems of control design and stability analysis of the networked control systems(NCSs) with random delays. The network-induced delays of the NCS are considered as interval variables governed...
详细信息
Attitude, which is the outward manifestation of human psychology information, is inevitable in everyday situation. Attitude recognition by artificial intelligence has become a hotspot and produced promising results in...
详细信息
Federated learning is a privacy-preserving machine learning paradigm where a global model is trained collab.ratively across resource-limited devices such as mobile phones, wearable devices, and sensors while the train...
详细信息
In this paper, a discriminant manifold learning method based on Locally Linear Embedding (LLE), which is named Locally Linear Representation Fisher Criterion (LLRFC), is proposed for the classification of tumor gene e...
详细信息
software features can be the perception of the influence of the human factors on software artifacts. This paper tends to investigate mainstream software evolution and perceive primary criterions of competition and coo...
详细信息
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as Decision Tree, Hotelling's T2, Chi-Square, first-order...
详细信息
ISBN:
(纸本)0780384032
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as Decision Tree, Hotelling's T2, Chi-Square, first-order and high-order Markov model. These algorithms focus on some data features to mark anomaly state. New features are introduced into these algorithms and proper combination of these features will provide excellent result. But these algorithms are used single metric generated by multi-events so as to detect intrusion by comparison with a certain threshold. Experiment shows that using per event-based metric can improve accuracy of intrusion detection but not improve complexity of algorithm. In our paper we will provide a metric vector based on algorithm to detection intrusion that is more accurate and effective than traditional ones. Also, we will provide some intrusion detection methods to our algorithm.
Component-level application migration is a lightweight solution to provide continuous services in mobile and pervasive environments. Current practices mainly leverage UMLlike notations to model the architecture and th...
详细信息
暂无评论