This paper discusses the problems of control design and stability analysis of the networked control systems(NCSs) with random delays. The network-induced delays of the NCS are considered as interval variables governed...
详细信息
This paper analyzes the inner mechanism of basic methods for high-voltage transmission line (HTL) fault diagnosis, and proposes the new SVM based HTL diagnosis models, which has the characteristic of good generalizati...
详细信息
As many approaches have been suggested recently to address the problem of distributed denial-of-service (DDoS) attacks, yet few of them pay enough attention to the quality of service (QoS) requirements of the communic...
详细信息
ISBN:
(纸本)1932415823
As many approaches have been suggested recently to address the problem of distributed denial-of-service (DDoS) attacks, yet few of them pay enough attention to the quality of service (QoS) requirements of the communication processes running on the victim-end systems, especially when they are under DDoS attacks. By employing a novel communication service surveillance algorithm called "Shepherd", we present in this paper a DDoS detection architecture named Baseline - a passive approach due to its different perspective with respect to many other DDoS detection methods. Baseline can be installed on any host in the Internet communication environment with trivial effort and the running system consists only of a low weight daemon that efficiently performs Shepherd algorithm on the registered communication processes. Through adding plug-able modules to the actuator of the daemon, Baseline can be easily integrated with intrusion detection systems (IDS). While compared with previous work, our approach does not require traffic analysis or packets content filtering, which entails an always-running process with high CPU overhead;nor does it require any modification to the existing router systems, which is simply considered impractical economically. Moreover, Baseline achieves zero false positive to some extent, as we show in the paper.
This paper addresses a fundamental problem that arises in data streaming scenarios, namely, today's data mining is ill-equipped to handle data streams effectively, and pays little attention to the network stabilit...
详细信息
Earlier, hardware-accelerated stenciled shadow volume (SSV) techniques had not been widely adopted by 3D games and applications due in large part to the lack of robustness of described techniques. This situation persi...
详细信息
ISBN:
(纸本)0780394291
Earlier, hardware-accelerated stenciled shadow volume (SSV) techniques had not been widely adopted by 3D games and applications due in large part to the lack of robustness of described techniques. This situation persisted despite widely availab.e hardware support. Since perception being changed, our aims are at providing an exhaustive study. In particular we discuss the advantages, limitations, rendering quality and cost of each algorithm. Stencil Shadow Volumes (SSVs) are still popular for their simplicity, adaptability to different approaches, hybrid nature, robustness, being powered by graphic hardware compatibilities and real time physical based rendering capabilities, making it highly demanding in graphics and gaming industries. We also addressed the rendering quality and cost of recent algorithms. Finally, we indicate that recent methods can be efficiently exploited and, with such a drastic improvement, how to make the physical based method more practically adopted methods for 3D games and in animation industries discussing optimizations, workflow, and scene management employed in commercial 3D engines.
Meta modeling is an effective approach to implement interoperability among distributed and heterogeneous information sources on Web. MMFI (Framework for Metamodel Interoperability) is a set of meta objects and Metamod...
详细信息
In this paper, a Kansei landscape image retrieval system named KIRCK is proposed, which is based on color feature and Kansei factors. Color feature is extracted in HSV color space and the similarity of color feature i...
详细信息
In this paper, a Kansei landscape image retrieval system named KIRCK is proposed, which is based on color feature and Kansei factors. Color feature is extracted in HSV color space and the similarity of color feature is estimated by color accumulation histogram intersection method. Multi-class Support Vector Machine is applied for the mapping between high-level Kansei lab.ls and low-level image characteristics. After the multi-class SVM is trained, Kansei factors of images can be lab.led automatically, and the similarity of images in Kansei space also can be estimated. Thus integrated retrieval results using color and Kansei factors can be obtained, and the experiment shows that these retrieval results are more satisfied than only using color feature or Kansei factors. Correlative feedback is also introduced to improve the performance of our color feature and Kansei factors image retrieval.
Currently the mainstream technology of SAN is SAN storage virtualization and its implementation. The switch-based storage virtualization embeds the virtualizer in the core of the storage networking fabric in an "...
详细信息
Currently the mainstream technology of SAN is SAN storage virtualization and its implementation. The switch-based storage virtualization embeds the virtualizer in the core of the storage networking fabric in an "intelligent switch" rather than an appliance or a host. This paper describes the SV-FC SAN switch's hardware and software architecture. The main aid of design and implementation the switch is to give a new way to realize FC-SAN storage virtualization. Storage virtualization modules are embedded in the switches firmware. The switch can provide simple and friendly interfaces for users to configure and manage the FC SAN.
Grid Computing receives growing attention from scientists and scholars these years, of which Grid Information Service is the highlight and one of the most difficult subjects. Grid Information Service is characterized ...
详细信息
Data Grid is one of the important research fields for Grid Computing, To improve the system efficiency, this paper puts forward the strategies of ring replication and thread replication. Compared with many other repli...
详细信息
暂无评论