A class of non-uniformly sampling system is investigated, and the lifted state space model of non-uniformly sampled-data system is derived by using integration method. The corresponding transfer function model is furt...
详细信息
A class of non-uniformly sampling system is investigated, and the lifted state space model of non-uniformly sampled-data system is derived by using integration method. The corresponding transfer function model is further obtained. To solve the problem that there exist unknown mid-variables in information vectors of identification model, the auxiliary model technique is applied to replace the unknown system variables. The auxiliary models based instrumental variable identification algorithm of non-uniformly sampled-data system is presented. At last, a numerical example is given to illustrate the proposed method is effective.
As the impacts of security threats are amplified and spread quickly in the cloud,especially with the attribute of large-scale *** of researches focus on monitoring the network ***,these methods don't check how the...
详细信息
As the impacts of security threats are amplified and spread quickly in the cloud,especially with the attribute of large-scale *** of researches focus on monitoring the network ***,these methods don't check how the attack happened and what damage the attack caused for the virtual *** paper presents a logging method to analyze the potential attacks out of VM and a prototype was *** experimental results show that this method can detect the real world attacks effectively and the performance overhead is acceptable.
In order to prolong the lifetime of wireless sensor networks, we propose an energy saving and balanced clustering routing protocol (ESB). ESB employs energy and distance in probability model to generate candidate clus...
详细信息
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do...
详细信息
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do not exist but may appear in the future in dynamic multi-dimensional networks. Firstly, we construct a dynamic multi-dimensional networks from an E-mail network and a telephone network, which makes us correctly describe a Group's staff relationship. Then we present some algorithms to build a reduction dimensional network and a dynamic network. After that, we give bi-directional link mining methods in a dynamic multi-dimensional weighted network and apply these methods in the enterprise's employee relational network. Experimental results show that these methods can effectively predict associations among persons in a large scale employee networks.
Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex ne...
详细信息
Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex network system, so we can do personalized recommendation by using the link prediction method which is a new one in complex networks research area. In this paper, we present personalized recommendation method based on the link prediction in Super-networks. Firstly, we give several definitions such as a Super-network, a dynamic Super-network and a utility matrix etc. Secondly, we construct a personalized recommendation model based on these definitions. Thirdly, we define a similarity metric for users and some similarity criteria, put forward five link prediction related algorithms in dynamic Supernetworks and present our recommendation algorithms based on these link prediction algorithms. Finally, we apply our methods to classic datasets in order to evaluate the performance of our algorithms.
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynam...
详细信息
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynamic integrity validation(DIV) framework is proposed to monitor the integrity of virtual machine based execution environments in the *** can detect the integrity of the whole architecture stack from the cloud servers up to the VM OS by extending the current trusted chain into virtual machine's architecture *** introduces a trusted third party(TTP) to collect the integrity information and detect remotely the integrity violations on VMs periodically to avoid the heavy involvement of cloud tenants and unnecessary information leakage of the cloud *** evaluate the effectiveness and efficiency of DIV framework,a prototype on KVM/QEMU is implemented,and extensive analysis and experimental evaluation are *** results show that the DIV can efficiently validate the integrity of files and loaded programs in real-time,with minor performance overhead.
We propose a new fractional-order chaotic complex system and study its dynamical properties including symmetry, equilibria and their stability, and chaotic attractors. Chaotic behavior is verified with phase portraits...
During the process of Web data integration, new related Web sites consisting valuable data will be identified constantly. Wrapper induction based on labeled examples is a widely accepted method. However, manually labe...
详细信息
Currently, industrial and scientific community are concerned about Service-Oriented Computing (SOC), whose key technology is Web services. Web service is a new distributed computing model. It has a broad prospect in a...
详细信息
How to ensure the security of important private data is the key problem in electric commerce. In this paper, we propose an elastic and distributed secret sharing scheme. The scheme improves the security of data and in...
详细信息
暂无评论