The advantage of magnetic resonance imaging (MRI)-guided surgery, in which MR images taken during surgery are used to guide the surgery, has been recognized recently. However, there is a problem, due to long imaging t...
详细信息
We summarize the motivation and aims for this workshop on usability research challenges for cyberinfrastructure and tools, and outline workshop preparations and program.
ISBN:
(纸本)1595932984
We summarize the motivation and aims for this workshop on usability research challenges for cyberinfrastructure and tools, and outline workshop preparations and program.
With a SAN (Storage Area Network), large-capacity storage can be shared among multiple hosts at high speed. The potential market for SAN is enormous, but the technology won't become ubiquitous overnight. The compl...
详细信息
With a SAN (Storage Area Network), large-capacity storage can be shared among multiple hosts at high speed. The potential market for SAN is enormous, but the technology won't become ubiquitous overnight. The complex administration is indicated by many researches as a key barrier to adopt SAN solutions. This paper designs and implements a virtual storage image (VSI) that aggregates storage space located on heterogeneous storage nodes (see Fig.1)in a Fibre Channel point-to-point (FC-P2P) SAN.
The TF-IDF scheme is widely used to characterize documents in an information retrieval (IR) system based on the vector space model. However, for documents having a hyperlink structure such as Web pages, the Web page c...
详细信息
A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to descr...
详细信息
A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to describe network events, and sliding window updating algorithm is used to maintain network stream. Moreover, parallel frequent patterns and frequent episodes mining algorithms are applied to implement parallel time-series mining engineer which can intelligently generate rules to distinguish intrusions from normal activities. Analysis and study on the basis of DAWNING 3000 indicate that this parallel time-series mining-based model provides a more accurate and efficient way to building real-time NIDS.
A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to descr...
详细信息
A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to describe network events, and sliding window updating algorithm is used to maintain network stream. Moreover, parallel frequent patterns and frequent episodes mining algorithms are applied to implement parallel time-series mining engineer which can intelligently generate rules to distinguish intrusions from normal activities. Analysis and study on the basis of DAWNING 3000 indicate that this parallel time-series mining-based model provides a more accurate and efficient way to building real-time NIDS.
A home network service middleware called "UKARl-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middle...
详细信息
ISBN:
(纸本)0769527256
A home network service middleware called "UKARl-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middleware using distributed function elements on the networked appliances. The middleware uses a service scenario description framework on the basis of BPEL, an XML language to define business processes, to set up the service according to the present situation. In this paper, we describe the overview and of the home network service middleware and its service scenario description. Then implementation of an emulator for the set-vice scenario description framework is reported. It is noted that the proposed description framework can be constructed easily by using the existing toolkits.
Block-level security provides the lowest level security for storage devices. In this paper, we propose a block-level security based on hierarchical logical volume of FC RAID. Using the hierarchical logical volume, a g...
详细信息
Block-level security provides the lowest level security for storage devices. In this paper, we propose a block-level security based on hierarchical logical volume of FC RAID. Using the hierarchical logical volume, a group of physical disks can be mapped to a uniform logical storage space and two encrypt/decrypt algorithms can be applied to different logic volumes.
Mobile ad hoc networks are applied in a wider fields and its applying is becoming more and more complex. So, different application scenarios have different deployments of MANET in order to get the more optimal perform...
详细信息
Mobile ad hoc networks are applied in a wider fields and its applying is becoming more and more complex. So, different application scenarios have different deployments of MANET in order to get the more optimal performance. Network connectivity and energy saving are the key factors to consider. In order to construct the mobile ad hoc networks more reasonably and efficiently, this paper defines a type of application model of MANET, and gives three kinds of MANET application scenarios according to such model, and proposes a MANET deploying method, especially researches the wireless transceiver deploying scheme.
This paper studies a series of reconfiguration processes corresponding to a series of traffic demand changes in a WDM (Wavelength Division Multiplexing) optical network. The proposed reconfiguration framework consists...
详细信息
暂无评论