This paper presents interpretations for association rules. It first introduces Pawlak's method, and the corresponding algorithm of finding decision rules (a kind of association rules). It then uses extended random...
详细信息
As the number of electronic data collections available on the Internet increases, so does the difficulty of finding the right collection for a given query. Often the first time user is overwhelmed by the array of opti...
详细信息
ISBN:
(纸本)9780769519326
As the number of electronic data collections available on the Internet increases, so does the difficulty of finding the right collection for a given query. Often the first time user is overwhelmed by the array of options available, and wastes time hunting through pages of collection names, followed by time reading results pages after doing an ad-hoc search. Automatic collection selection methods try to solve this problem by suggesting the best subset of collections to search based on a query. This is of importance to fields containing large number of electronic collections, which undergo frequent change, and collections that cannot be fully indexed using traditional methods such as spiders. We present a solution to this problem of selecting the best collections and reducing the number of collections needing to be searched. Preliminary tests of the system, conducted on Web search engines, suggest that this solves much of the Web based Collection selection problem.
Privilege negotiation agents migrate from the security servers of different administrative domains on the Internet to the user's secure client agent environment. They work cooperatively for trust establishment and...
详细信息
Privilege negotiation agents migrate from the security servers of different administrative domains on the Internet to the user's secure client agent environment. They work cooperatively for trust establishment and authorisation in an automated way. Agent communication protocols are expressed through the Knowledge Query and Manipulation Language (KQML). Security issues for interaction between agents are discussed. The user-centred approach enables a user to enforce his own privacy policies during the privilege negotiation process.
Web mining is used to search the right information from the Web to meet user information needs. Acquiring correct user profiles is difficult, since users may be unsure of their interests and may not wish to invest a g...
详细信息
ISBN:
(纸本)9780769519326
Web mining is used to search the right information from the Web to meet user information needs. Acquiring correct user profiles is difficult, since users may be unsure of their interests and may not wish to invest a great deal of effort in creating such a profile. Our aim is to present a foundation for representations of user profiles on ontology for designing efficient Web mining models. We assume the user concept can be constructed from some primary ones; hence, we use "part-of" relation to describe the relationships between classes. We also present set-valued relevance functions on such ontology to unravel the relationships between facts and the existing classes. A numerical interpretation is also presented for the set-valued relation functions.
We present interpretations for association rules. We first introduce Pawlak's method, and the corresponding algorithm of finding decision rules (a kind of association rules). We then use extended random sets to pr...
详细信息
We present interpretations for association rules. We first introduce Pawlak's method, and the corresponding algorithm of finding decision rules (a kind of association rules). We then use extended random sets to present a new algorithm of finding interesting rules. We prove that the new algorithm is faster than Pawlak's algorithm. The extended random sets are easily to include more than one criterion for determining interesting rules. We also provide two measures for dealing with uncertainties in association rules.
Aiming at developing more efficient and robust genetic algorithms (GA) over the Internet, a new asynchronous, coarse-grain parallel genetic algorithm model is proposed in this paper. On the basis of the model, we pres...
详细信息
ISBN:
(纸本)0780374908
Aiming at developing more efficient and robust genetic algorithms (GA) over the Internet, a new asynchronous, coarse-grain parallel genetic algorithm model is proposed in this paper. On the basis of the model, we present a design pattern for Web-based parallel GA, which captures design solutions to core problems in implementing Web-based parallel GA. This design pattern can achieve high degree of parallelism, can handle the high communication latency and low communication bandwidth problems of the Internet, and can contribute to building more robust Web-based parallel GA.
The goal of this paper is to develop a user profile model for agent-based information filtering. We try to formalize the whole process of information filtering from an Artificial Intelligence point view. This research...
详细信息
作者:
TSUNOO, YOKAMOTO, EUEMATSU, TMemberNEC Software Hokuriku
Ltd. Ishikawa Japan 920-21 School of Information Science
Japan Advanced Institute of Science and Technology Ishikawa Japan 923-12 MembersTomohiko Uyematsu graduated in Electrical Engineering from Tokyo Institute of Technology in 1982 and received a Master's degree from the same university in 1984
after whichhe became an assistant in the Electrical and Electronics Engineering Department there. In1990 he became a Lecturer and in 1991 an Assistant Professor. In 1992 he became Assistant Professor at the School of Information Science Japan Advanced Institute of Science and Technology. He holds a doctorate in engineering. Among his research interests are signal theory optical communications theory coding theory and data compression algorithms. In 1988 he received a Shinohara Commemorative Science Encouragement Prize and in 1992 a Best Paper Award. He is the author of the bookIntroduction to Record Data Compression Algorithms. He is a member of the Measurement Control Society and the Society for Information Theory and Its Applications.
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by...
详细信息
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by the U.S. National Bureau of Standards of the DES cryptosystem and the proposal by NTT of the FEAL cryptosystem, secret-key cryptographic algorithms have been published, involution-type block cryptosystems which use secret key to encipher 64 bits of plain text as 64 bits of cipher text [2, 3, 9, 10, 12]. NTT has proposed the one-way function MAP, which is also an involution-type transform. In this paper, we study a new cryptanalytic method for involution-type cryptosystems and show by example that it can be applied practically in a ciphertext-only attack on the one-way function MAP. For an involution-type cryptosystem, by increasing the amount of construction in the data-randomization phase and by increasing the size of the secret key, we can guarantee the computational security by preventing the estimation of the secret key. However, if we study the properties of the function used in the design of the data-randomization phase, by specifying input/output values of the function which are independent of the secret key, it may be possible to use the inverse function [11] to calculate the secret key. This method is called the intermediate cipher method. The intermediate cipher method differs from previous methods in the small quantity of data required for breaking.
暂无评论