This paper examines the process of technology appropriation and the triggers that encourage and discourage longer term use of an Information System (IS). In a longitudinal study over 14 months, we examine use of a Lea...
详细信息
Numerous network traffic classification approaches have recently been proposed. In general, these approaches have focused on correctly identifying a high percentage of total flows. However, on the Internet a small num...
详细信息
ISBN:
(纸本)1595937927
Numerous network traffic classification approaches have recently been proposed. In general, these approaches have focused on correctly identifying a high percentage of total flows. However, on the Internet a small number of "elephant" flows contribute a significant amount of the traffic volume. In addition, some application types like Peer-to-Peer (P2P) and FTP contribute more elephant flows than other applications types like Chat. In this opinion piece, we discuss how evaluating a classifier on flow accuracy alone can bias the classification results. By not giving special attention to these traffic classes and their elephant flows in the evaluation of traffic classification approaches we might obtain significantly different performance when these approaches are deployed in operational networks for typical traffic classification tasks such as traffic shaping. We argue that byte accuracy must also be used when evaluating the accuracy of traffic classification algorithms. Copyright 2007 ACM.
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are frequently used to realise such Servi...
详细信息
ISBN:
(纸本)9780769530642
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are frequently used to realise such Service-Oriented Architectures. In such systems, autonomic principles of self-configuration, self-optimisation, self-healing and self-adapting are desirable to ease management and improve robustness. In this paper we focus on the extension of the self management and autonomic behaviour of a WSRF container connected by a structured P2P overlay network to monitor and rectify its QoS to satisfy its SLAs. The SLA plays an important role during two distinct phases in the life-cycle of a WSRF container Firstly during service deployment when services are assigned to containers in such a way as to minimise the threat of SLA violations, and secondly during maintenance when violations are detected and services are migrated to other containers to preserve QoS. In addition, as the architecture has been designed and built using standardised modem technologies and with high levels of transparency, conventional web services can be deployed with the addition of a SLA specification.
Wireless Local Area Networks (WLANs) have become omnipresent: WLANs are available at airports, coffee shops, university campuses, corporate environments, and homes. This surge in the popularity of WLANs motivates the ...
详细信息
Humans have two distinct features with compared to any other living being;unique physical nature and emotions / feelings. Anybody who studies on humans or trying to construct human like machines should consider these ...
详细信息
Multi-Agent systems (MAS) are collection of loosely coupled intelligent agents. These systems operate in a distributed, highly dynamic, unpredictable and unreliable environment in order to meet their overall goals. Ag...
详细信息
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The successof any gas recognition system depends on its computationalcomplexity and its robustness. In this work,...
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The success
of any gas recognition system depends on its computational
complexity and its robustness. In this work, we propose a
new low-complexity recognition method which is tested and
successfully validated for tin-oxide gas sensor array chip. The
recognition system is based on a vector angle similarity measure
between the query gas and the representatives of the different gas
classes. The latter are obtained using a clustering algorithm based
on the same measure within the training data set. Experimented results on our in-house gas sensors array show more than 98 % of correct recognition. The robustness of the proposed method
is tested by recognizing gas measurements with simulated drift.
Less than 1 % of performance degradation is noted at the worst case
scenario which represents a significant improvement when
compared to the current state-of-the-art.
This paper will study and evaluate watermarking technique by Zain and Fauzi [1]. Recommendations will then be made to enhance the technique especially in the aspect of recovery or reconstruction rate for medical image...
详细信息
In July 2007 Carnegie Mellon University (Carnegie Mellon®) hosted its sixth annual offering of the Information Assurance Capacity Building Program (IACBP). The goal of the intensive in-residence summer program is...
详细信息
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the gen...
详细信息
ISBN:
(纸本)9783540730934
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the generation of the reachability graph and the theory of regions was proposed. In this paper, we propose a new synthesis method based on the composition of Petri net modules, avoiding the exploration of the reachability graph. The behavior of ACMs is formally defined and correctness properties are specified in CTL. Model checking is used to verify the correctness of the Petri net models. The algorithms to generate the Petri net models are presented. Finally, a method to automatically generate C++ source code from the Petri net model is described.
暂无评论