Security market has been expanding steadily as people become more conscious about personal information management. On the other hand, administrators are competing with the flood of logs every day, and chasing for the ...
详细信息
ISBN:
(纸本)9781424435654
Security market has been expanding steadily as people become more conscious about personal information management. On the other hand, administrators are competing with the flood of logs every day, and chasing for the updates on a new kind of attacks. Given the overwhelming tasks of administrators, it is extremely hard to keep the peace without the help of professionals such as hired system administrators and security analysts. In this paper, we propose an alarm annunciator to analyze system. We constructed the system that detects a large-scale brute-force attack and warns administrating PCs, as a prototype of the system that collects and analyzes logs, and alerts system administrators automatically. The alarm annunciator enables variety of domain administrators to manage their domains and servers with the minimum effort and expense.
The 64-bit OS provides ample memory address space that is beneficial for applications using a large amount of data. This paper proposes using a cluster as a memory resource for sequential applications requiring a larg...
详细信息
The 64-bit OS provides ample memory address space that is beneficial for applications using a large amount of data. This paper proposes using a cluster as a memory resource for sequential applications requiring a large amount of memory. This system is an extension of our previously proposed socket-based distributed large memory system (DLM), which offers large virtual memory by using remote memory distributed over nodes in a cluster. The newly designed DLM is based on MPI (message passing interface) to exploit higher portability. MPI-based DLM provides fast and large virtual memory on widely available open clusters managed with an MPI batch queuing system. To access this remote memory, we rely on swap protocols adequate for MPI thread support levels. In experiments, we confirmed that it achieves 493 MB/s and 613 MB/s of remote memory bandwidth with the STREAM benchmark on 2.5 GB/s and 5 GB/s links (Myri-10G x2, x4) and high performance of applications with NPB and Himeno benchmarks. Additionally, this system enables users unfamiliar with parallel programming to use a cluster.
The well-known search engines such as Google, Yahoo! and MSN, are not enough for the advanced users who require user experience, for instance, much more correlative words, or interactive operations applied to returned...
详细信息
The well-known search engines such as Google, Yahoo! and MSN, are not enough for the advanced users who require user experience, for instance, much more correlative words, or interactive operations applied to returned results such as re-ranking and zooming. To focus on this idea of interactivity, we proposed and implemented interactive interfaces to improve user experience for supporting Web search. they are nice interfaces supporting dynamically changing re-ranking, related word zooming, and related word emphasizing and deemphasizing. It has been served as online search service recently. Our experimental evaluations confirm their convenience and good online performance.
A numerical simulation has been performed for the DNA sensors based on the field-effect-transistor (FET) structure of a CNT with the gold island- attached on the CNT tube. The model uses the Poisson-drift-diffusion th...
详细信息
ISBN:
(纸本)9781424439256
A numerical simulation has been performed for the DNA sensors based on the field-effect-transistor (FET) structure of a CNT with the gold island- attached on the CNT tube. The model uses the Poisson-drift-diffusion theory for the CNT transistor and considers the charge exchange between the interfaces between the CNT and gold island, gold and the linker molecules. In order to compare with experiments, an example device is simulated to predict the response of the sensor to the target DNA's in both the air and aqueous solution.
A competitive market model is considered with M suppliers and N customers, where each supplier provides a homogeneous service such as delivering propane gas cylinders and has to offer a uniform price upon delivery to ...
详细信息
ISBN:
(纸本)9781424448692
A competitive market model is considered with M suppliers and N customers, where each supplier provides a homogeneous service such as delivering propane gas cylinders and has to offer a uniform price upon delivery to all customers. Given a price upper bound U, the model is formulated as an M person game with pure strategy. It is shown that the M person game has the unique Nash equilibrium if and only if each customer can be serviced by at most one supplier. Furthermore, this unique Nash equilibrium is peculiar in that all suppliers adopt the same upper bound price U. In general, the M person game does not have any Nash equilibrium. For such a case, it is demonstrated that the suppliers continue to exercise their price strategies in a cyclic manner indefinitely.
This article aims to develop a method for the detection and segmentation of a cytoplast and nucleus from a cervix smear image. First, the technique of equalization method with Gaussian filter is adopted to eliminate n...
详细信息
Fuzzy regression is one of important methods for data analysis. Fuzzy regression extends the concept of classical regression which has been constructed in the statistical framework. We show that a convex hull method c...
详细信息
Fuzzy regression is one of important methods for data analysis. Fuzzy regression extends the concept of classical regression which has been constructed in the statistical framework. We show that a convex hull method can provide a powerful tool to reduce the computing time, especially for real-time data analysis. The main objective of this study is to propose an efficient real-time fuzzy regression analysis based on the use of convex hull, specifically a Beneath-Beyond algorithm. The reconstruction of convex hull edges depends on incoming vertices while a recomputing procedure can be implemented in real-time. An air pollution data is analyzed by applying the proposed approach. An important role of convex hull is emphasized in particular when dealing with the limitations of linear programming.
A data mining framework has been proposed to estimate intracranial pressure (ICP) non-invasively in our previous work. In the corresponding approach, the feature vector extracted from arterial blood pressure (ABP) and...
详细信息
A data mining framework has been proposed to estimate intracranial pressure (ICP) non-invasively in our previous work. In the corresponding approach, the feature vector extracted from arterial blood pressure (ABP) and flow velocity (FV) is translated to the estimated errors by the mapping function for each entry in the database. In this paper, three different mapping function solutions, linear least squares (LLS), truncated singular value decomposition (TSVD) and standard Tikhonov regularization (STR) are systemically tested to compare the possible effects of different solutions on the non-invasive ICP estimation. The conducted comparison demonstrated that the selection of mapping function solution actually influences the estimation. Among the tested three solutions for mapping function, TSVD and STR show better ICP estimation performance with smaller ICP errors than LLS.
Mobile ad hoc network (MANET) is a promising network paradigm for the future networking. To secure a MANET, we focus on trust management framework, which is intended to cope with misbehavior problem of nodes and stimu...
详细信息
Mobile ad hoc network (MANET) is a promising network paradigm for the future networking. To secure a MANET, we focus on trust management framework, which is intended to cope with misbehavior problem of nodes and stimulate nodes to cooperate with each other. However, there are still many intrinsic problems with the existing trust management frameworks, which remain unsolved, such as frangibility under possible attacks. To design a robust trust management framework, we investigate these intrinsic problems with the existing frameworks, and propose a hybrid trust management framework (HTMF) to construct trust environment for MANETs in the paper. Performance evaluations also have been performed, which show that the proposed HTMF is more robust and reliable than the existing frameworks.
We propose and experimentally demonstrate a transformation of two Einstein-Podolsky-Rosen photon pairs distributed among three parties into a three-photon W state using local operations and classical communication. We...
详细信息
We propose and experimentally demonstrate a transformation of two Einstein-Podolsky-Rosen photon pairs distributed among three parties into a three-photon W state using local operations and classical communication. We then characterize the final state using quantum state tomography on the three-photon state and on its marginal bipartite states. The fidelity of the final state to the ideal W state is 0.778±0.043 and the expectation value for its witness operator is −0.111±0.043 implying the success of the proposed local transformation.
暂无评论