Traditional RBAC model describes a static access control policy. As the development of network application, such as Web services, access control faces many new challenges, one of which is that access control policies ...
详细信息
ISBN:
(纸本)9780769530482;0769530486
Traditional RBAC model describes a static access control policy. As the development of network application, such as Web services, access control faces many new challenges, one of which is that access control policies need to protect not only static resources but also dynamic ones that are encapsulated in a service. In order to capture the flexibility of application, we specify a fine-grained control on individual users by introducing user attributes which are associated to user's role and permission. We take the service as an action that changes some of user's attributes so as to adjust users' permission at run. In order to represent and reason on the access control automatically, we use the description logics combined with prepositional dynamic logic as a logic framework to construct a knowledge base for the access control and action rules, and semantically explain how a user's permission can be changed at runtime.
In order to represent a complex large concept hierarchy tree, this paper proposes a more general coding scheme which applies concept hierarchy into the mining of fuzzy association rules. As it is difficult to determin...
详细信息
In order to represent a complex large concept hierarchy tree, this paper proposes a more general coding scheme which applies concept hierarchy into the mining of fuzzy association rules. As it is difficult to determine the membership function subjectively, a self-organizing feature map (SOFM) network is introduced to determine the membership function of sample data. Based on the improved coding scheme and the SOFM network, fuzzy set is then introduced to design a new algorithm of mining multi-level fuzzy association rules. Experimental results show that the proposed algorithm is of high efficiency and scalability and can effectively mine multi-level fuzzy association rules that are meaningful and easily understandable.
Automatic keyword extraction is one of the most important techniques in natural language processing. In this paper, features of complex networks composed of Chinese are studied. A novel automatic keyword extraction al...
详细信息
Automatic keyword extraction is one of the most important techniques in natural language processing. In this paper, features of complex networks composed of Chinese are studied. A novel automatic keyword extraction algorithm for Chinese document is proposed which is based on the features of the complex networks according to the small world structure in language networks and the theoretical achievements in complex networks. It extracts keyword based on the feature values of the word nodes in a documental language network. Experimental results show the proposed algorithm obtains higher average precision compared with the keyword extraction algorithm based on TFIDF.
Due to the increasing software complexity, how to integrate the legacy data resources and systems is a big challenge for the enterprise. This paper makes full use of agent technologies to establish an agent grid intel...
详细信息
Due to the increasing software complexity, how to integrate the legacy data resources and systems is a big challenge for the enterprise. This paper makes full use of agent technologies to establish an agent grid intelligent platform for enterprise heterogeneous system integration. The agent grid intelligent platform adopts a hierarchical integration model and middleware to provide efficient integration capability for different application systems. Finally, this paper introduces the grid based city emergency interaction system to illustrate the AGrIP practical system integration.
It is a common practice that learners (human beings or intelligent agent) estimate the difficulty level of their learning tasks. In this paper, we present an ontology comparison based method to measure the difficulty ...
详细信息
It is a common practice that learners (human beings or intelligent agent) estimate the difficulty level of their learning tasks. In this paper, we present an ontology comparison based method to measure the difficulty level by comparing target knowledge the learner wants to learn and the knowledge the learner already has. Our method proposes a set of measures that compare the differences of ontologies from two perspectives, the structural and the conceptual. Based on the result of comparing two ontologies, we defined the learning difficulty formally, and gave an algorithm to compute it.
Tracking 3D people from monocular video is often poorly constrained. To mitigate this problem, prior knowledge should be exploited. In this paper, the Gaussian process spatio-temporal variable model (GPSTVM), a novel ...
详细信息
Tracking 3D people from monocular video is often poorly constrained. To mitigate this problem, prior knowledge should be exploited. In this paper, the Gaussian process spatio-temporal variable model (GPSTVM), a novel dynamical system modeling method is proposed for learning human pose and motion priors. The GPSTVM provides a low dimensional embedding of human motion data, with a smooth density function that provides higher probability to the poses and motions close to the training data. The low dimensional latent space is optimized directly to retain the spatio-temporal structure of the high dimensional pose space. After the prior on human pose is learned, the particle filtering can be used tracking articulated human pose; particle filtering propagates over time in the embedding space, avoiding the curse of dimensionality. Experiments demonstrate that our approach tracks 3D people accurately.
Using symplectic integrator propagator, a three-dimensional fourth-order symplectic finite difference time domain (SFDTD) method is studied, which is of the fourth order in both the time and space domains. The metho...
详细信息
Using symplectic integrator propagator, a three-dimensional fourth-order symplectic finite difference time domain (SFDTD) method is studied, which is of the fourth order in both the time and space domains. The method is nondissipative and can save more memory compared with the traditional FDTD method. The total field and scattered field (TF-SF) technique is derived for the SFDTD method to provide the incident wave source conditions. The bistatic radar cross section (RCS) of a dielectric sphere is computed by using the SFDTD method for the first time. Numerical results suggest that the SFDTD algorithm acquires better stability and accuracy compared with the traditional FDTD method.
To complete the scattering analysis of an arbitrary shaped perfectly electric conductor over a wide frequency band, the Chebyshev polynomial of first kind is applied. The Chebyshev nodes within a given frequency range...
详细信息
To complete the scattering analysis of an arbitrary shaped perfectly electric conductor over a wide frequency band, the Chebyshev polynomial of first kind is applied. The Chebyshev nodes within a given frequency range are found, and then the surface electric currents at these nodes are computed by the method of moments. The surface current is expanded in a polynomial function via the Chebyshev approximation. Using this function, the electric current distribution can be obtained at any frequency within the given frequency range. The numerical results are compared with the results obtained by the method of moments, and the complexity of computation is reduced obviously.
Due to the existence of a large amount of legacy information systems, how to obtain the information and integrate the legacy systems is becoming more and more concerned. This paper introduces the integration pattern b...
详细信息
Due to the existence of a large amount of legacy information systems, how to obtain the information and integrate the legacy systems is becoming more and more concerned. This paper introduces the integration pattern based on agent grid. And we propose an agent grid intelligent platform called AGrIP, which can erase information islands and integrate external systems efficiently by encapsulating the distributed application system to agents. AGrIP adopts distributed hierarchical structure, which is capable of integrating external systems to provide the users various services dynamically. AGrIP has proved itself scalable and efficient during the industry projects development and application.
暂无评论