The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the characteristics of software failure data, the software reliability model is built by the time series theory. As an example, a software control system of failure data in testing phase as a time series, analysis and forecast are carried out on the basis of stochastic time series model. The result shows that this method has a good effect in software reliability modeling within a boundary.
The data mining application to analysis of alarm correlation in the telecom network has been put out, the data mining algorithms of association rules and sequential patterns have been introduced, the comparing between two algorithms has been made, the analyzing & discussing of experimental result have been given with the alarming data of a certain network management center at Wuhan Telecom.
In this paper, the training algorithm model based on abnormity detection is given, the constructing process of genetic algorithms has been discussed in detail, including the constructing, choosing, crossing and mutating of chromosome. As a result, the efficiency of intrusion detection has been increased and some unknown attacks have been checked with the algorithms.
Mobile agent has mobile and intelligent features, if applied to network management, the flexibility and expansibility of system can be greatly enhanced. Meanwhile, its independent nature of platform can be easily used to cross-platform network management. In this paper, a framework has been given, in which network management system was based on mobile agent. The network topology search algorithm has...
Mobile agent technology could be used to solve the problems on intrusion detection in network security area, while immune principle could supply reference to algorithm design of agent for detecting and analyzing data. In this paper, the detecting algorithm based on the immune principle, including the definition of problem domain, computation of affinity between the antibody and antigen,as well as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.