The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For trusted computing technology, as the basis of remote attestation, system integrity measurement whose theory model and application research is all along a discussed focus. Integrity measurement of binary system of trusted computing technology used the transmission model of trust chain, but the development of this model is late to the development of remote attestation. This paper mainly concerns...
On Dec 8th, 2003, the top price levels showed in the limit order book were enlarged from three to live in Chinese stock market, and the transparency was largely increased. The paper studies on the contribution of every quote price to price discovery, and compares with contribution of before and after transparency was increased. The results show that there exists significant difference of information...
After the improvement of the actual theory of cold roll forming and the practical rolling process, author present the concept of dynamic chain model and node model, research steel strip forming mechanism based on information system. The problems such as the forming process research, the effects of friction on the forming, analysis of stress and strain were studied in the new model. What is more important...
Since non-linearity is obviously characteristic of natural gas analysis, and few ideal spectrum data samples can be actually obtained from the mass natural gas, the accuracy level of concentrating each component in the natural gas turns out to be far from high. In response to the dilemma above, a multi-level- and SVM-subset- based infrared spectrum analyzing method is proposed for the analysis of...
As SNMP management system has some weaknesses due to its built-in functional limitation, NETCONF, with XML as its data encoding scheme, is viewed as a promising solution for future network configuration management. To make NETCONF interoperable and capable of manipulating data in a standardized fashion, an extensible data modeling language, YANG, was proposed to model data including configuration...
The virtual prototype model for fast simulation analysis of the complete integrated sea trial system for deep ocean mining is built up based on single-body model of the seafloor tracked miner and discrete element model of the pipeline system. Dynamic simulation analysis is performed and investigated taking into account the interactions between each subsystem and corresponding complex ocean environment...
Convenient, rapid, efficient and anonymous characteristic of P2P technology, enables P2P network gathering enormous users very quickly, and P2P traffic has occupied 60~80% bandwidth of Internet. Such giant traffic has formed a threat to the service quality of other Internet application and the security of Internet itself. However, most study about P2P traffic focuses on traffic monitoring and characteristic...
Business process management system is the base of realization of Economic Business. Exact business process models can ensure the normal running of business process management system. With the constantly change of market requirement, process models don't keep stable. There are large mount of process logs in business process management system. These logs involve information of various business processes...
As e-commerce always suffers from the uncertainty, cheats and attacks, concepts of trust and risk are brought in to enhance on-line business. Several models or frameworks for dealing with uncertainty and threats in cyberspace have been proposed in the literature, but few explicitly consider trust and risk as two separate factors that influence different aspects of on-line interactions independently...
With rapid development of communication technology, the signal integrity is impacting the system performance much more than before. So either in the IC design or in the system design, it is very important to investigate negative timing analysis and its mathematical modeling in the high speed integrated circuit. In the paper, we introduce the origin of the negative timing script in the deep sub-micrometer...
Traditional business process management systems only focus on process definition and running. This paper designs an intelligent business process system to realize process diagnosis, analysis, optimization, and prediction. Process mining engine is the key component of the intelligent system. This paper designs a process mining algorithm based on Markov matrix to realize business process remodeling...
On the condition of limited resources, businesses should put the resources on those profitable customers. So it is necessary to carry out the customer segmentation, especially for the air cargo industry being in the fierce competition. Drawing on the theory of customer value, and combining it with the management features of the air cargo customers to construct the forecasting model of customer value,...
Multi-agent systems (MAS) have emerged as an active sub field of artificial intelligence. Robotic soccer is a typical multi-agent systems, wherein the challenge is to develop and hone the skills of the agents that take part in the game. This paper proposes an interception strategy based on rough sets with dominance relation, in which the methods of knowledge reduction and rule extraction are investigated...
A simple and easy-to-implement analytical model for scheduling algorithm is proposed. Packets delay can be easily calculated with this analytical model but the computational complexity is reduced more compared with other popular methods such as Laplace-Stieltjes transform or Probability Generating Function. Two theoretical analyses on the basis of the proposed model are presented. The results are...
This paper explores the background and characteristics of virtual enterprises, the cooperation motivation in virtual enterprises. Then we study the stability of the cooperation based on the noisy polymorphic population replicator dynamic model, and analyze how the uncertainty caused by the fierce rivalry or other outside factors influences the cooperation strategy of the member enterprises. The result...
As the number of disks in a storage sub-system keeps increasing, the back-end network may become the bottleneck and thus impose a constraint on system performance. Unfortunately, there is no visible literature base on storage back-end network bottlenecks and scalability. This paper studies the scalability of the back-end network by answering two questions: (1) which factors affect the back-end network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.