Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Corporate credit ratings are important financial indicators of investment risks. Traditional credit rating models employ classical econometrics methods with heteroscedasticity adjustments across various industries. In this paper, we propose using machine learning techniques in predicting corporate ratings and demonstrate, empirically, that multiclass machine learning algorithms outperform traditional...
A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the...
Computer-supported cooperative work (CSCW) in design explores the potential of computer technologies to help cooperative design. It requires more efficient technologies of communications and reusing knowledge in design process. Web service enables people work in cooperation and can greatly help people share and reuse knowledge on the Web. At present Web service composition is the hotspot of research...
The Compter Supported Cooperative Work(CSCW) is one of the basic features of modern industry. Every industry area requires their own software system to meet specific application businesses and needs. The development of domain-specific software inevitably requests collaboration of domain experts, end users, system analysts and designers, programmers and other related persons. So, how to build a precise,...
The author brings forward a general object network management platform based on MOF (meta object facility) in the paper. The platform is based on MOF model gave out by OMG, and adopts the modeling idea of model driver and MOF meta-meta model (namely the model of the meta model). In addition, the model driver idea is applied in the software development process; software development is based on a high...
The exploration of computer-supported cooperative work (CSCW) in military fields is how to enhance the combat efficiency via computer technology. Along with the appearance of advanced weapon and the increasing of campaign complexity, it is essential that the system must be capable of supporting the ability of high performance cooperation as well as possessing the dynamic and flexible processing ability...
With the rapid increasing of the number of services in Web environment, single or simple composition of the service is unable to provide high-quality service for requesters. Although dynamic service composition provides the automatic composition methods for machines, it cannot handle complex service requests. The main objective of researching Semantic Web is to extend the current World-Wide-Web, which...
We have proposed a model of distributed cooperation network forewarning system for the pervasive computing. It combines entity and service behavior characteristics according to the relationship of time and location. Through cooperation of various management domains a distributed cooperation network forewarning system across domain has then been designed. The system uses a method of correlated sample...
As Internet technologies advance, the problem of Internet security has become increasingly urgent. This study integrates the identity authentication scheme with the vector space scheme and applies the elliptic curve cryptosystem, to construct a group signature authentication cryptosystem. The application environment is required to transmit data through the Internet, so the proposed method uses the...
Workflow management is the key technology in implementing the control of business process. The current workflow meta-model depends on specific parameters and implementation process, and lacks the exhibition of semantics understanding and knowledge involved. So, this paper proposes a workflow knowledge meta-model based on ontology, in order to support the combination of business modeling process and...
MDA and AOP techniques are used in combination with each other in software design. In MDA, one can use AOP's aspect-oriented concept to create a model so as to separate the concerns. The aspects in AOP can be used as models in MDA to be transformed, checked, queried and maintained. The model-driven based aspect-oriented model weaving framework (MAMW) is a form of model transformation, which separates...
Network data collection is the important part in network management, and the system design involves a lot of concurrency and communication problems. Therefore a formal approach was presented to the formal analysis of network data collection, based on Hoare's communication sequential process (CSP) and some theoretical results of network formal reaction. Then the formal analysis to network data collection...
The sulfur-free expanded graphite was a kind of graphite intercalation compound, which was prepared by the method of chemical oxidation. Glacial acetic acid and perchloric acid were used as inserting reagent, and a mixture of perchloric acid and potassium dichromate was used as an oxidizing agent. The optimum weight ratio was as follows: m 1 (flake graphite):m 2 (perchloric acid):m...
This article proposes a collaborative workflow system based on ontology, which is focused on typical database access. By introducing ontology base and realizing the ontology definition of flow service, domain knowledge and user interface, the system is able to incorporate collaborative knowledge dynamically and thus is flexible enough to apply in other domains which have same application patterns...
This paper describes a practical approach of network management software for telecom domain based on model-driven approach and CSCW technology. A modeling tool, customizing tool and telecom network object framework have been developed. The modeling tool provides an environment on which the modeler can model domain entities and relationships, and the assemblage rules of models and the domain framework...
Current intrusion detection systems are almost unable to repel the threats from internal users of organizations. In order to mitigate insider threat availably, in the paper we present a multi-agent based predicting and detecting model and describe implementation algorithm of related agents. It can continually report the attack probability of an attacker to system administrators, and provide a quantitative...
In this article, a model of computer network management is presented in detail in order to monitoring the network for the administrator to see the distribution of the flow online, which can be used to monitoring the statistic and the analysis of the traffic in the network, combines the theory of pervasive computing with the traditional technology of network management. As an important part in this...
There are many new characters of network in the pervasive computing environment, and the traditional method of data collection and processing have not adapted the requirement of network management. So, according to the research on the characters of network in the pervasive computing environment, a rule-based method for network data collection and processing is brought forward combined with present...
In this article, a verifiable vector space secret sharing scheme is proposed in detail. It's security is based on the security of elliptic curve cryptography. This scheme has the following characteristics: The precondition of (t ,n) -threshold secret sharing scheme that all assignees' purview must be same is generalized. A verifiable infrastructure is provided, which can be used to detect the cheaters...
In pervasive computing environment, it is required that applications should be able to discover and interoperate with each other. We designed and develop a workflow management system that is based on metadata. In the system we integrated document management, flow management and data management together. The flow engine of the system is capable of manipulating the business data when routing the flows...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.