The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Proportional Navigation Guidance (PNG) law is not suitable for maneuvering targets interception as the accuracy will sharply degrade., in this paper, a modified augmented proportional navigation (MAPN) guidance law is proposed which adds an target maneuvering acceleration compensation to overcome the effect of the degradation of guidance accuracy. Aiming at modeling and filtering errors introduced...
One objective of studying complex system reliabilities using block diagrams is to determine which individual components contribute most significantly to the reliability of the assembled system. A well-known method is to compute the Birnbaum component importance (BCI) of every component, then prioritize reliability improvement efforts on the components that have larger importance values. In the literature...
This paper presents the dynamic characteristics of the fuel injection system in gasoline engine. Through AMESim software, it analyzes the pressure pulsations due to the excitation by the injector opening and closing with regular interval. The simulation model is validated by experiments. Then it compares the pressure pulsations of the system with and without damper. The results show that damper can...
Current adaptation approaches mainly work in isolation and cannot be easily integrated to tackle complex adaptation scenarios. The few existing cross-layer adaptation techniques are somewhat inflexible because the adaptation process is predefined and static. In this paper we propose a methodology for the dynamic and flexible adaptation of multi-layer applications. We use events to trigger the process...
With the popularity of SOA, SOA policy becomes one of the core technical enablers for SOA governance and management. Different in several aspects from traditional policy for distributed system management, policy applied in SOA solutions needs to take into account various policy types and enforcement points in different layers of SOA solution stack and different phases of SOA lifecycle. As well, it...
Recovering from intrusions for a compromised computer system is a challenging job, especially for systems that run continuous services. Current intrusion recovery techniques often do not preserve the accumulated useful state of running applications and have very limited system availability when performing recovery routines. In this paper, we propose SHELF, an on-the-fly intrusion recovery prototype...
We propose STILL, a generic defense based on Static Taint and Initialization analyses, to detect exploit code embedded in data streams/requests targeting at various Internet services such as Web services. STILL first blindly disassembles each request, generates a (probably partial) control flow graph, and then uses novel static taint and initialization analysis algorithms to determine if strong evidence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.