The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the dynamic nature of P2P systems, it is difficult to keep a global trust of the system by analyzing all nodes’ state which will increase node load. This is why it is important to develop a trust mechanism that uses as little nodes as possible to judge the global trust. In a SuperPeer-based p2p system using the superpeers (SPs) as management nodes can allow trust mechanism to be developed that...
In this paper, protocol insecurity problem is described, and AI planning system is used to solve the problem. Based on running characteristics and laws of cryptographic protocols, a planning-based formal model for cryptographic protocol analysis is presented, after its first-order syntax, formal definition and operational semantics are given, formalization for protocol honest agents, the intruder...
By analyzing the characteristic and the application of distributed interactive simulation (DIS) and high level architecture (HLA) and researching the management of federation object model and data distribution in DIS, A new method is presented to develop Petrochemical industry distributed interactive simulation adopting HLA technology. A simple petrochemical industry is modeled with HLA, the FOM and...
Along with the development of e-commerce, the problem of credibility for on-line transaction and exact selection of network resources has become more important. That is because of the anonymity and openness of on-line transactions and the richness of network resources. For this reason, A Trust Domain-Based Resource Selection Model for Multi-Agent (DRSM) is presented. The model divides the network...
This paper consists of a survey of various e-business, e-marketplaces, graphics and imaging processing, pattern recognition, computer vision, access control, authentication, authorization, etc. applications based on the intelligent computing, and also a summary of the recent techniques such as still artificial neural networks, swarm intelligence, artificial immune systems, fractal geometry, artificial...
Application of GRID computing technology in education, particularly in the field of E-Commerce learning, gradually forms the new research direction of E-Commerce learning GRID. And workflow technology is process-oriented system integration which accommodates document management system, database and Internet services and realizes distributed synchronous or asynchronous collaboration. These basic features...
The reliability of service is related to the kind and the number of service resources in grid. The kind and the number of service resources often change, so the service reliability is variable. In this paper, we propose a reliability measurement model for service in grid, which is based on the dynamic characteristic of service resource. In this model, the dynamic state of service is divided into a...
It is well known that simulated annealing (SA) and genetic algorithm (GA) are two global methods and can then be used to determine the optimal solution of NP-hard problem. In this paper, due to difficulty of obtaining the optimal solution in medium and large-scaled problems, a hybrid genetic algorithm (HGA) was also developed. The proposed HGA incorporates simulated annealing into a basic genetic...
Fuzzy-rough sets of existing mode are too abstract to the practical problems. It is not of much practical significance. But, the rough-fuzzy sets of existing mode for dynamic data processing capability are poor. This paper proposes new rough-fuzzy sets, which have integrated the advantages of the rough sets and fuzzy sets of data processing better, and have more practical significance for the settlement...
Most of recent researches on P2P system focus on how to build a highly usable P2P overlay network. Researchers include small routing table, short query path and good robustness into their design objectives of overlay topology. In this paper, we present a general group theory method and define a new Cayley graph. Based on this graph, we propose a novel P2P overlay network called CHypercube, which has...
The time series of daily returns of USD/CNY exchange rates suggest that there exists a leptokurtic feature (higher peak and fat tail) that results from some occasional jumps. So, we introduce the jump-diffusion model to describe the time series of daily returns. Since the traditional parameter estimation method, for example, MLE, can hardly detect the jumps exactly, then, we combine the jump detection...
Iterative search margin based algorithm (Simba) has been proven effective for feature selection. However, the previously proposed model does not effectively utilize the structure information hidden in data which may have a great impact on the generalization performance of post-analysis classifiers. In this paper, we introduce a novel hypothesis-margin model incorporating structure information for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.