The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the e-commerce transaction process, varieties of network fraud problems occurred frequently. A C2C service reputation evaluation model under Cloud computing is Proposed. Firstly, the paper analyzes the four factors impact reputation evaluation under the cloud computing environment, and analysis the weights of each factor quantitatively. Secondly, a method to calculate the long-time reputation,...
Given the generally low quality of Production Development schedule baseline definition, an evaluation method of project schedule risk quantification based on Monte Carlo simulation under the conditions of resource constraints is proposed. Firstly, considering the resource constraints on the progress, an activity duration sampling method under resource constraints is proposed. Secondly, to study the...
In this paper we introduce an ant-based algorithm on continuous domains used to create procedural animations. We focus our approach on finding movement sequences that satisfy both the physical constraints as well as animator requirements. The proposed method is very flexible and can be easily adapted to different situations and characters' morphologies. Our simulations show that the proposed technique...
The hardcore model is a model of lattice gas systems which has received much attention in statistical physics, probability theory and theoretical computer science. It is the probability distribution over independent sets I of a graph weighted proportionally to λ|I| with fugacity parameter λ. We prove that at the uniqueness threshold of the hardcore model on the d-regular tree, approximating the partition...
User requirements obtained through text data mining are very important to improve the competitiveness of enterprises. In this paper an algorithm of acquiring user requirements in machinery products by using text association rule is proposed. In the algorithm, the user requirement documents are represented by vector space model. The feature words matrix is obtained by transposing the documents matrix...
Create a Hamming-Weight model, combine it with traditional algebraic attack, and achieve the Correlation algebraic attack on the first round of AES128 according to correlation coefficient r. The attack experiment proves that owing to this proposed model, it can evidently distinguish the right key bytes from the wrong ones by this function with further computed correlation coefficient r, and in certain...
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace...
We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failures, recovering from multiple failures is not guaranteed. In particular, events such as natural disasters or intentional attacks can lead to multiple correlated failures, for which recovery mechanisms are not well understood...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
The present study proposes a novel method of modelling the response of the renal blood flow (RBF) of rabbit kidneys to sympathetic nerve activity using polynomial nonlinear autoregressive with exogenous input (NARMAX) model. The nonlinear models were mapped into frequency domain using harmonic probing technique to get linear and nonlinear frequency response functions which are invariant descriptor...
Textures can be broadly divided into two categories, namely, stochastic and deterministic. The stochastic textures are characterized by its statistical properties and do not have easily identifiable primitives. Even if one can extract such primitives, a placement rule description for such textures may be extremely complicated. One of the ways to describe and generate such textures is simultaneous...
We consider the distributed function computation problem where the sink computes some function of the data split among N correlated informants, in asymmetric communication scenarios. The distributed function computation problem is addressed as a generalization of distributed source coding (DSC) problem. We are interested in computing the minimum number of informant bits required, in the worst-case,...
This paper presents a model of intelligent content filtering model to resolve the current network security audit system in filtering the information deficiency. First of all, in accordance with the characteristics of network security audit system, as well as the advantages and disadvantages of content filtering methods commonly, this paper choose suitable filter method, and then, optimize the filter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.