The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our knowledge as to how to solve software engineering problems is increasingly being encapsulated in tools. These tools are at their strongest when they operate in a pre-existing development environment that can provide integration with existing elements such as compilers, debuggers, profilers and visualizers. The first Workshop on Developing Tools as Plug-ins is a new forum in which to addresses...
With this enormous speed in generating and collecting images, there is an extreme need in extracting interesting and useful knowledge from image archives. In our previous works, we have proposed an image mining framework to extract knowledge from a sequence of images. The framework is composed of two main modules: image analysis and knowledge processing. In this paper, we successfully customized the...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Linear motion and out-of-focus blur often coexist in a surveillance system, which degrade the quality of acquired images and thus complicate the task of object recognition and event detection. In this work, we present a point spread function-based (PSF-based) approach considering fundamental characteristics of linear motion and out-of-focus blur based on geometric optics to restore coexisting motion...
We propose a novel distributed cross-layer optimization approach for cognitive radio wireless networks. A cognitive radio is a wireless device that is capable of sensing the prevailing environmental conditions and automatically adapting its operating parameters in order to enhance the performance of both the system and potentially the whole network. Given the lack of a centralized intelligence to...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
Aiming at the color distributing feature of image, a feature extraction and image retrieval algorithm using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is proposed, which is based on child-block partition and area division. Firstly, divide the image into child-blocks, DWT the color value of each block, and extract the low frequency coefficients as the color feature of this...
The assessment of a testing strategy and the comparison of different testing strategies is a crucial part in current research on software testing. Often, manual error seeding is used to generate faulty programs. As a consequence, the results obtained from the examination of these programs are often not reproducible and likely to be biased. In this paper, a flexible approach to the benchmarking of...
Current fashion systems to interconnect large software architectures are moving toward SOA based solutions. This new paradigm for designing system can be improved, in our opinion, by using semantics. Semantics can a play a main role in boosting interoperability thanks to current technologies to express knowledge and to describe semantic Web services (SWS). This paper tackles the provision of a Software...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.