The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: audio processing; speech processing; security; fingerprinting based multimedia content management; virtual reality signal processing; video coding; joint source channel coding; and quality evaluation.
IDS (Intrusion Detection system) is an active and driving defense technology. This paper mainly focuses on intrusion detection based on data mining. The aim is to improve the detection rate and decrease the false alarm rate, and the main research method is clustering analysis. The algorithm and model of ID are proposed and corresponding simulation experiments are presented. Firstly, a method to reduce...
Trustworthiness evaluation is an increasingly common theme in service-oriented computing. However, existing approaches are not effective for web services trustworthiness assessment. In this paper, we present a web services trustworthiness evaluation model based on Fuzzy Cognitive Maps. The model combines the trust evidence framework and the dynamic context reputation feedback at runtime. The simulation...
The immunoglobulin is one kind of special material for protecting the biological body far way from the invasion of harmful foreign antigen. When the biological body is under the attack by the continuous harmful foreign antigens, the set of immune cell in biological immune system will secret much immunoglobulin to neutralize them. Inspired by the process of immunoglobulin secretion in biological body,...
Depth study of the network environment based on software engineering theory and cutting-edge technology to improve the competitiveness of China's software industry breakthrough. Only by having a strong independent research and development of software innovation can fundamentally industrial upgrading its software, and resolve network resources brought by the deepening of the software application bottlenecks...
Our work focuses on selecting a trusted service from service consumer's perspective. First, we distinguish the two kinds of trust context to separate the ability of service as both a service provider and a service consumer in a service web; and we classify the reputation into two different categories. Second we generate a reputation metric model by improving Subject Logic. The trust decision model...
There has been a tremendous growth in the wireless communication networks and their applications around us. Different applications developed over wireless networks can have very different requirements. For some applications, protection from transmission errors might be of primary, whereas for other application the security and privacy of the information in transit might be the primary requirement...
Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, micro logging, or customer review sites. Such media often serve as platforms for information dissemination and product placement or promotion. In this environment, influence and trust are becoming essential qualities among user interactions...
Aim of the intrusion detection is to availably detect the intrusion from large stores of data. IDS (Intrusion Detection System) analyses sorts of data resource with data mining techniques to extract useful patterns and rules that could be used to guide the IDS to analyse intrusion. Allowing for characteristics of intrusion detection, a novel approach of mining frequent serial episodes from streams...
Mobile E-Commerce, as a more convenient and express form of E-Commerce, is developing rapidly with the saturation of E-Commerce market coupled with the widespread of mobile devices. Meanwhile, speech recognition, as a fully-developed identification technology of biological character, receives more praise and abuse than any other scientific breakthroughs. Followed by a brief discussion of the safety...
The following topics are dealt with: human-computer interaction; user-centered design; social computing; social intelligence; ubiquitous computing; mobile system; gaming; computer-assisted learning; cognition; privacy; security; trust management; human-centered evaluation; information visualization; visual analytics; and semantic systems.
The following topics are dealt with: agile software development; safety-critical software; software reusability; software testing; low-fidelity prototypes; and software quality.
Now a days, more and more of social network data are being published in one way or other. So, preserving privacy in publishing social network data has become an important concern. With some local knowledge about individuals in a social network, an adversary may attack the privacy of some victims easily. Most of the work done so far towards privacy preservation can deal with relational data only. However,...
at the present time, the increase of e-mail spam are heavy to cumber and the spam are vastly spread. These spams cause various problems to the Internet users, such as full incoming mailbox, and wasting time. Therefore, tremendous methods have been proposed but most of them have limitation in the mapping feature and processing time. This paper proposed a method that can detect a set of image e-mail...
Grid security is a major requirement in grid computing. Trust management is considered as an effective approach to enhance grid security. This paper introduces the trust into the multi-domain grid and qualifies grid trust as the relationship between grid resource providers and grid consumers. In order to provide more flexible and scalable protection for grid resources and services in multi-domain...
With the rapid development of embedded industry, the performance of operating system in embedded equipment has been more and more attended. And according to embedded system characteristics, this paper uses a form of improvement and expansion to design a kernel operating system suitable for multi-core embedded platform, so that to promote the in-depth application of the multi-core processor in embedded...
With the development of security system information degree and protection capability format, it is important to evaluate its effectiveness precisely to prevention and control of social order based on these changes. According to the operational characteristics of security system, protection format is divided into personal protection, physical protection, and electronic protection. Effectiveness evaluation...
In order to explore the dynamic process of the trust mechanism of the Internetware entities, this paper proposes a self-organizing trust model of the Internetware by means of the replicated dynamic equation based on the Wright-Fisher process, and analyzes the evolutionary direction and the stability of the Internetware system by establishing the incentive and punitive mechanism. This kind of self-organizing...
Intrusion Detection Systems (IDSs) are known to produce huge volumes of alerts. The interesting alerts are always mixed with irrelevant, duplicate and non interesting alerts. Huge volumes of poorly sorted and unclustered alerts frustrate the efforts of analysts when identifying the interesting alerts. Therefore, the unmanageable amount of poorly sorted alerts is a critical issue affecting the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.