The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The network traffic generated by a computer, or a pair of computers, is often well modelled as a series of sessions. These are, roughly speaking, intervals of time during which a computer is engaging in the same, continued, activity. This article explores a variety of statistical approaches to re-discovering sessions from network flow data using timing alone. Solutions to this problem are essential...
How can we effectively use costly statistical models in the defence of large computer networks? Statistical modelling and machine learning are potentially powerful ways to detect threats as they do not require a human level understanding of the attack. However, they are rarely applied in practice as the computational cost of deploying all but the most simple algorithms can become implausibly large...
This section of the volume contains the proceedings of the 3M4SE 2014 workshop, held on September 1-2, 2014, in Ulm, Germany, in conjunction with the 18th IEEE International EDOC Conference on Enterprise Computing, EDOC 2014.
We present the M.In.E.R.Va. project, an online tool to help students (both attending Secondary Schools and Universities) recovering their deficiencies in Mathematics. We also present an analysis of the answers given by the students, performed using the Rasch model, which allows to investigate both students' results and the validity of the items.
Record linkage is the task of identifying which records from one or more data sources refer to the same entity. Many record linkage methods were introduced and applied over the last decades. In general, the principle is to compare a range of available identifier fields in record pairs among different data sources, in order to make a linkage decision. The Fellegi-Sunter probabilistic record linkage...
We deal with data structures and algorithms suitable for the displaying of multiple binary raster images. Multiple images are dealt as a multiple layer image. In this paper, we introduce three algorithms for operation of images represented by hexadeci-grid as multiple layer images and show some examples for our introduced alghrithms.
In order to quickly determine the distribution of anomaly detection model based on small amounts of collected data, the moving relative entropy density deviation method (MREDD) is introduced to test the power series distributed random sequence. Through the moving averages of data analysis and comparison, the anomaly detection models can quickly be established. Experimental results show that this method...
Latent Dirichlet Allocation (LDA) has been widely applied to text mining. LDA is a probabilistic topic model which processes documents as the probability distribution of topics. One challenging issue in application of LDA is to select the optimal number of topics in LDA model. This paper presents a topic selection method which considers the density of each topic and computes the most unstable topic...
Cloud storage is now an important developmenttrend in information technology. However, informationsecurity has become an important problem to impede it forcommercial application, such as data confidentiality, integrity,and availability. In this paper, we revisit the two private PDPschemes. We show that the property of correctness cannot beachieved when active adversaries are involved in these auditingsystems...
Palpation plays a critical role in medical physical exams. Despite the wide range of exams, there are several reproducible and subconscious sets of maneuvers that are common to examination by palpation. Previous studies by our group demonstrated the use of manikins and pressure sensors for measuring and quantifying how physicians palpate during different physical exams. In this study we develop mathematical...
The requirement and characteristic in Computer Generated Forces behavior modeling were analyzed. From the design concept of American OneSAF system, a method for behavior modeling based on composability was proposed and the formalization description of behavior was given. Moreover, the Behavior Modeling Composer Tool was developed based on this method to assist the behavior modeling. Finally, an application...
Customer credit scoring is an important concern for numerous domestic and global industries. It is difficult to achieve satisfactory performance by traditional models constructed on the assumption that the training and test data are subject to the same distribution, because the customers usually come from different districts and may be subject to different distributions in reality. This study combines...
In order to validate a particular approach to trust modeling, researchers have typically designed simulations in which various multliagent conditions are modeled and tested. Graphs have tracked different measures to demonstrate success of the proposed trust model, including satisfaction of buying agents, profit of selling agents (in e-marketplaces) or the extent to which the simulation matched some...
Saliency detection has been a very active research area in recent years. Most traditional methods suffer from the problem that existing visual features are not discriminative or not robust enough to predict salient locations. As a result, the experimental results of these previous methods are still far from satisfactory. In this paper, we propose to utilize a two-layer Deep Boltzmann Machine (DBM)...
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper proposes a custom data partitioning optimization method to achieve an efficient data parallelism, and applies it to the matrix multiplication. The result of the application supports the...
Optimizing the Map Phase is an important way to reduce the MapReduce (MR) job runtime. The common way for such studies is to design more efficient scheduling policies. However, there exists a kind of MapReduce applications, named imprecise applications, where the reduce phase can be completed based on the outputs of part of the map tasks. According to the feature of imprecise applications, we propose...
The authors present a complex of computer laboratories that simulates major subsystems of electrophysical facilities. Lab software interface creates a research environment with diverse electrophysical equipment, including assembly of the experimental circuits, setting their parameters and characteristics, starting and carrying out the necessary research. Models of subsystems are based on both mathematical...
According to the characteristics of post evaluation for the productive capacity construction project of oilfield and the actual situation of oilfield, detailed analyzed the evaluation index, the relationship and the impact to the Comprehensive Post Evaluation of the post evaluation for the productive capacity construction project of oilfield, proposed the comprehensive post evaluation model based...
In software testing, cause-effect graph assures coverage criteria of 100% functional requirements with minimum test case. The existing test case generation from cause-effect graph implements the algorithmic approach. It has disadvantages to modify the entire program if the input model is different. In contrast, model transformation approach can flexibly implement with even a different input models...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.