2008 International Multi-symposiums on Computer and Computational Sciences最新文献

筛选
英文 中文
Credit Risk Assessment Model Based on Domain Knowledge Constraint 基于领域知识约束的信用风险评估模型
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.31
Jingping Chen, Haiwei Pan, Qilong Han, Lin-zi Chen, Jun Ni
{"title":"Credit Risk Assessment Model Based on Domain Knowledge Constraint","authors":"Jingping Chen, Haiwei Pan, Qilong Han, Lin-zi Chen, Jun Ni","doi":"10.1109/IMSCCS.2008.31","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.31","url":null,"abstract":"With the continuous rising of real-estate prices and the upsurge demands by residents, the loan default risk has been raised gradually due to the individual housing loan increased with years. The efficient measurement and management systems for the credit risk in individual loan should be urgently established. Such systems need a knowledge-based decision methodology to be implemented. The decision tree algorithm is one of methods. It is applicable to enhance the riskpsilas assessment of Chinese individual real-estate loan. It has several advantages such as understandable principle, low demand, and interpretable results that can be visualized. In this paper, the decision tree and information entropy theories are applied to the credit-risk assessment of individual housing. Based on the theory of decision tree and domain knowledge, the evaluation of attribute to measure important degrees by knowledge-based information gained and a theoretical structure equation was established. It was found that using such approach, a higher accuracy for forecasts can be reached.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks 具有可撤销性和抗合谋性的无线传感器网络自愈密钥分发
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.13
Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang
{"title":"Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks","authors":"Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang","doi":"10.1109/IMSCCS.2008.13","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.13","url":null,"abstract":"Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network (e.g., wireless sensor networks). The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper, we propose a self-healing key distribution scheme with t-revocation and 2t-collusion resistance capabilities for wireless sensor networks. Built on an appropriate security model, our scheme reduces both storage and communication overhead and eliminates the limitations of m sessions when compared with some previous work under the same security model. In addition, we propose a scheme which enables key recovery from a single broadcast message.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Efficient Power and Coverage Algorithm in WSNs 一种有效的无线传感器网络功率和覆盖算法
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.14
Jin Zhang, Daxin Liu, Yuezhu Xu
{"title":"An Efficient Power and Coverage Algorithm in WSNs","authors":"Jin Zhang, Daxin Liu, Yuezhu Xu","doi":"10.1109/IMSCCS.2008.14","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.14","url":null,"abstract":"An efficient power and coverage algorithm called EPCA is proposed that puts redundant sensor nodes to sleep mode to save energy while maintain the sensing field covered. EPCA includes three algorithms: the node checking algorithm, the blind point avoidance algorithm and the sleeping nodes turning on algorithm. Detailed simulation results and compared to existed schemes prove the proposed EPCA algorithm not only guarantees the network is fully covered at least k level of coverage, but also prolongs network lifetime.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128762372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Load Balancing for Efficient Routing in Wireless Sensor Networks 无线传感器网络中高效路由的负载均衡
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.42
Minho Choi, Junhy Kim, Sooyeol Yang, Nam-koo Ha, K. Han
{"title":"Load Balancing for Efficient Routing in Wireless Sensor Networks","authors":"Minho Choi, Junhy Kim, Sooyeol Yang, Nam-koo Ha, K. Han","doi":"10.1109/IMSCCS.2008.42","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.42","url":null,"abstract":"Congestion is generated by buffer overflow and generally is considered in transport layer. However, there is almost no considered one about existing routing protocols of sensor network because it is difficult to apply congestion control in transport layer of WSNs (wireless sensor networks) that have limited resources such as energy, buffer, and bandwidth of sensor nodes. Therefore, routing protocol of sensor networks must deliberate how to control congestion. In order to overcome this problem, we propose the routing protocol avoidable congestion to improve throughput, packet drop rate, lifetime, and so on. Consequently, each node can evenly distribute loads. We demonstrate how to achieve congestion-free load balancing when there are multiple routing paths towards sink.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131872752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A DDoS-Oriented Distributed Defense Framework Based on Edge Router Feedbacks in Autonomous Systems 自治系统中基于边缘路由器反馈的ddos分布式防御框架
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.10
Xiaoming Bi, Wenan Tan, RuoHui Xiao
{"title":"A DDoS-Oriented Distributed Defense Framework Based on Edge Router Feedbacks in Autonomous Systems","authors":"Xiaoming Bi, Wenan Tan, RuoHui Xiao","doi":"10.1109/IMSCCS.2008.10","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.10","url":null,"abstract":"Distributed defense of distributed denial of service (DDoS) is one of the main research areas in DDoS recently. It is preferred to be conducted as the control-based defense. However, some existed methods have their respective disadvantages, such as efficiency, privacy. Therefore, a DDoS-oriented distributed defense framework based on the edge router feedbacks in autonomous systems (AS) is proposed to thwart the attack traffic in the boundary of AS near to the attacking sources. In the attacks, by measuring its ingress traffic rate the victim sends the feedbacks to the edge routers, as a result that malicious traffic is effectively filtered in AS boundary. The experiments show that the distributed defense framework can effectively guarantee the survival rate of legitimate flows and protect the victims in AS from DDoS.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Process Algebra-Based Description for Software Requirement 基于过程代数的软件需求描述
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.32
Haomin Zhan, Guisheng Yin, Changsong Sun, Linshan Shen, J. Ni
{"title":"Process Algebra-Based Description for Software Requirement","authors":"Haomin Zhan, Guisheng Yin, Changsong Sun, Linshan Shen, J. Ni","doi":"10.1109/IMSCCS.2008.32","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.32","url":null,"abstract":"A requirement process plays very important part in software engineering process. In order to truly meet the needs requested by customers, a software engineering system should include a high-quality requirement management process, which can accurately describes the software requirements. In this paper addresses and defines the requirement process to be implemented on a software system. It also reports on how we analyze the process in a perspective of system engineering. Based on the analysis and certain simplification, a process algebraic expression is proposed to establish a Software Requirement Process. The results show that development cycle is shortened, resources are saved; hence the efficiency is significantly improved.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124917357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Behavior-Based Worm Detection and Signature Generation 基于行为的蠕虫检测和签名生成
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.29
Yu Yao, Junwei Lv, Fu-xiang Gao, Yanfang Zhang, Ge Yu
{"title":"Behavior-Based Worm Detection and Signature Generation","authors":"Yu Yao, Junwei Lv, Fu-xiang Gao, Yanfang Zhang, Ge Yu","doi":"10.1109/IMSCCS.2008.29","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.29","url":null,"abstract":"High efficient and real-time characteristic of the signature-based approach guarantee the early detection of most known worms; while behavior-based approach searches for communication pattern of worms in accordance with their behavioral characteristics that are different from normal network traffic. To improve the detection rate and accuracy, two detection algorithms for diffuse type communication pattern and chain communication pattern and distributed detection architecture are proposed. Through analysis on detection result, the detection approach presented here can realize detection of both known and unknown worms with a high detection rate and accuracy.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effective Shape Measures in Malignant Risk Assessment for Breast Tumor on Sonography 超声诊断乳腺肿瘤恶性风险评估中的有效形态措施
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.11
Wei Yang, Su Zhang, Yazhu Chen, Yaqing Chen, Wenying Li, Hongtao Lu
{"title":"Effective Shape Measures in Malignant Risk Assessment for Breast Tumor on Sonography","authors":"Wei Yang, Su Zhang, Yazhu Chen, Yaqing Chen, Wenying Li, Hongtao Lu","doi":"10.1109/IMSCCS.2008.11","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.11","url":null,"abstract":"Malignant and benign breast tumors have different shape characteristics associated with their growth ways on sonography. Through analyzing the tumor shape pattern on the clinical images and the experimental results, we find that the tumor shape can be characterized on three aspects: convexity, ellipticity, and symmetry. In this paper, the shape measures are quantified using the polygonal approximation, the fitting ellipse, and local area integral invariant of contour respectively. The performance of these shape measures is evaluated on a breast ultrasound image data of 87 cases (49 benign and 38 malignant). Two combined convexity measures, an elliptic compactness, and a new reflection symmetry measure from local area integral invariant among the shape measures are appropriate and effective for distinguishing malignant and benign tumors, and all of their area under ROC curve can reach 0.9. They are significantly different between benign and malignant tumors on sonography, and show potential for the malignant risk assessment.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evolutionary Conservation and Interacting Preference for Identifying Protein-DNA Interactions 鉴定蛋白质- dna相互作用的进化保护和相互作用偏好
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.19
Yao-Lin Chang, I. Liu, Cheng-Yan Kao, Jinn-Moon Yang
{"title":"Evolutionary Conservation and Interacting Preference for Identifying Protein-DNA Interactions","authors":"Yao-Lin Chang, I. Liu, Cheng-Yan Kao, Jinn-Moon Yang","doi":"10.1109/IMSCCS.2008.19","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.19","url":null,"abstract":"Protein-DNA interactions play a central role in many genetic processes of cells. With the growing crystal structures of protein-DNA complexes, the computational approaches are becoming more and more useful for modeling protein-DNA interactions. This paper proposes template-based alignment with a new scoring function which combined the evolutionary conservation and protein-DNA interacting scores of DNA-contact residues. We showed that the combined scoring function is better to model the protein-DNA interactions than applying only one. Our method achieved high accuracy in identifying DNA-binding domains of 69 representative families and with the correlation 0.6 in predicting the binding free energy of the alanine scanning data. By applying the method to the hormone receptor family, it showed that our method can identify the DNA-binding specificity in different subfamilies. The evolutionary conservation is able to reflect the evolution pressure of DNA-contact residues and the interaction preferences can indicate the binding affinity between the protein and DNA. Experimental results show that both the evolution conservation and the DNA-binding capability of the DNA-contact residues are essential for identifying DNA-binding domains and protein-DNA interactions.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Path Recovery Method for Wireless Mesh Networks 无线网状网络的路径恢复方法
2008 International Multi-symposiums on Computer and Computational Sciences Pub Date : 2008-10-18 DOI: 10.1109/IMSCCS.2008.44
Keuchul Cho, Jeongbae Yun, Young-mi Baek, Kihyun Kim, K. Han
{"title":"The Path Recovery Method for Wireless Mesh Networks","authors":"Keuchul Cho, Jeongbae Yun, Young-mi Baek, Kihyun Kim, K. Han","doi":"10.1109/IMSCCS.2008.44","DOIUrl":"https://doi.org/10.1109/IMSCCS.2008.44","url":null,"abstract":"The hybrid wireless mesh protocol is a mesh routing protocol that combines the flexibility of on-demand routing with proactive topology tree extensions. The wireless mesh network is consisted with mesh points and stations. Even if mesh points or stations have mobility, the path should be kept continuously. Direction of present mobility research is achieved research in mobility of stations. In case the mesh access point moves, this research is very weak. Proposal scheme is emphasizing in the MAP (mesh access point) mobility. After the mesh access point moves, it re-establish existing full path by using RRER message. However, our scheme is available existing path that is changed locally by using the MR (message registration)-message which accomplish locally re-establish path technique. In this paper, we analyze problem in existent HWMPpsilas path establishment technique. We propose New Path Selection Scheme by using MR-message. Simulation results show that proposal scheme is to reduce packet loss.","PeriodicalId":122953,"journal":{"name":"2008 International Multi-symposiums on Computer and Computational Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信