2011 International Conference on Network Computing and Information Security最新文献

筛选
英文 中文
Small Files Problem in Parallel File System 并行文件系统中的小文件问题
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.143
Xiuqiao Li, Bin Dong, Limin Xiao, Li Ruan, Yi Ding
{"title":"Small Files Problem in Parallel File System","authors":"Xiuqiao Li, Bin Dong, Limin Xiao, Li Ruan, Yi Ding","doi":"10.1109/NCIS.2011.143","DOIUrl":"https://doi.org/10.1109/NCIS.2011.143","url":null,"abstract":"Parallel file systems suffer performance degradation of small files generated by many workloads. We provide the systematic analysis of the small files problem from aspects of both parallel file system architecture and workload characteristics. Based on the analysis, we discuss the deficiencies of current optimizations and propose several open questions and possible research directions to address the problem.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128819700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Exchange Rate Forecasting Method Based on Particle Swarm Optimization and Probabilistic Neural Network Model 基于粒子群优化和概率神经网络模型的汇率预测方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.65
B. Liu, Hua Wang, Xiang Cheng
{"title":"Exchange Rate Forecasting Method Based on Particle Swarm Optimization and Probabilistic Neural Network Model","authors":"B. Liu, Hua Wang, Xiang Cheng","doi":"10.1109/NCIS.2011.65","DOIUrl":"https://doi.org/10.1109/NCIS.2011.65","url":null,"abstract":"Foreign exchange market is a complex market, with a high degree of volatility characteristics. Exchange rate formation mechanism and the factors affecting exchange rate volatility is also very complex, is a nonlinear system, it is difficult to accurately forecast, probabilistic neural network is applied to the frontiers of forecast, and aimed at the characteristics of probabilistic neural network to pretreatment the exchange of data and forecast the tendency. And by changing the vector dimensionality experiment obtain the best entry to embed dimensionality, based on the model, particle swarm optimization algorithm applied in the probabilistic neural network to optimize the smoothing factors, tested and improved the precise prediction and valuable.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Fixed Point Algorithm for Noisy Time-Dependent Processes Using AR Source Model 基于AR源模型的含噪时变过程不动点算法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.161
Yumin Yang
{"title":"A Fixed Point Algorithm for Noisy Time-Dependent Processes Using AR Source Model","authors":"Yumin Yang","doi":"10.1109/NCIS.2011.161","DOIUrl":"https://doi.org/10.1109/NCIS.2011.161","url":null,"abstract":"Independent component analysis (ICA) is a fundamental and important task in unsupervised learning, that was studied mainly in the domain of Hebbian learning. In this paper, we consider the estimation of the data model of ICA when Gaussian noise is present and the independent components are time dependent. The temporal dependencies are explained by assuming that each source is an autoregressive (AR) process and innovations are independently and identically distributed (i.i.d). A fixed-point algorithm to estimation of the noisy time-dependent processes by maximizing negentropy of innovation when the noise covariance matrix is known. Computer simulations show that the fixed-point algorithm achieves better separation of the noisy mixed signals and noisy mixed images which are difficult to be separated by the basic independent component analysis algorithms, and comparison results verify the fixed-point algorithm converges faster than the existing gradient algorithm and, it is more simple to implement due to it does not need any learning rate.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Shuffled Frog Leaping Algorithm for Grid Task Scheduling 网格任务调度中一种改进的洗牌青蛙跳跃算法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.76
Wu Yang, Yuanshu Sun
{"title":"An Improved Shuffled Frog Leaping Algorithm for Grid Task Scheduling","authors":"Wu Yang, Yuanshu Sun","doi":"10.1109/NCIS.2011.76","DOIUrl":"https://doi.org/10.1109/NCIS.2011.76","url":null,"abstract":"Grid computing has attracted many researchers' attention in the past few decades, and task scheduling is the key technology in Grid computing. The dynamic, heterogeneous and autonomous characteristics of grid make the scheduling approach a complex optimization problem. Many algorithms based on heuristic algorithm, genetic algorithm and particle swarm optimization algorithm have been presented to solve it, respectively. Unfortunately, their results have not been satisfied at all yet. In this paper, an improved shuffled frog leaping algorithm is proposed to solve the task scheduling in grid environment, and the simulation experiment results show that the new gird task scheduling algorithm is more robust and efficient than the existing algorithms.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123537370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobile Trusted Scheme Based on Holistic Security Service System 基于整体安全服务体系的移动可信方案
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.129
Li Tao, H. Aiqun
{"title":"Mobile Trusted Scheme Based on Holistic Security Service System","authors":"Li Tao, H. Aiqun","doi":"10.1109/NCIS.2011.129","DOIUrl":"https://doi.org/10.1109/NCIS.2011.129","url":null,"abstract":"Mobile services are pervasive in wireless network and are one of the crucial components needed for various applications and services. Security problems related to mobile phones directly influence credibility of these applications and services. Trusted Computing technology provides powerful support for the solution to security issues of mobile device in mobile network. This paper proposes a Holistic Security Service System for mobile network. It consists of a Security Service Provider, a Software Provider and a Mobile Trusted Terminal. A hardware and software solution of trusted mobile device is also proposed, and a trusted software running mechanism based on certificate access control is discussed. Our security analysis and experimental results prove that both the Holistic Security Service System and mobile trusted mechanism can be used in mobile networks.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123666108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Regularized Back-Propagation Neural Network for Rainfall-Runoff Modeling 正则反向传播神经网络在降雨径流模拟中的应用
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.116
Xian Luo, Youpeng Xu, Jintao Xu
{"title":"Regularized Back-Propagation Neural Network for Rainfall-Runoff Modeling","authors":"Xian Luo, Youpeng Xu, Jintao Xu","doi":"10.1109/NCIS.2011.116","DOIUrl":"https://doi.org/10.1109/NCIS.2011.116","url":null,"abstract":"In this study, we applied regularized back-propagation neural network (BPNN), which made use of a performance function different from normal BPNN, to predict daily flow. On the other hand, Broyden-Fletcher-Goldfarb-Shanno (BFGS) -algorithm-based BPNN was also used to compare its prediction performance with that of regularized BPNN. From 1979 to 1998, precipitation and stream flow data in Xitiaoxi watershed for 20 years were collected. All these data were divided into 2 sets: one was the training set (1979-1988), and the other was the testing set (1989-1998). The mean absolute error (MAE), mean square error (MSE) and coefficient of efficiency (CE) were used to evaluate the performance of these two algorithms. The results indicated that regularized BPNN could enhance generalization ability and avoid over fitting effectively, and it outperformed BFGS-algorithm-based BPNN during training and testing stages. From this study, it could be found that regularized BPN is appropriate for rainfall-runoff modeling due to its simple structure and high accuracy.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Network Attack Packet Sampling Based on Stackelberg Game Theory 基于Stackelberg博弈论的网络攻击数据包采样研究
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.47
Lei Zhou, Hang Chen
{"title":"Research on Network Attack Packet Sampling Based on Stackelberg Game Theory","authors":"Lei Zhou, Hang Chen","doi":"10.1109/NCIS.2011.47","DOIUrl":"https://doi.org/10.1109/NCIS.2011.47","url":null,"abstract":"Network intrusion detection is an important part of network security research. Stackelberg game theory is applied to study attack packets sampling problem in network security, and network attack packets sampling model is proposed in this paper. The network security system is regarded as the follower in this game, adjusting the strategies to maximize its benefit function according to the behavior of network attacker. We proved the existence and uniqueness of Stackelberg equilibrium in this game model. Packets sampling algorithm PSA-SM and its equivalent algorithm SPSA were designed based on linear programming. Attack packets injecting algorithm IPIA-GT is also designed. The experiment results showed that network security system can use SPSA to increase the sampling probability of attack packets, and network attacker can also use IPIA-GT to decrease the sampling probability of attack packets. When both of them used optimal strategies, the game got its equilibrium.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125992532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Land Mark Node Technology Based Load Balancing Method for Constructing Future Carrier-Class P2P Network 基于地标节点技术构建未来电信级P2P网络的负载均衡方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.136
Heng Zhang, Sicong Kuang
{"title":"A New Land Mark Node Technology Based Load Balancing Method for Constructing Future Carrier-Class P2P Network","authors":"Heng Zhang, Sicong Kuang","doi":"10.1109/NCIS.2011.136","DOIUrl":"https://doi.org/10.1109/NCIS.2011.136","url":null,"abstract":"In P2P network, present load balancing algorithms are network locality insensitive. Load transfer between nodes may be done between two or more long-distance nodes. This will delay transfer time, waste some bandwidth resource, result in node failure and network bottleneck. This paper aims to build a controllable, operable P2P network and furthermore benefit the future mobile Internet. This paper presents a new approach to distribute load to nodes within a certain range by introducing Land Mark Node (LMN). LMN is responsible for load regulation and assignment of node ID. In the paper, we explain the new algorithm and compare it with the previous algorithms involving load balancing. Finally we evaluate the benefits of our approach in the context of the P2P network and IMS core network.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128710238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvements on Trust Transitivity Model for Open Network 开放网络信任传递性模型的改进
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.146
Zhang Lin, Wang Ruchuan, W. Haiyan
{"title":"Improvements on Trust Transitivity Model for Open Network","authors":"Zhang Lin, Wang Ruchuan, W. Haiyan","doi":"10.1109/NCIS.2011.146","DOIUrl":"https://doi.org/10.1109/NCIS.2011.146","url":null,"abstract":"Traditional security mechanisms have not met with the needs of open network. Trust mechanism will be an important trend in the field of security. Present studies still have some kinds of deficiency. In this paper, Further works are done in trust transitivity model. As an important factor, recommendation ability (\"honesty\") is considered to take part in computing recommendation trust value. Trust storage structures about \"honesty\" and \"accuracy\" are provided, which are based on n history windows and are renewed with time goes on. New trust transitivity tree is studied, which has made differentiation from \"honesty\" and \"accuracy\". Finally, a recursion-arithmetic about trust transitivity is given. Experimentation results show novel trust model is rational, correct and valid.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-rootkit Technology of Kernel Integrity Detection and Restoration 反rootkit内核完整性检测与恢复技术
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.62
Yongqiang Zhang, Hai Bi
{"title":"Anti-rootkit Technology of Kernel Integrity Detection and Restoration","authors":"Yongqiang Zhang, Hai Bi","doi":"10.1109/NCIS.2011.62","DOIUrl":"https://doi.org/10.1109/NCIS.2011.62","url":null,"abstract":"Aiming at the principles how root kit malicious action by hooking System Service Dispatch Table and utilizing inline function patching, this paper presents a method of integrity detection and restoration based on kernel file, which is proved to ensure correct implementation of the kernel function.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信