2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)最新文献

筛选
英文 中文
A recommender system for telecom users: Experimental evaluation of recommendation algorithms 电信用户推荐系统:推荐算法的实验评价
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169139
P. Falcarin, A. Vetrò, Jian Yu, Shareeful Islam
{"title":"A recommender system for telecom users: Experimental evaluation of recommendation algorithms","authors":"P. Falcarin, A. Vetrò, Jian Yu, Shareeful Islam","doi":"10.1109/CIS.2011.6169139","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169139","url":null,"abstract":"The increasing flourish of available services in telecom domain offers more choices to the end user. On the other hand, such wide offer cannot be completely evaluated by the user, and some services may pass unobserved even if useful. To face this issue, the usage of recommendation systems in telecom domain is growing, to directly notify the user about the presence of services which may meet user interests. Recommendation can be seen as an advanced form of personalization, because user preferences are used to predict the interests of users for a new service. In this paper we propose a recommender system for users of telecom services, based on different collaborative filtering algorithms applied to a complex data-set of telecom users. Experiments on the recommendation performance and accuracy are conducted to test the different effects of different algorithms on a data set coming from the telecom domain.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Measuring security requirements for software security 衡量软件安全的安全需求
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169137
Shareeful Islam, P. Falcarin
{"title":"Measuring security requirements for software security","authors":"Shareeful Islam, P. Falcarin","doi":"10.1109/CIS.2011.6169137","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169137","url":null,"abstract":"For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature. This is because properties and metrics for measuring security are not properly defined and methods are lacking to provide a complete picture for measuring software security. Here we identify security requirements through asset based risk management process to describe soft ware security goal. Then based on the Goal-Question-Metric approach the identified security requirements are evaluated for measuring software security.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116252034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Combination of Taylor and Chan method in mobile positioning 移动定位中Taylor和Chan方法的结合
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169143
Hao Li, M. Oussalah
{"title":"Combination of Taylor and Chan method in mobile positioning","authors":"Hao Li, M. Oussalah","doi":"10.1109/CIS.2011.6169143","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169143","url":null,"abstract":"Due to increase in location based services, the need for efficient network based location methods has been made of paramount of importance. Among the mobile positioning techniques Time of Arrival (TOA) and Time Difference of Arrival (TDOA) arisen as promising techniques. In order to deal with such technology some theoretical approaches have been put forward to draw the estimation under the technological constraints. Among such approaches, one distinguish the Taylor based approximation and Chan's based approach which provide an approximate solution of the underlying hyperbolic equations. This paper reviews the above approaches and suggests a linear combination of the two estimators that minimize the variance. Simulation platform has been developed to test and compare the performances of these estimators. The result of simulation and actual measurement indicated that the method has high positioning accuracy both in ideal environment and actual measurement.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126514302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Methods of sensory augmentation through electro-tactile stimulation of the tongue 通过触电刺激舌头来增强感官的方法
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169145
A. Jeffs, K. Warwick
{"title":"Methods of sensory augmentation through electro-tactile stimulation of the tongue","authors":"A. Jeffs, K. Warwick","doi":"10.1109/CIS.2011.6169145","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169145","url":null,"abstract":"A device has been constructed and a series of trials have been performed in order to demonstrate the efficacy and further advantages of an electro-tactile array mounted onto the tongue surface for the purpose of sensory augmentation. Tests have shown that by using a low resolution array a computer-human feedback loop can be successfully implemented in order to complete tasks such as object tracking, surface shape identification and shape recognition with no training or prior experience with the device. Comparisons of this technique have been made with visual alternatives and show that the tongue based tactile array can match such methods in convenience and accuracy in performing simple tasks.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A critical evaluation of datasets for investigating IDSs and IPSs researches 对调查入侵防御系统和入侵防御系统研究的数据集进行关键评估
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169141
J. Nehinbe
{"title":"A critical evaluation of datasets for investigating IDSs and IPSs researches","authors":"J. Nehinbe","doi":"10.1109/CIS.2011.6169141","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169141","url":null,"abstract":"Complex and new cases of intrusions, new bugs, security issues and vulnerabilities are evolving everyday for a number of reasons. Consequently, researchers in the domains of Intrusion Detection Systems and Intrusion Prevention Systems constantly design new methods to lessen the aforementioned security issues. However, getting suitable datasets for evaluating various research designs in these domains is a major challenge for the research community, vendors and data donors over the years. As a result, most intrusion detection and prevention methodologies are evaluated using wrong categories of datasets because the limitations of each category of evaluative datasets are unknown. Therefore, this paper presents a critique of the challenges associated with evaluative datasets for investigating intrusion detection and prevention methodologies and how these challenges can be lessened. Finally, these analyses will effective guide researchers and vendors in securing evaluative datasets for validating the intrusion detection and prevention systems.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Intelligent channel access technique in Cognitive Radio networks 认知无线网络中的智能信道接入技术
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169142
M. Pirmoradian, C. Politis
{"title":"Intelligent channel access technique in Cognitive Radio networks","authors":"M. Pirmoradian, C. Politis","doi":"10.1109/CIS.2011.6169142","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169142","url":null,"abstract":"Future networks, especially in the framework of smart cities will be populated with various kinds of equipment accessing wireless communication channels. A much higher device variety will arise, ranging from identifiable objects to notebooks and smart phones. These aspects require high-level intelligent wireless access network. In order to cope with the vast number of technologies (machine-to-machine communications and sensor networks), cognitive radio network will be a key enabling technology. Cognitive Radio (CR) significantly utilizes current static radio frequency bands in an opportunistic manner. In this paper, we propose two intelligent channel access methods; Minimum Collision Technique (MCT) and Maximum Residual Lifetime Technique (MRLT) in CR networks. The proposed techniques are evaluated by average channel utilization and average channel collision on four dedicated channels in a specific period of time (3000ms). The numerical results confirm that the MRLT technique on cognitive radio side approaches more channel utilization and less data transmission collision among users, compared with MCT.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Self-organization for scheduling in agile manufacturing 敏捷制造中的自组织调度
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169132
A. Madureira, I. Pereira, N. Sousa
{"title":"Self-organization for scheduling in agile manufacturing","authors":"A. Madureira, I. Pereira, N. Sousa","doi":"10.1109/CIS.2011.6169132","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169132","url":null,"abstract":"Agility refers to the manufacturing system ability to rapidly adapt to market and environmental changes in efficient and cost-effective ways. This paper addresses the development of self-organization methods to enhance the operations of a scheduling system, by integrating scheduling system, configuration and optimization into a single autonomic process requiring minimal manual intervention to increase productivity and effectiveness while minimizing complexity for users. We intend to conceptualize real manufacturing systems as interacting autonomous entities in order to build future Decision Support Systems (DSS) for Scheduling in agile manufacturing environments.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Increasing completion of neural networks coursework 增加神经网络课程的完成度
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169131
R. Mitchell
{"title":"Increasing completion of neural networks coursework","authors":"R. Mitchell","doi":"10.1109/CIS.2011.6169131","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169131","url":null,"abstract":"The assessment of the author's second year module on neural networks requires students to write a program to implement a neural network and to then apply it to a real world problem of their choice. In recent years, significant numbers of students failed to complete the work. Some did not apply their network and some even failed to implement the network. This paper describes a series of refinements to the coursework, its support and its assessment, as a result of which only two students failed to complete the work this year.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A software system for data mining with twitter 基于twitter的数据挖掘软件系统
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169149
F. Bhat, M. Oussalah, K. Challis, T. Schnier
{"title":"A software system for data mining with twitter","authors":"F. Bhat, M. Oussalah, K. Challis, T. Schnier","doi":"10.1109/CIS.2011.6169149","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169149","url":null,"abstract":"The rise of social network usage through mobile devices makes the rigorous analysis of these systems of paramount importance for intelligence gathering and decision making. This paper describes the outcome of a multidisciplinary project carried out for the purpose of Twitter data collection and analysis. In particular, a proposal for enabling the discovery of spatial patterns within geo-located Twitter content has been investigated and implemented.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A provisioning model towards OAuth 2.0 performance optimization 面向OAuth 2.0性能优化的供应模型
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) Pub Date : 2011-09-01 DOI: 10.1109/CIS.2011.6169138
M. Noureddine, R. Bashroush
{"title":"A provisioning model towards OAuth 2.0 performance optimization","authors":"M. Noureddine, R. Bashroush","doi":"10.1109/CIS.2011.6169138","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169138","url":null,"abstract":"A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP, SharePoint, Exchange Server, etc.) require a mechanism to predict and manage performance expectations. As these applications become more and more ubiquitous in the Cloud, the scale and performance expectations become an important factor impacting architectural decisions for security protocol adoption. This paper proposes an optimization to OAuth 2.0 for enterprise adoption. This optimization is achieved by introducing provisioning steps to pre-establish trust amongst enterprise applications' Resource Servers, its associated Authorization Server and the clients interested in access to protected resources. In this model, trust is provisioned and synchronized as a pre-requisite step to authentication and authorization amongst all communicating entities in OAuth protocol, namely, the client requesting a protected resource, the resource server, and the authorization server. For a case study, we analyze SAP authenticating with SharePoint using our optimization versus existing OAuth protocol. We believe such optimization will further facilitate the adoption of OAuth in the enterprise where scale and performance are critical factors.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128745377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信