首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
ABSTRACT

Despite the recent increase in interest in the experience sampling method (ESM), researchers have repeatedly criticised the high burden and levels of interruption that it imposes on participants, and alternative cost-effective methods, such as the Day Reconstruction Method (DRM), have been adopted by the Human-Computer Interaction (HCI) community. In this paper, we review the use of ESM and DRM in the HCI field and argue for a new paradigm called Technology-Assisted Reconstruction (TAR), according to which passively logged data of users’ behaviours are used in assisting the later reconstruction of experiences and behaviours. We discuss five methods of Technology-Assisted Reconstruction that we have developed in our past work and conclude with a framework that highlights three directions for Technology-Assisted Reconstruction.  相似文献   

2.
An attempt to capture software aging and specify when to do preventive maintenance (PM) is presented in this paper. A composite measure termed the DRM, Deteriorating Response Measure, is defined. It is based on the analysis of the deteriorating speed of the software against time and load. This speed is characterized as follows: (1) It decays with increased load. (2) It does not increase again when the load decreases, this indicates loss of elasticity. The DRM is mathematically formulated based on a queueing system model.Specifying when to do preventive maintenance depends on the decision maker's perspective of the manifestation of aging. It is tried here to formalize this dependence. Three degrading performance metrics are defined for a DRM: (1) Decaying restored speed value. (2) Increasing speed offset ratio (recoverability index). (3) Increasing operation interval offset. These metrics can be used singly or aggregately in a DRM to specify when to do preventive maintenance. Results of model testing are also shown.This work can be part of an on-line procedure that calculates performance indexes for a server type software system like a web browser, an operating system, a database, and helps in the decision to do preventive maintenance for aging software.  相似文献   

3.
本文阐述了数字版权管理的概念、模型及现有的数字版权管理系统,着重论述了数字版权管理的互操作问题,特别是互操作的概念、本质、特性以及实现互操作的方法,之后阐述了数字版权管理所出现的问题、原因和实际需求,重点阐述了数字版权管理互操作现有的解决方法.最后指出了安全问题和分层数字版权管理互操作是作为未来工作需要深入展开的.  相似文献   

4.
5.
基于动态逻辑许可证的PDF版权管理系统   总被引:1,自引:1,他引:0       下载免费PDF全文
王景艳  钟勇  朱珍 《计算机工程》2009,35(11):169-171
电子文档版权管理是数字版权管理的重要研究领域,提出一种PDF电子文档版权保护方案,该方案的权限管理基于一种具有强大表达力、灵活性和开放权限管理能力的动态逻辑许可证,具有详细的文档权限控制方法,并通过内容级的PDF文档加密方法增强文档的安全性。对系统模型、实现结构和方法进行说明,并与相关方法进行对比和应用示例。  相似文献   

6.
We present a new architecture level unified reliability evaluation methodology for chip multiprocessors (CMPs). The proposed reliability estimation (REST) is based on a Monte Carlo algorithm. What distinguishes REST from the previous work is that both the computational and communication components are considered in a unified manner to compute the reliability of the CMP. We utilize REST tool to develop a new dynamic reliability management (DRM) scheme to address time-dependent dielectric breakdown and negative-bias temperature instability aging mechanisms in network-on-chip (NoC) based CMPs. Designed as a control loop, the proposed DRM scheme uses an effective neural network based reliability estimation module. The neural-network predictor is trained using the REST tool. We investigate how system’s lifetime changes when the NoC as the communication unit of the CMP is considered or not during the reliability evaluation process and find that differences can be as high as 60%. Full-system based simulations using a customized GEM5 simulator show that reliability can be improved by up to 52% using the proposed DRM scheme in a best-effort scenario with 2–9% performance penalty (using a user set target lifetime of 7 years) over the case when no DRM is employed.  相似文献   

7.
In this paper, we present a new scheme of digital rights management (DRM) system employing the fragile watermarking with permutation code for the image distribution via network. General DRM systems are designed to protect the copyright of contents and to trace the source of the illegal distributors based on the user-side watermarking. However, in the typical DRM systems, the original digital contents are temporarily disclosed without the watermarking information inside user’s system by the decryption process. Therefore, the user can copy the leaked original content inside the system and illegally redistribute via network without the permission of the content providers. Our work describes the idea of a DRM method which is composed of the incomplete cryptography based on permutation codes and user identification mechanism to control the quality of digital contents. There are two fundamental steps in our proposed cryptography: incomplete encoding and incomplete decoding. These two steps will create the scrambled content that is used as trial content and the watermarked content that is used to prevent unauthorized duplication or business of digital contents, respectively. Experimental results show that the proposed method is suitable for DRM in the network distribution system.  相似文献   

8.
In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization. ISRA practices vary among industries and disciplines, resulting in various approaches and methods for risk assessments. There exist several methods for comparing ISRA methods, but these are scoped to compare the content of the methods to a predefined set of criteria, rather than process tasks to be carried out and the issues the method is designed to address. It is the lack of an all-inclusive and comprehensive comparison that motivates this work. This paper proposes the Core Unified Risk Framework (CURF) as an all-inclusive approach to compare different methods, all-inclusive since we grew CURF organically by adding new issues and tasks from each reviewed method. If a task or issue was present in surveyed ISRA method, but not in CURF, it was appended to the model, thus obtaining a measure of completeness for the studied methods. The scope of this work is primarily functional approaches risk assessment procedures, which are the formal ISRA methods that focus on assessments of assets, threats, vulnerabilities, and protections, often with measures of probability and consequence. The proposed approach allowed for a detailed qualitative comparison of processes and activities in each method and provided a measure of completeness. This study does not address aspects beyond risk identification, estimation, and evaluation; considering the total of all three activities, we found the “ISO/IEC 27005 Information Security Risk Management” to be the most complete approach at present. For risk estimation only, we found the Factor Analysis of Information Risk and ISO/IEC 27005:2011 as the most complete frameworks. In addition, this study discovers and analyzes several gaps in the surveyed methods.  相似文献   

9.
Extracting sensitive information from vibration signal has become a frequently adopted way in fault diagnosis. However, most previous methods fragmented the relationship between quantification and visualization analysis, which affects the interpretability, accuracy and comprehensiveness of the extracted information. To this end, this paper proposes distribution recurrence plots (DRP) and measures (DRM) to realize the unity of visualization and quantification analysis of the signals. Specifically, DRP is a novel feature graphical representation method following the thought of symbolic dynamics. Derived from DRP, DRM is developed containing four quantifiers for extracting comprehensive fault features that allows a multiclass support vector machine (SVM) to identify the fault types of wind turbine drivetrain system (WTDS). Specially in DRM, pattern entropy is a newly designed quantifier by considering pattern distribution to obtained more accurate quantitative representation of the signals. Using simulated data, DRP and DRM are validated to reveal the intrinsic structural changes for different dynamic systems and robustness to noise. Applications on wind turbine gearbox illustrate that the proposed method has favorable diagnosis performance and stability compared with other competitors. This approach is easy to interpret, is robust to noise, and has a low computational burden, becoming viable for WTDS fault diagnosis.  相似文献   

10.
Crises affecting societies at a national level have regularly highlighted the importance of societies being prepared and resilient. There is a lack of standardized and proven procedures to ensure continuity of vital societal functions at a national level, as demonstrated in the recent COVID-19 pandemic. This article investigates how the methodology of business continuity management (BCM) can be used at a national level to increase resilience and societal safety. The article shows that a societal safety approach, where critical societal functions are based on societal values and basic individual needs, can be a fundamental platform for national continuity management. National risk assessments (NRAs), refer to the process and documentation of assessing risks at a national level. NRAs in three Nordic countries where societal safety is the basis for national disaster risk management (DRM) is analyzed, and in two other countries, which have worked extensively with NRAs. This article presents several possibilities and problems inherent in using the BCM process and methodology for national DRM. Finally, a rough proposal is given on how DRM can be developed at the national level with the help of concepts and methods from BCM that would increase societal safety.  相似文献   

11.
Digital rights management (DRM) is increasingly becoming a necessity for content management and distribution in highly networked environments such as the Internet. However, very few DRM models have been able to achieve commercial success and acceptance among users. This paper analyzes the problems with current DRM environments and proposes an open layered framework for development of DRM systems, where different technologies can interoperate within the framework. Furthermore, interoperability is studied in terms of the proposed layered framework, and problems posed by the current rights expression languages (RELs) are identified. We conclude that a refactoring of current RELs based on a set of design principles is necessary to achieve a reasonable level of DRM interoperability. We emphasize the need for middleware services for DRM, along with their responsibilities and places of operation within the proposed framework. Finally, a specific prototype architecture is introduced that makes use of existing infrastructures in order to implement a DRM environment consistent with the design principles described in this paper.  相似文献   

12.
First principles of copyright for DRM design   总被引:1,自引:0,他引:1  
The copyright system's legal, technological, and economic foundations define key concepts that have significant implications for digital rights management (DRM) system design. Extracting the technological, legal, and economic functions of copyright helps us identify principles that should be the basis for the design of DRM systems. However, no system currently supports that set of functions. Neither those who seek to manage authors' rights nor the defenders of access rights are entirely aligned with copy accuracy in that no system motivates and rewards authoring, filtering, and distribution. The most interesting question is how to design a system that completely fulfills the functions as copy accuracy - it would require more than secure storage.  相似文献   

13.
The MPEG-21 rights expression language and rights data dictionary   总被引:2,自引:0,他引:2  
The MPEG-21 Rights Expression Language (REL) is an XML-based language for digital rights management (DRM), providing a universal method for specifying rights and conditions associated with the distribution and use of assets like content, resources and services. Evolved from the eXtensible rights Markup language (XrML), the REL facilitates the creation of an open DRM architecture for managing and protecting these assets. As a general-purpose rights expression language, the REL is agnostic to types of assets, platforms and media, and expressive enough to support applications that can be even beyond DRM, including protecting privacy. It also contains additional capabilities in the areas of extensibility, security, trust management, and life cycle management of rights. This article provides an overview of the REL in terms of its data model, expressiveness, authorization model, structure for extensibility and profiling, and usages in digital media, trust management, and web services. To support the REL and provide extensive semantics for the management of rights, MPEG-21 also defined a Rights Data Dictionary (RDD). Based on original work conducted by , the MPEG-21 RDD specifies a methodology and structure for the RDD dictionary. The specification defines a core set of terms and provides a mechanism for the introduction of further terms through a registration authority. The RDD also supports the mapping of terms from different namespaces.  相似文献   

14.
Abstract— A simple method based on integration over time to measure motion‐picture response time (MPRT) has been developed. Liquid‐crystal response time (LCRT) alone cannot express the motion blur perceived by the observer; one must also take into account the transition between intermediate gray levels and the sample‐and‐hold effect. The method shows similar results to other previously reported methods based on temporal integration, while being simpler and more straightforward. Indeed, just monopixel test cells are required for measuring MPRT. This method can be used for comparison between different materials, alignments surfaces, or other manufacturing details with no need of fabricating the whole LCD structure. Nevertheless, the method could also be used for characterization of commercial displays with major changes. A comparison of MPRT values for three different liquid‐crystal materials is presented in this work. The behavior of the MPRT parameter in the case of an ideal liquid‐crystal material with an LCRT equal to zero has also been studied. The results obtained for this material have been used as a reference to establish comparisons with real materials.  相似文献   

15.
There are two commonly used analytical reliability analysis methods: linear approximation - first-order reliability method (FORM), and quadratic approximation - second-order reliability method (SORM), of the performance function. The reliability analysis using FORM could be acceptable in accuracy for mildly nonlinear performance functions, whereas the reliability analysis using SORM may be necessary for accuracy of nonlinear and multi-dimensional performance functions. Even though the reliability analysis using SORM may be accurate, it is not as much used for probability of failure calculation since SORM requires the second-order sensitivities. Moreover, the SORM-based inverse reliability analysis is rather difficult to develop.This paper proposes an inverse reliability analysis method that can be used to obtain accurate probability of failure calculation without requiring the second-order sensitivities for reliability-based design optimization (RBDO) of nonlinear and multi-dimensional systems. For the inverse reliability analysis, the most probable point (MPP)-based dimension reduction method (DRM) is developed. Since the FORM-based reliability index (β) is inaccurate for the MPP search of the nonlinear performance function, a three-step computational procedure is proposed to improve accuracy of the inverse reliability analysis: probability of failure calculation using constraint shift, reliability index update, and MPP update. Using the three steps, a new DRM-based MPP is obtained, which estimates the probability of failure of the performance function more accurately than FORM and more efficiently than SORM. The DRM-based MPP is then used for the next design iteration of RBDO to obtain an accurate optimum design even for nonlinear and/or multi-dimensional system. Since the DRM-based RBDO requires more function evaluations, the enriched performance measure approach (PMA+) with new tolerances for constraint activeness and reduced rotation matrix is used to reduce the number of function evaluations.  相似文献   

16.
随着网络技术和电子商务的发展,数字权益管理逐渐成为数字产品使用、交易和传播的重要技术。然而,目前数字权益管理系统没有一个完全的解决方案。本文首先介绍了数字权益管理基本概念和必要条件。接着,描述了现有数字权益管理系统的主要组件,同时指出当前系统存在的限制。作为解决方案,本文提出了一个全新的三层数字权益管理体系结构,对各层进行了定义。然后,对提出的体系结构和现有体系结构之间进行关系对应,同时描述了三层体系结构的主要特征。文中最后指出了数字权益管理在今后的发展方向。  相似文献   

17.
针对现有的DRM系统普遍存在互操作性和追踪机制的情况,本文提出了一种基于PKI/PMI、数字水印和RBAC的DRM模型,并分析了其工作流程和安全特性。  相似文献   

18.
Simplifying fuzzy rule-based models using orthogonal transformationmethods   总被引:6,自引:0,他引:6  
An important issue in fuzzy-rule-based modeling is how to select a set of important fuzzy rules from a given rule base. Even though it is conceivable that removal of redundant or less important fuzzy rules from the rule base can result in a compact fuzzy model with better generalizing ability, the decision as to which rules are redundant or less important is not an easy exercise. In this paper, we introduce several orthogonal transformation-based methods that provide new or alternative tools for rule selection. These methods include an orthogonal least squares (OLS) method, an eigenvalue decomposition (ED) method, a singular value decomposition and QR with column pivoting (SVD-QR) method, a total least squares (TLS) method, and a direct singular value decomposition (D-SVD) method. A common attribute of these methods is that they all work on a firing strength matrix and employ some measure index to detect the rules that should be retained and eliminated. We show the performance of these methods by applying them to solving a nonlinear plant modeling problem. Our conclusions based on analysis and simulation can be used as a guideline for choosing a proper rule selection method for a specific application.  相似文献   

19.
This paper presents a combined reliability analysis approach which is composed of Dimension Reduction Method (DRM) and Maximum Entropy Method (MEM). DRM has emerged as a new approach in this field with the advantages of its sensitivity-free nature and efficiency instead of searching for the most probable point (MPP). However, in some recent implementations, the Moment Based Quadrature Rule (MBQR) in the DRM was found to be numerically instable when solving a system of linear equations for the integration points. In this study, a normalized Moment Based Quadrature Rule (NMBQR) is proposed to solve this problem, which can reduce the condition number of the coefficient matrix of the linear equations considerably and improve the robustness and stableness. Based on the statistical moments obtained by DRM+NMBQR, the MEM is applied to construct the probability density function (PDF) of the response. A number of numerical examples are calculated and compared to the Monte Carlo simulation (MCS), the First Order Reliability Method (FORM), the Extended Generalized Lambda Distribution (EGLD) and Saddlepoint Approximation (SA). The results show the accuracy and efficiency of the proposed method, especially for the multimodal PDF problem and multiple design point problem.  相似文献   

20.
庄超  蒋文超 《计算机工程》2006,32(17):225-226,229
怎样综合号虑互联网上有版权内容和无版权内容的综合查询,也即考虑如何在搜索引擎上增加权利管删的处理功能。这个问题体现在数字化图书馆、网络出版、远程教育以及企业内容服务等应用领域。该文主要介绍了3种解决方案:面向水印机制的搜索引擎,搜索引擎内嵌DRM机制以及自动生成版权内容索引的外加DRM搜索引擎机制。并对于这3种解决方案做一个比较。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号