首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
5.
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can affect decisions. Existing trust and reputation mechanisms typically rely on reports from as many sources as possible to mitigate the influence of misleading reports on decisions. In the real world, however, it is often the case that querying information sources can be costly in terms of energy, bandwidth, delay overheads, and other constraints. We present a model of source selection and fusion in resource-constrained environments, where there is uncertainty regarding the trustworthiness of sources. We exploit diversity among sources to stratify them into homogeneous subgroups to both minimise redundant sampling and mitigate the effect of certain biases. Through controlled experiments, we demonstrate that a diversity-based approach is robust to biases introduced due to dependencies among source reports, performs significantly better than existing approaches when sampling budget is limited and equally as good with an unlimited budget.  相似文献   

6.
7.
If you bank, buy insurance, financial services or shop for groceries or consult a dealer about a new car, you may be surprised to learn that your data has found its way into CRM (Customer Relationship Management) systems. CRM solutions are used increasingly by household names: Direct Line, Safeway, Barclays, Delta Air Lines, Renault and Peugeot, to build knowledge about customer interactions and the customer’s buying behaviour while giving the customer access to the organization through multiple channels.  相似文献   

8.
The problem of designing and managing a secure database system is considered in this paper. The approach which is proposed is primarily concerned with the security information definition and management in a database environment. A multiphase design methodology is presented reflecting current proposals of database design methodology. In particular four design phases are proposed: requirements analysis of the security system, conceptual, logical and physical design of security information. The content and the solution techniques of each phase are examined. A database management system architecture is also presented which is suitable to control access rights to the database.  相似文献   

9.
This paper studies online single machine scheduling where jobs have unit length and the objective is to maximize the number of completed jobs. Lookahead is considered to improve the competitiveness of online deterministic strategies. For preemption-restart model, we will prove a lower bound of (⌊LD⌋+2)/(⌊LD⌋+1) for the case where LD?1 and 3/2 for the case where 0?LD<1, in which LD is the length of time segment that online strategies can foresee at any time. For non-preemptive model, we mainly present a greedy strategy that has an optimal competitive ratio of 3/2 when 1?LD<2 while its competitive ratio is bounded from above by 4/3 as LD goes larger.  相似文献   

10.
Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54-63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this paper, we present a novel proxy cryptosystem model: proxy cryptosystem based on time segmentation. Under this mode, a security analysis model will be proposed. Furthermore, a proxy cryptosystem scheme is presented as an example. We will show that the proposed scheme is proven security in the proposed security analysis model. Finally, we will give the ID-based version of this construction.  相似文献   

11.
Machine Learning - The COVID-19 global pandemic is a threat not only to the health of millions of individuals, but also to the stability of infrastructure and economies around the world. The...  相似文献   

12.
13.
The Journal of Supercomputing - Cloud computing has a significant impact on information technology solutions for both organizations and researchers. Different users share critical data over the...  相似文献   

14.
There has been an increasing demand of work that required high level of computing power in IoT or establishment of server in IoT environment due to development of computing power. Excessive diagnosis has recently been a significant issue in the field of medicine. Excessive diagnosis issue is expected to be significantly reduced if establishing the easily configurable IoT server, communication with medical devices, and communication among hospitals by transmitting medical results to users. With the advancement of hacking technology, many hackers are interested in medical information and medical infrastructure, and the Information Security Management System (ISMS) is expanding in Korea. A number of medical ISMS projects are discussed, based on ISO 27791 standards derived from ISO 27001 standards. Large hospitals in South Korea have a variety of platforms that misrepresent personal information, and various platforms deal with sensitive medical information, but small and medium-sized hospitals use platforms that are not considered legal considerations.In this paper, we intend to establish a legal information sharing platform, which is legally considered legally limited and is responsible for the safety of the medical information.In the IoT server with limited resources, light-weighted and user-friendly protocols are frequently utilized over those that derive traffic and consume much resource. Under these circumstances, this study is intended to suggest IoT network that medical devices are able to create ubiquitous environment for users by utilizing simple service discovery protocol as a protocol provided without imposing much burden on limited resources and highly secured extensible messaging and presence protocol.  相似文献   

15.
随着企业的信息化程度的提高,越来越多的企业将它们的内部网络联入了互联网,这在给企业带来巨大的便利的同时,也带来了不容忽视的安全问题。本文对企业网络的安全防护所能采取的各种措施作了介绍,并分析了不同方式的优缺点,为构建安全的企业信息网络提供了有价值的参考意见。  相似文献   

16.
The explosion of knowledge management systems (KMS) and the need for their wide accessibility and availability has created an urgent need for reassessing the security practices and policies in organizations. Security of these assets is a day-to-day job placing a tremendous cognitive load on information-technology (IT) professionals, which can make it almost impossible to manage the security aspects of KMS. Autonomic-computing systems are well suited to manage KMS, as they use high-level system objectives provided by administrators as the basis for managing the security of KMS. The authors model the self-protection and self-healing configuration attributes in autonomic systems through game-theoretic models. The proposed modeling approach progressively moves from a manual intervention-oriented security setup to an autonomic security setup. This allows the authors to compare and contrast the different approaches and provide insights on their applicability to different security environments. The authors find that moving to a partial autonomic system with self-healing mechanisms can provide a stable environment for securing enterprise knowledge assets and can reduce hacking. It is beneficial to implement an autonomic system when manual investigation costs are higher and/or when the volume of malicious traffic is very low. An autonomic approach is especially attractive when it is difficult to impose penalties on malicious users. Autonomic systems can be effective in securing organizational knowledge assets and in reducing the potential damage from malicious users.  相似文献   

17.
校园网安全建设策略   总被引:1,自引:0,他引:1  
校园网在学校日常工作学习和管理中发挥着至关重要的作用。随着校园网的迅速发展和普及,其安全问题也日益突显。如何让校园网安全高效地运行,充分发挥其教学、管理和服务等功能,已成为一个不容忽视的问题。本文从校园网的特点出发,分析了校园网存在的安全隐患,并从技术、设备、管理等方面提出了改进和解决的策略。  相似文献   

18.
19.
校园网在学校日常工作学习和管理中发挥着至关重要的作用。随着校园网的迅速发展和普及,其安全问题也日益突显。如何让校园网安全高效地运行,充分发挥其教学、管理和服务等功能,已成为一个不容忽视的问题。本文从校园网的特点出发,分析了校园网存在的安全隐患,并从技术、设备、管理等方面提出了改进和解决的策略。  相似文献   

20.
创业容易,守业难。想知道如何创建自己的3D公司,阅读本篇指南,听取产业各部门的意见。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号