Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Jieqing Ai"'
Publikováno v:
Proceedings of the 2017 2nd International Conference on Machinery, Electronics and Control Simulation (MECS 2017).
Publikováno v:
BMEI
RFID (Radio-Frequency IDentification) is attractive for the strong visibility it provides into logistics operations. In this paper, we explore fair-exchange techniques to encourage honest reporting of item receipt in RFID-tagged supply chains and pre
Publikováno v:
BMEI
A multi-party-signature protocol enables an ensemble of entities to sign on a message to produce a compressed signature. Recently, a lot of multi-party-signature protocols have been proposed in the security field. However, these schemes suffer either
Publikováno v:
Advances in Intelligent Systems Research.
This paper proposes a novel active defense strategy focuses on users’ behavior patterns which to classify the behaviors accurately by SVM for virus detecting. Differential evolution was introduced to improve the precision of SVM and turns it into a
Publikováno v:
Proceedings of the 2015 International Symposium on Computers & Informatics.
Establishing a complete information security policy is the most important step to solve the problem of information security and the basis for the entire information security system. Using intrusion detection technology to identify the source of threa
Publikováno v:
Proceedings of 2012 National Conference on Information Technology and Computer Science.
Through analyzing the indicators of classified protection and risk assessments of information system, a security configuration check specification model of Guangdong Power Grid Corporation is built. Security configuration enumeration library is also
Publikováno v:
2009 International Conference on Computational Intelligence and Software Engineering.
Publikováno v:
2009 International Conference on Machine Learning and Cybernetics.
With the rapid increasing of Web services in the internet, it is a challenge to discover target service efficiently. Existing service discovery method is inefficient, which has a bad scalability. Aiming at this problem, a method of two stages semanti
Autor:
Zhenyu Lu, Ji Gao, Jian Xiang, Zhijun Zheng, Xueqin Jiang, Jieqing Ai, Yu Jin, Yanbin Peng, Lv Ye
Publikováno v:
2009 International Conference on E-Business and Information System Security.
With the number of services increasing in a rapid speed in the Internet, it becomes a research hotspot to discover target service according to the service requirement. When single service can not satisfy the service requirement, services can be compo
Autor:
Ji Gao, Zhijun Zheng, Jian Xiang, Xueqin Jiang, Zhenyu Lu, Lv Ye, Jin Yu, Jieqing Ai, Yanbin Peng
Publikováno v:
2009 International Workshop on Intelligent Systems and Applications.
Traditional goal theory adopts Kripkean possible world semantics based normal modal logic to describe goal operator, which has monotonic trait. This paper argues that goal has non-monotonic nature; therefore, defeasible logic is imported to build goa