Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Rui-Zhong Du"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 1-10 (2017)
Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved alg
Externí odkaz:
https://doaj.org/article/6939ea2c0241481e8bf0d078b658a5b2
Publikováno v:
Tongxin xuebao, Vol 33, Pp 85-92 (2012)
The trust torque was defined as the product of trust gravitation and trust radius and the grid resource selection model based on trust torque was proposed.The grid resources are divided into many trusted resource domains according to different types
Externí odkaz:
https://doaj.org/article/8b410848ed7941caa1730dfa2af15ac0
Autor:
Rui Zhong Du, Fang Zhang
Publikováno v:
Advanced Materials Research. :2102-2106
Trust is an important factor in people’s trading activities, and it is closely related to risk. Trust and risk are the two key factors of Decision-Making. However, existing software behaviors trust research always overlooks the risk. In order to ev
Publikováno v:
Journal of Electronics (China). 22:261-267
Application of data fusion technique in intrusion detection is the trend of next-generation Intrusion Detection System (IDS). In network security, adopting security early warning technique is feasible to effectively defend against attacks and attacke
Publikováno v:
2009 International Conference on Machine Learning and Cybernetics.
In order to satisfy exploding demands of information storage, many scheduling models of distributed storage system are researched. The reasons are that the traditional models disclose too many limits and weaknesses, such as the bottleneck and breakpo
Publikováno v:
Advances in Machine Learning and Cybernetics ISBN: 9783540335849
ICMLC
ICMLC
Associating with the self-designed distributed database server system and studying the objective description and definition of load index, this paper proposes a three-level management framework of distributed redundant service system, introduces an a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::db3acf6475e5871309a363553738f15a
https://doi.org/10.1007/11739685_8
https://doi.org/10.1007/11739685_8
Publikováno v:
2005 International Conference on Machine Learning and Cybernetics.
In this paper, associating with the self-designed distributed database server system and studying the objective description and definition of load index, the active load balancing idea is introduced into the system and the load balancing mode based o
Publikováno v:
Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
Application of data fusion technique in intrusion detection is the trend of next-generation intrusion detection system (IDS). In network security, adopting security early warning technique is feasible to effectively defend against attacks and attacke
Publikováno v:
Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
This paper studies the method of pattern matching in intrusion detection, analyzes the fault and lack of the current methods and proposes a trinary-tree-based automaton method, which avoids some lacks resulting from the changing of the node amount in
Publikováno v:
2009 International Conference on Machine Learning & Cybernetics; 2009, p549-552, 4p