Search results for "computer.software_genre"

showing 10 items of 3858 documents

Do Randomized Algorithms Improve the Efficiency of Minimal Learning Machine?

2020

Minimal Learning Machine (MLM) is a recently popularized supervised learning method, which is composed of distance-regression and multilateration steps. The computational complexity of MLM is dominated by the solution of an ordinary least-squares problem. Several different solvers can be applied to the resulting linear problem. In this paper, a thorough comparison of possible and recently proposed, especially randomized, algorithms is carried out for this problem with a representative set of regression datasets. In addition, we compare MLM with shallow and deep feedforward neural network models and study the effects of the number of observations and the number of features with a special dat…

0209 industrial biotechnologyrandom projectionlcsh:Computer engineering. Computer hardwareComputational complexity theoryComputer scienceRandom projectionlcsh:TK7885-789502 engineering and technologyMachine learningcomputer.software_genresupervised learningapproximate algorithmsSet (abstract data type)regressioanalyysi020901 industrial engineering & automationdistance–based regressionalgoritmit0202 electrical engineering electronic engineering information engineeringordinary least–squaresbusiness.industrySupervised learningsingular value decompositionminimal learning machineMultilaterationprojektioRandomized algorithmkoneoppiminenmachine learningScalabilityFeedforward neural network020201 artificial intelligence & image processingArtificial intelligenceapproksimointibusinesscomputerMachine Learning and Knowledge Extraction
researchProduct

Heuristics for the min–max arc crossing problem in graphs

2018

Abstract In this paper, we study the visualization of complex structures in the context of automatic graph drawing. Constructing geometric representations of combinatorial structures, such as networks or graphs, is a difficult task that requires an expert system. The automatic generation of drawings of graphs finds many applications from software engineering to social media. The objective of graph drawing expert systems is to generate layouts that are easy to read and understand. This main objective is achieved by solving several optimization problems. In this paper we focus on the most important one: reducing the number of arc crossings in the graph. This hard optimization problem has been…

021103 operations researchTheoretical computer scienceOptimization problemComputer scienceHeuristic0211 other engineering and technologiesGeneral Engineering0102 computer and information sciences02 engineering and technologycomputer.software_genre01 natural sciencesGraphExpert systemComputer Science ApplicationsVisualization010201 computation theory & mathematicsArtificial IntelligenceGraph drawingHeuristicscomputerExpert Systems with Applications
researchProduct

Variable neighborhood descent for the incremental graph drawing

2017

Abstract Graphs are used to represent reality in several areas of knowledge. Drawings of graphs have many applications, from project scheduling to software diagrams. The main quality desired for drawings of graphs is readability, and crossing reduction is a fundamental aesthetic criterion for a good representation of a graph. In this paper we target the edge crossing reduction in the context of incremental graph drawing, in which we want to preserve the layout of a graph over successive drawings. We propose a hybrid method based on the GRASP (Greedy Randomized Adaptive Search Procedure) and VND (Variable Neighborhood Descent) methodologies and compare it with previous methods via simulation.

021103 operations researchTheoretical computer sciencebusiness.industryApplied MathematicsGRASP0211 other engineering and technologies010103 numerical & computational mathematics02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesReadabilitySoftwareGraph drawingDiscrete Mathematics and CombinatoricsArtificial intelligenceForce-directed graph drawing0101 mathematicsbusinessGraph operationsMetaheuristiccomputerGreedy randomized adaptive search procedureMathematicsofComputing_DISCRETEMATHEMATICSMathematicsElectronic Notes in Discrete Mathematics
researchProduct

Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems

2018

Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…

021110 strategic defence & security studies020301 aerospace & aeronauticsComputer sciencebusiness.industryAir traffic managementControl (management)0211 other engineering and technologiesCivil aviationComputerApplications_COMPUTERSINOTHERSYSTEMSJamming02 engineering and technologyAir traffic controlCommunications systemComputer securitycomputer.software_genre0203 mechanical engineeringWirelessbusinesscomputerDe facto standard
researchProduct

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation

2017

To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…

021110 strategic defence & security studiesEmergency managementSituation awarenessbusiness.industryComputer scienceProperty (programming)Information sharing0211 other engineering and technologies030208 emergency & critical care medicine02 engineering and technologyComplex networkComputer securitycomputer.software_genreVisualizationTask (project management)03 medical and health sciences0302 clinical medicinebusinesscomputerSearch and rescue2017 IEEE 7th International Advance Computing Conference (IACC)
researchProduct

How Critical Infrastructure Orients International Relief in Cascading Disasters

2016

Critical infrastructure and facilities are central assets in modern societies, but their impact on international disaster relief remains mostly associated with logistics challenges. The emerging literature on cascading disasters suggests the need to integrate the nonlinearity of events in the analyses. This article investigates three case studies: the 2002 floods in the Czech Republic, Hurricane Katrina in 2005 and the 2011 Tohoku earthquake, tsunami and Fukushima meltdown in Japan. We explore how the failure of critical infrastructure can orient international disaster relief by shifting its priorities during the response. We argue that critical infrastructure can influence aid request and …

021110 strategic defence & security studiesEngineering010504 meteorology & atmospheric sciencesEmergency managementbusiness.industry0211 other engineering and technologies02 engineering and technologyManagement Monitoring Policy and LawComputer securitycomputer.software_genre01 natural sciencesCritical infrastructureManagement Information SystemsHurricane katrinabusinesscomputerEnvironmental planning0105 earth and related environmental sciencesJournal of Contingencies and Crisis Management
researchProduct

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct