934 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article reflects on the UK coalition government’s ‘alternative models’ agenda, specifically in terms of the adoption of new models of service delivery by arm’s-length bodies (ALBs). It provides an overview of the alternative models agenda and discusses barriers to implementation. These include practical challenges involved in the set up of alternative models, the role of sponsor departments, and the effective communication of best practice. Finally, the article highlights some issues for further discussion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper is sponsored by the Ministry of Education and Research of the Republic of Bulgaria in the framework of project No 105 “Multimedia Packet Switching Networks Planning with Quality of Service and Traffic Management”.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current state of Russian databases for substances and materials properties was considered. A brief review of integration methods of given information systems was prepared and a distributed databases integration approach based on metabase was proposed. Implementation details were mentioned on the posed database on electronics materials integration approach. An operating pilot version of given integrated information system implemented at IMET RAS was considered.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The principles of organization of the distributed system of databases on properties of inorganic substances and materials based on the use of a special reference database are considered. The last includes not only information on a site of the data about the certain substance in other databases but also brief information on the most widespread properties of inorganic substances. The proposed principles were successfully realized at the creation of the distributed system of databases on properties of inorganic compounds developed by A.A.Baikov Institute of Metallurgy and Materials Science of the Russian Academy of Sciences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, there has been an increas-ing interest in learning a distributed rep-resentation of word sense. Traditional context clustering based models usually require careful tuning of model parame-ters, and typically perform worse on infre-quent word senses. This paper presents a novel approach which addresses these lim-itations by first initializing the word sense embeddings through learning sentence-level embeddings from WordNet glosses using a convolutional neural networks. The initialized word sense embeddings are used by a context clustering based model to generate the distributed representations of word senses. Our learned represen-tations outperform the publicly available embeddings on 2 out of 4 metrics in the word similarity task, and 6 out of 13 sub tasks in the analogical reasoning task.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Computer networks are a critical factor for the performance of a modern company. Managing networks is as important as managing any other aspect of the company’s performance and security. There are many tools and appliances for monitoring the traffic and analyzing the network flow security. They use different approaches and rely on a variety of characteristics of the network flows. Network researchers are still working on a common approach for security baselining that might enable early watch alerts. This research focuses on the network security models, particularly the Denial-of-Services (DoS) attacks mitigation, based on a network flow analysis using the flows measurements and the theory of Markov models. The content of the paper comprises the essentials of the author’s doctoral thesis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Software applications created on top of the service-oriented architecture (SOA) are increasingly popular but testing them remains a challenge. In this paper a framework named TASSA for testing the functional and non-functional behaviour of service-based applications is presented. The paper focuses on the concept of design time testing, the corresponding testing approach and architectural integration of the consisting TASSA tools. The individual TASSA tools with sample validation scenarios were already presented with a general view of their relation. This paper’s contribution is the structured testing approach, based on the integral use of the tools and their architectural integration. The framework is based on SOA principles and is composable depending on user requirements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

ACM Computing Classification System (1998): D.2.5, D.2.9, D.2.11.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The increase in renewable energy generators introduced into the electricity grid is putting pressure on its stability and management as predictions of renewable energy sources cannot be accurate or fully controlled. This, with the additional pressure of fluctuations in demand, presents a problem more complex than the current methods of controlling electricity distribution were designed for. A global approximate and distributed optimisation method for power allocation that accommodates uncertainties and volatility is suggested and analysed. It is based on a probabilistic method known as message passing [1], which has deep links to statistical physics methodology. This principled method of optimisation is based on local calculations and inherently accommodates uncertainties; it is of modest computational complexity and provides good approximate solutions.We consider uncertainty and fluctuations drawn from a Gaussian distribution and incorporate them into the message-passing algorithm. We see the effect that increasing uncertainty has on the transmission cost and how the placement of volatile nodes within a grid, such as renewable generators or consumers, effects it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Distributed representations (DR) of cortical channels are pervasive in models of spatio-temporal vision. A central idea that underpins current innovations of DR stems from the extension of 1-D phase into 2-D images. Neurophysiological evidence, however, provides tenuous support for a quadrature representation in the visual cortex, since even phase visual units are associated with broader orientation tuning than odd phase visual units (J.Neurophys.,88,455–463, 2002). We demonstrate that the application of the steering theorems to a 2-D definition of phase afforded by the Riesz Transform (IEEE Trans. Sig. Proc., 49, 3136–3144), to include a Scale Transform, allows one to smoothly interpolate across 2-D phase and pass from circularly symmetric to orientation tuned visual units, and from more narrowly tuned odd symmetric units to even ones. Steering across 2-D phase and scale can be orthogonalized via a linearizing transformation. Using the tiltafter effect as an example, we argue that effects of visual adaptation can be better explained by via an orthogonal rather than channel specific representation of visual units. This is because of the ability to explicitly account for isotropic and cross-orientation adaptation effect from the orthogonal representation from which both direct and indirect tilt after-effects can be explained.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study was to explain how exemplary service providers in luxury hotels provide consistently excellent service. Using a case study framework, the study investigated the service provider's strategies and concepts of service delivery, the importance and implementation of organizational and individual controls, and the role of training and learning. The study identified barriers to service provision and characteristics of the exemplary individuals that affect their ability to deliver luxury service. This study sought to better understand how exemplary service providers learn, think about, and do their work. The sample population of three Five-Diamond-Award winning resorts was selected for their potential for learning about the phenomenon of interest. The results demonstrate that exemplary service providers possess individual characteristics that are enhanced by the organizations for which they work. Exemplary service providers are often exemplary communicators who are emotionally generous and genuinely enjoy helping and serving others. Exemplary service organizations treat their employees as they treat their customers, as suggested by the Service-Profit Chain (Heskett, Sasser & Schlesinger, 1997). Further, they have systems and standards to guarantee satisfactory service experiences for every guest. They also encourage their service providers to personalize their service delivery and to seek opportunities to delight their guests, using a combination of controls, traditions and cultural values. Several customer service theories are discussed in relationship to whether they were or were not supported by the data. The study concluded that the delivery of exemplary service is a complex phenomenon that requires successful interactions between guests, service providers and the organization. A Model of Exemplary Service Delivery is presented and discussed that demonstrates the components of service quality as shown in the data. The model can be used by practitioners seeking to create, enhance, or evaluate their service quality, and by researchers seeking insights into the complex concepts in service quality research. Implications for future research are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This empirical study explored the impact of service-learning participation on high school students' attitudes toward academic engagement and civic responsibility. This study focused whether a group of high school students who participated in a service-learning project had more positive attitudes toward academic engagement and civic responsibility than their high school peers who did not participate in a service learning project. ^ Data were collected from 67 volunteer students as participants in grades 9–12. A service-learning treatment group of 34 high school students was examined relative to a comparison group of 33 high school students with similar demographic and academic characteristics. The investigator used questionnaires, an oral history/service-learning project, and interviews with the teacher-coordinators of the project to collect the data. The two surveys, one investigating high school students' attitudes about academic engagement, the other investigating high school students' attitudes toward civic responsibility, were administered in a pre-treatment/post-treatment design. There were 90 days between the pre-treatment and post-treatment administrations. A factor analysis of the civic responsibility instrument and multivariate analysis of gain scores were used to compare the means of the total aggregate scores of the treatment and comparison groups. Factor analysis was performed on the academic engagement instrument but it was determined that only the total scores could be used in subsequent analyses. Results were used to determine the efficacy of service-learning as interpreted in student attitudes toward academic engagement and student attitudes toward civic responsibility. ^ The study found no significant difference between the academic engagement and the civic responsibility attitudes of a high school service-learning project group and a high school comparison group with comparable school and similar demographic characteristics. One of the implications for educational practice and policy from the study results is a need to design and implement more powerful studies, studies implemented at many sites rather than just at two sites that were the basis of this study, and studies that investigate the research questions over longer time periods. Although it was not a focus of the study, the investigator concluded that service learning projects such as this might be more effective if they were better aligned with Dewey's principles. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of 3G (the 3rd generation telecommunication) value-added services brings higher requirements of Quality of Service (QoS). Wideband Code Division Multiple Access (WCDMA) is one of three 3G standards, and enhancement of QoS for WCDMA Core Network (CN) becomes more and more important for users and carriers. The dissertation focuses on enhancement of QoS for WCDMA CN. The purpose is to realize the DiffServ (Differentiated Services) model of QoS for WCDMA CN. Based on the parallelism characteristic of Network Processors (NPs), the NP programming model is classified as Pool of Threads (POTs) and Hyper Task Chaining (HTC). In this study, an integrated programming model that combines both of the two models was designed. This model has highly efficient and flexible features, and also solves the problems of sharing conflicts and packet ordering. We used this model as the programming model to realize DiffServ QoS for WCDMA CN. ^ The realization mechanism of the DiffServ model mainly consists of buffer management, packet scheduling and packet classification algorithms based on NPs. First, we proposed an adaptive buffer management algorithm called Packet Adaptive Fair Dropping (PAFD), which takes into consideration of both fairness and throughput, and has smooth service curves. Then, an improved packet scheduling algorithm called Priority-based Weighted Fair Queuing (PWFQ) was introduced to ensure the fairness of packet scheduling and reduce queue time of data packets. At the same time, the delay and jitter are also maintained in a small range. Thirdly, a multi-dimensional packet classification algorithm called Classification Based on Network Processors (CBNPs) was designed. It effectively reduces the memory access and storage space, and provides less time and space complexity. ^ Lastly, an integrated hardware and software system of the DiffServ model of QoS for WCDMA CN was proposed. It was implemented on the NP IXP2400. According to the corresponding experiment results, the proposed system significantly enhanced QoS for WCDMA CN. It extensively improves consistent response time, display distortion and sound image synchronization, and thus increases network efficiency and saves network resource.^