The conventional model of social networks, users select their contacts from a set of off-line acquaintances. Despite their utility, these conventional networks support only a subset of social networking: two users will only be able to establish a relationship in the social network if they , or are introduced to each other. One more Encounter […]
Archives for December 2013
Active Discovery And Imblanced Learning in Generative-Discriminative models
The vast majority of sky survey image content is due to well understood phenomena, and only 0.001% of data is of interest for astronomers to study. Computer network intrusion detection exhibits vast amounts of normal user traffic, and a very few examples of malicious attacks. In computer vision based security surveillance of public spaces, observed […]
Data collection delay in providing real-time data acquisition for the mobile user
A great success of Wireless Sensor Networks (WSNs). Recent advances in Wireless Sensor Network technologies provide people the ability to better understand the physical world. With the data collected from the entire network, the sensor network supports a variety of applications, including security surveillance, localization, information enquiry, and transmission. The ubiquitous data collection by mobile […]
Policy management is protect sensitive information
THE method of policy based management is widely used to manage complex and large scale network systems. The traditional framework of policy based management consists of four core components: PDP (Policy Decision Point), PEP (Policy Enforcement Point), PAP (Policy Administration Point) and PR (Policy Repository). A well-trained policy administrator or group will specify, verify policies […]