RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCOPUS

        Protecting the iTrust Information Retrieval Network against Malicious Attacks

        Yung-Ting Chuang,P. Michael Melliar-Smith,Louise E. Moser,Isaí Michel Lombera 한국정보과학회 2012 Journal of Computing Science and Engineering Vol.6 No.3

        This paper presents novel statistical algorithms for protecting the iTrust information retrieval network against malicious attacks. In iTrust, metadata describing documents, and requests containing keywords, are randomly distributed to multiple participating nodes. The nodes that receive the requests try to match the keywords in the requests with the metadata they hold. If a node finds a match, the matching node returns the URL of the associated information to the requesting node. The requesting node then uses the URL to retrieve the information from the source node. The novel detection algorithm determines empirically the probabilities of the specific number of matches based on the number of responses that the requesting node receives. It also calculates the analytical probabilities of the specific numbers of matches. It compares the observed and the analytical probabilities to estimate the proportion of subverted or non-operational nodes in the iTrust network using a window-based method and the chi-squared statistic. If the detection algorithm determines that some of the nodes in the iTrust network are subverted or non-operational, then the novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as compared to when all of the nodes are operational. Experimental results substantiate the effectiveness of the detection and defensive adaptation algorithms for protecting the iTrust information retrieval network against malicious attacks.

      • SCOPUS

        Protecting the iTrust Information Retrieval Network against Malicious Attacks

        Chuang, Yung-Ting,Melliar-Smith, P. Michael,Moser, Louise E.,Lombera, Isai Michel Korean Institute of Information Scientists and Eng 2012 Journal of Computing Science and Engineering Vol.6 No.3

        This paper presents novel statistical algorithms for protecting the iTrust information retrieval network against malicious attacks. In iTrust, metadata describing documents, and requests containing keywords, are randomly distributed to multiple participating nodes. The nodes that receive the requests try to match the keywords in the requests with the metadata they hold. If a node finds a match, the matching node returns the URL of the associated information to the requesting node. The requesting node then uses the URL to retrieve the information from the source node. The novel detection algorithm determines empirically the probabilities of the specific number of matches based on the number of responses that the requesting node receives. It also calculates the analytical probabilities of the specific numbers of matches. It compares the observed and the analytical probabilities to estimate the proportion of subverted or non-operational nodes in the iTrust network using a window-based method and the chi-squared statistic. If the detection algorithm determines that some of the nodes in the iTrust network are subverted or non-operational, then the novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as compared to when all of the nodes are operational. Experimental results substantiate the effectiveness of the detection and defensive adaptation algorithms for protecting the iTrust information retrieval network against malicious attacks.

      • A Computational Model for the Numerical Simulation of FSW Processes

        C. Agelet de Saracibar,M. Chiumenti,D. Santiago,M. Cervera,N. Dialami,G. Lombera 한국소성가공학회 2010 기타자료 Vol.2010 No.6

        In this paper a computational model for the numerical simulation of Friction Stir Welding (FSW) processes is presented. FSW is a new method of welding in solid state in which a shouldered tool with a profile probe is rotated and slowly plunged into the joint line between two pieces of sheet or plate material which are butted together. Once the probe has been completely inserted, it is moved with a small tilt angle in the welding direction. Here a quasi-static, thermal transient, mixed multiscale stabilized Eulerian formulation is used. Norton-Hoff and Sheppard-Wright rigid thermoviscoplastic material models have been considered. A staggered solution algorithm is defined such that for any time step, the mechanical problem is solved at constant temperature and then the thermal problem is solved keeping constant the mechanical variables. A pressure multiscale stabilized mixed linear velocity/linear pressure finite element interpolation formulation is used to solve the mechanical problem and a convection multiscale stabilized linear temperature interpolation formulation is used to solve the thermal problem. The model has been implemented into the in-house developed FE code COMET. Results obtained in the simulation of FSW process are compared to other numerical results or experimental results, when available.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼