China Jiliang University

Displaying 1-3 of 3 results

  • White Papers // Sep 2013

    Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

    A multi-class method is proposed based on error correcting output codes algorithm in order to get better performance of attack recognition in wireless sensor networks. Aiming to enhance the accuracy of attack detection, the multi-class method is constructed with Hadamard matrix and two-class support vector machines. In order to minimize...

    Provided By China Jiliang University

  • White Papers // Mar 2011

    Complexity Metrics for Component-Based Software Systems

    In recent years, the software engineering community has put considerable efforts into the design and development of Component-Based Software System (CBSS) in order to manage the software increasing complexity and to maximize the reuse of code. This paper presents some of such efforts by investigating the improved measurement tools and...

    Provided By China Jiliang University

  • White Papers // Oct 2010

    An Efficient Feedback-Based Trust Model for Pervasive Computing

    In pervasive computing environments, pervasive devices should collaborate effectively such that the vision of pervasive computing will come true. However, without trust, pervasive devices cannot collaborate effectively. Distributed Trust Systems (DTS) may support trust and thus foster collaboration in hostile pervasive computing environments. The challenge for DTS is how to...

    Provided By China Jiliang University

  • White Papers // Mar 2011

    Complexity Metrics for Component-Based Software Systems

    In recent years, the software engineering community has put considerable efforts into the design and development of Component-Based Software System (CBSS) in order to manage the software increasing complexity and to maximize the reuse of code. This paper presents some of such efforts by investigating the improved measurement tools and...

    Provided By China Jiliang University

  • White Papers // Oct 2010

    An Efficient Feedback-Based Trust Model for Pervasive Computing

    In pervasive computing environments, pervasive devices should collaborate effectively such that the vision of pervasive computing will come true. However, without trust, pervasive devices cannot collaborate effectively. Distributed Trust Systems (DTS) may support trust and thus foster collaboration in hostile pervasive computing environments. The challenge for DTS is how to...

    Provided By China Jiliang University

  • White Papers // Sep 2013

    Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

    A multi-class method is proposed based on error correcting output codes algorithm in order to get better performance of attack recognition in wireless sensor networks. Aiming to enhance the accuracy of attack detection, the multi-class method is constructed with Hadamard matrix and two-class support vector machines. In order to minimize...

    Provided By China Jiliang University