Showing 1 - 10 of 498
RFID system. We present four protocols in this thesis. First, we propose a lightweight authentication protocol for typical …Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy …
Persistent link: https://www.econbiz.de/10009484555
misses, and server capacity in a transfer functionbased filter system. The model is general for any time-series based or …
Persistent link: https://www.econbiz.de/10009431757
With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attacks. A Dos attack can be...
Persistent link: https://www.econbiz.de/10009440792
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information...
Persistent link: https://www.econbiz.de/10009459007
With emergence of biomedical informatics, Web intelligence, and E-business, new challenges are coming for knowledge discovery and data mining modeling problems. In this dissertation work, a framework named Granular Support Vector Machines (GSVM) is proposed to systematically and formally combine...
Persistent link: https://www.econbiz.de/10009463403
Advances in technology have made it possible to collect data about individuals and the connections between them, such as email correspondence and friendships. Agencies and researchers who have collected such social network data often have a compelling interest in allowing others to analyze the...
Persistent link: https://www.econbiz.de/10009467752
Social and computer networks permeate our lives. Large networks, such as the Internet, the World Wide Web (WWW), AND wireless smartphones, have indisputable economic and social importance. These networks have non-trivial topological features, i.e., features that do not occur in simple networks...
Persistent link: https://www.econbiz.de/10009467830
requiring O(|S|3) to directly solve the Bellman system of |S| linear equations (where |S| is the state space size in the …
Persistent link: https://www.econbiz.de/10009467909
Eligibility traces have been shown to speed reinforcement learning, to make it more robust to hidden states, and to provide a link between Monte Carlo and temporal-difference methods. Here we generalize eligibility traces to off-policy learning, in which one learns about a policy different from...
Persistent link: https://www.econbiz.de/10009468145
Learning, planning, and representing knowledge at multiple levels of temporal abstraction are key challenges for AI. In this paper we develop an approach to these problems based on the mathematical framework of reinforcement learning and Markov decision processes (MDPs). We extend the usual...
Persistent link: https://www.econbiz.de/10009468204