Due to the fact that the existing web service description methods cannot address the issue of service reuse of various levels of granularity, the concept of service component is introduced, which packages together web...Due to the fact that the existing web service description methods cannot address the issue of service reuse of various levels of granularity, the concept of service component is introduced, which packages together web services and choreography, and their operations and properties are presented in a consistent and uniform manner. Service components are published externally as normal web services and can thus be employed by webbased applications. In order to improve reusability and testability of service components, the concept of composition pattern is also proposed, which presents the relationships among service components. The relationships and relationship compositions have a rigorous semantic, so that composite components can be validated at the configuration stage. The composition patterns support to integrate service components of various levels of granularity. Experience indicates that the application assembly can effectively be conducted by understanding, selecting, and reusing components easily.展开更多
Verb category“drink”is frequently used in people’s daily life.In this essay,the author analyses the semantic component and lexicalization pattern of English and Chinese verb category“drink”,in which the author fi...Verb category“drink”is frequently used in people’s daily life.In this essay,the author analyses the semantic component and lexicalization pattern of English and Chinese verb category“drink”,in which the author finds there are semantic universals and particulars.It is found that the lexicalization pattern of this verb category in English and Chinese should be“motion+manner(cause)+X”.展开更多
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux...Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.展开更多
English words in pairs are a special form of English idioms, which have different kinds and are used widely. For English learners, words in pairs are one of the difficult points. This paper discusses their form patter...English words in pairs are a special form of English idioms, which have different kinds and are used widely. For English learners, words in pairs are one of the difficult points. This paper discusses their form patterns, semantic relations, grammatical functions, rhetoric features and their application in translation. Its purpose is to help learners understand and use them accurately and correctly so as to improve language expressing ability.展开更多
基金The National Basic Research Program of China (973Program) (No.1999032710).
文摘Due to the fact that the existing web service description methods cannot address the issue of service reuse of various levels of granularity, the concept of service component is introduced, which packages together web services and choreography, and their operations and properties are presented in a consistent and uniform manner. Service components are published externally as normal web services and can thus be employed by webbased applications. In order to improve reusability and testability of service components, the concept of composition pattern is also proposed, which presents the relationships among service components. The relationships and relationship compositions have a rigorous semantic, so that composite components can be validated at the configuration stage. The composition patterns support to integrate service components of various levels of granularity. Experience indicates that the application assembly can effectively be conducted by understanding, selecting, and reusing components easily.
文摘Verb category“drink”is frequently used in people’s daily life.In this essay,the author analyses the semantic component and lexicalization pattern of English and Chinese verb category“drink”,in which the author finds there are semantic universals and particulars.It is found that the lexicalization pattern of this verb category in English and Chinese should be“motion+manner(cause)+X”.
基金supported by the National Grand Fundamental Research "973" Program of China (2004CB318109)the National High-Technology Research and Development Plan of China (2006AA01Z452)the National Information Security "242"Program of China (2005C39).
文摘Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.
文摘English words in pairs are a special form of English idioms, which have different kinds and are used widely. For English learners, words in pairs are one of the difficult points. This paper discusses their form patterns, semantic relations, grammatical functions, rhetoric features and their application in translation. Its purpose is to help learners understand and use them accurately and correctly so as to improve language expressing ability.