期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Fast Method for Shortest-Path Cover Identification in Large Complex Networks
1
作者 Qiang Wei Guangmin Hu +1 位作者 Chao Shen Yunfei Yin 《Computers, Materials & Continua》 SCIE EI 2020年第5期705-724,共20页
Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and monitoring.However,the existing methods are time-c... Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and monitoring.However,the existing methods are time-consuming for even moderate-scale networks.In this paper,we present a method for fast shortest-path cover identification in both exact and approximate scenarios based on the relationship between the identification and the shortest distance queries.The effectiveness of the proposed method is validated through synthetic and real-world networks.The experimental results show that our method is 105 times faster than the existing methods and can solve the shortest-path cover identification in a few seconds for large-scale networks with millions of nodes and edges. 展开更多
关键词 Network discovery shortest-path cover shortest-path distance query large complex networks
下载PDF
Towards a Unified Recurrent Neural Network Theory: The Uniformly Pseudo-Projection-Anti-Monotone Net 被引量:1
2
作者 Zong Ben XU Chen QIAO 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2011年第2期377-396,共20页
In the past decades, various neural network models have been developed for modeling the behavior of human brain or performing problem-solving through simulating the behavior of human brain. The recurrent neural networ... In the past decades, various neural network models have been developed for modeling the behavior of human brain or performing problem-solving through simulating the behavior of human brain. The recurrent neural networks are the type of neural networks to model or simulate associative memory behavior of human being. A recurrent neural network (RNN) can be generally formalized as a dynamic system associated with two fundamental operators: one is the nonlinear activation operator deduced from the input-output properties of the involved neurons, and the other is the synaptic connections (a matrix) among the neurons. Through carefully examining properties of various activation functions used, we introduce a novel type of monotone operators, the uniformly pseudo-projectionanti-monotone (UPPAM) operators, to unify the various RNN models appeared in the literature. We develop a unified encoding and stability theory for the UPPAM network model when the time is discrete. The established model and theory not only unify but also jointly generalize the most known results of RNNs. The approach has lunched a visible step towards establishment of a unified mathematical theory of recurrent neural networks. 展开更多
关键词 Feedback neural networks essential characteristics uniformly pseudo-projection-anti- monotone net unified theory dynamics
原文传递
A method for detecting code security vulnerability based on variables tracking with validated-tree
3
作者 Zhefei ZHANG Qinghua ZHENG +2 位作者 Xiaohong GUAN Qing WANG Tuo WANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2008年第2期162-166,共5页
SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.Different from traditional run time security strategies such as IDS and fire-wa... SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.Different from traditional run time security strategies such as IDS and fire-wall,this paper focuses on the solution at the outset;it presents a method to find vulnerabilities by analyzing the source codes.The concept of validated tree is developed to track variables referenced by database operations in scripts.By checking whether these variables are influenced by outside inputs,the database operations are proved to be secure or not.This method has advantages of high accuracy and efficiency as well as low costs,and it is universal to any type of web application platforms.It is implemented by the software code vulnerabilities of SQL injection detector(CVSID).The validity and efficiency are demonstrated with an example. 展开更多
关键词 vulnerability detection database security SQL injection
原文传递
Approach to extracting hot topics based on network traffic content
4
作者 Yadong ZHOU Xiaohong GUAN +2 位作者 Qindong SUN Wei LI Jing TAO 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2009年第1期20-23,共4页
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla... This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correlation of the popular words in traffic content and network flow characteristics as input for extracting popular topics on the Internet.Based on this,this article adapts a clustering algorithm to extract popular topics and gives formalized results.The test results show that this method has an accuracy of 16.7%in extracting popular topics on the Internet.Compared with web mining and topic detection and tracking(TDT),it can provide a more suitable data source for effective recovery of Internet public opinions. 展开更多
关键词 hot topic extraction network traffic content Internet public opinion analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部