By Topic

Information Technology Conference, 1998. IEEE

Date 3-3 Sept. 1998

Filter Results

Displaying Results 1 - 25 of 45
  • 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (376 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s): 181
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Intelligent agents for intrusion detection

    Publication Year: 1998, Page(s):121 - 124
    Cited by:  Papers (43)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelligenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information fusion techniques for network intrusion detection

    Publication Year: 1998, Page(s):117 - 120
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Many intrusion detection techniques produce values of indications and warning (IW) that account for only isolated effects of computer network intrusions. To address interactive effects of network intrusions involving coordinated actions, it is necessary to correlate and fuse IW values for providing an accurate assessment of network intrusions. Information fusion techniques are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis: the investigation of hidden information

    Publication Year: 1998, Page(s):113 - 116
    Cited by:  Papers (41)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Discovering and rendering useless such covert messages is a new art form known as steganalysis. The authors provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-lining computer evidence

    Publication Year: 1998, Page(s):109 - 112
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    In the investigation of a criminal case involving a computer or computers, the time-line of “computer events” may provide a critical piece of information relating to the prosecution of involved persons. This information can help to pinpoint the location of certain individuals, can assist with the determination of alibis, can undercover conversations and correspondences, and can possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model based parameter estimation as a model abstraction technique

    Publication Year: 1998, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    In this paper it is demonstrated that the technique of model based parameter estimation (MBPE), specifically Cauchy's method, can be used in the frequency domain to extrapolate/interpolate a narrowband set of system data or information to a broadband set of data or information. The information can be either computed data or measured experimental data over a frequency band. For computed data the sa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future technologies from trends in computer forensic science

    Publication Year: 1998, Page(s):105 - 108
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    The origins of computer forensic science are examined and correlated to the evolution of forensic technologies and future research and development. Techniques to recover information from attempts to destroy files or inflict physical damage to the computer are illustrated. Included is a discussion on the specialized environments, tools and techniques required to recover information from physically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling technologies for simulation science

    Publication Year: 1998, Page(s):33 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    While there has been much attention paid to modeling and simulation as it relates to specific application areas, little has been done to address those broad technology areas that enhance, and in some cases, revolutionize the way we configure, execute and analyze the results of simulations. Recognizing that our simulation capabilities are expected to keep pace with ever-changing demands made of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent mobile agents for information retrieval and knowledge discovery from distributed data and knowledge sources

    Publication Year: 1998, Page(s):99 - 102
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Tools for selective proactive as well as reactive information retrieval and knowledge discovery constitute some of the key enabling technologies for managing the data overload and translating recent advances in automated data acquisition, digital storage, computers and communications into fundamental advances in decision support, scientific discovery and related applications. The paper describes a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented data warehouse for information fusion from heterogeneous distributed data and knowledge sources

    Publication Year: 1998, Page(s):27 - 30
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    Tools for accessing, transforming, organizing and assimilating data and knowledge from multiple heterogeneous, distributed data and knowledge sources in a form that is suitable for further analysis constitute some of the key enabling technologies for translating recent advances in automated data acquisition, digital storage, computers and communications into fundamental advances in organizational ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge base system for the design and manufacture of injection-molded plastic products

    Publication Year: 1998, Page(s):95 - 98
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The paper presents the development and implementation of a knowledge base system (KBS) for an important polymer molding. This KBS, named Enlighten, is built on top of Web-based technology because of its ubiquity, ease of use, convenient content dissemination, its hypertext, navigation, and search capabilities, as well as the support of interactivity (via Java, JavaScript, and CGI) and multimedia (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information fusion experiments for text classification

    Publication Year: 1998, Page(s):23 - 26
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    We summarize our experiments and results in employing information fusion for automatic classification of free text documents into a given number of categories. We try to characterize this information fusion work in terms of the Joint Directors of Laboratories scheme. The text used in the experiments is taken from the Reuters-22173 collection, which not only comes pre-analyzed, but facilitates trai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordination of distributed knowledge networks using contract net protocol

    Publication Year: 1998, Page(s):71 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Tools for selective proactive as well as reactive information retrieval, information extraction, information organization and assimilation, knowledge discovery using heterogeneous, distributed knowledge and data sources constitute some of the key enabling technologies for managing the data overload and translating recent advances in automated data acquisition, digital storage, computers and commun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DISCOE: distributed design and analysis to preserve intellectual property

    Publication Year: 1998, Page(s):57 - 60
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The DISCOE project deploys a co-design environment to support distributed, collaborative design activities. The environment supports secure transmission of design data by remote analysis and execution (simulation) of vendor protected data. The analysis and simulation environment is platform independent and operates in a distributed, heterogeneous Web based computational platform. A distributed, se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic communication for distributed information coordination

    Publication Year: 1998, Page(s):149 - 152
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    We present a new paradigm for information coordination to support real-time collaboration, where the number of collaborating clients, their locations and interests are dynamic. The approach essentially applies the “pull” knowledge management model to distributed information management by defining semantically enhanced messages, and using state-based interaction techniques to communicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion of spatial information systems and genetic algorithm for transmitter location in wireless networks

    Publication Year: 1998, Page(s):91 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Algorithms traditionally used in the design of wireless networks are based on simplified geometric models of the networks and are characteristically slow. Moreover, they poorly represent the intricacies of wireless technology and complexities of geography. Network layouts designed with these methods are not very accurate and require repeated manual corrections. The paper describes a new network de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple data base integration and update (MDBI&U)

    Publication Year: 1998, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The multiple database integration and update (MDBI&U) effort began in October 1995 and is scheduled for completion in September 1998. The Air Force Research Laboratory (ARFL) Information Fusion and Engineering Branch (IFEA), in Rome, NY is the Government sponsor for this Advanced Technology Demonstration (ATD) effort. Northrop Grumman Corporation (NGC) in Bethpage, NY is the prime contractor. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open infrastructure for scalable intrusion detection

    Publication Year: 1998, Page(s):129 - 133
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The current plethora of closed and incompatible intrusion detection systems hampers research in, and deployment of, intrusion detection. DARPA is creating the Common Intrusion Detection Framework (CIDF), an open-architecture standard for such systems. This paper briefly reviews the CIDF and describes Odyssey Research Associates' open infrastructure implementation of it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for applying simulation technologies in the mission operational environment

    Publication Year: 1998, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The paper proposes a methodology for applying simulation technology to the monitoring and control of operations. This methodology includes the use of an operationally focused aggregate level, discrete event simulation. Within this methodology the progress of the real operation and the simulated (planned) operation are compared by intelligent agents. These agents can launch additional simulations a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge discovery using KNOW-IT (KNOWledge Base Information Tools)

    Publication Year: 1998, Page(s):67 - 70
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    KNOW-IT is an integrated suite of robust tools which transform vast, unmanageable bodies of raw textual data into accessible and surveyable intelligence. Unlike most other information extraction systems, KNOW-IT extracts domain independent, time stamped information from various types of texts including news texts, utilizing more general semantic relations to link concepts which occur. KNOW-IT is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Fusion and Asset Management Processor

    Publication Year: 1998, Page(s):15 - 18
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Owing to continual advances in sensor capabilities, avionics, and inter-service C4I, the volume of battlefield intelligence data to which the modern-day military intelligence analyst has access is increasing at an exponential rate. This has created the need for more intelligent systems capable of scanning and extracting the tactically most useful information for presentation to the huma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving TCP performance over wireless ATM networks

    Publication Year: 1998, Page(s):157 - 160
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    TCP/IP over ATM over poor quality links is known to fail catastrophically. It mainly comes from the fact that TCP incorrectly assumes loss or corruption of data to be due to network congestion, and that TCP reacts inappropriately based on its congestion control mechanism. One of the main issues emerging in satellite networks is the efficient and assured delivery of data. In this paper, a Service S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy modeling of software effort prediction

    Publication Year: 1998, Page(s):53 - 56
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    Software sizing is an important management activity for both customer and developer that is characterized by uncertainty. Fuzzy system modeling offers a means to capture and logically reason with uncertainty. The paper investigates the application of fuzzy modeling techniques to two of the most widely used software effort prediction models: the Constructive Cost Model and the Function Points model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HyperText Markup Language Interface for multi-product database libraries

    Publication Year: 1998, Page(s):166 - 171
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    The HyperText Markup Language Interface (HTMLI) provides the Department of Defense (DoD) user community with access to an Image Product Library (IPL) and its associated server. The IPL is a library/archive for several categories of data, while its server acts as a broker to other database libraries. The HTMLI accesses data in the IPL and implements the IPL server application programming interface ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.