<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<channel rdf:about="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/165">
<title>Vol. 24, No.2</title>
<link>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/165</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/310"/>
<rdf:li rdf:resource="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/309"/>
<rdf:li rdf:resource="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/307"/>
<rdf:li rdf:resource="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/305"/>
</rdf:Seq>
</items>
<dc:date>2026-05-19T18:58:11Z</dc:date>
</channel>
<item rdf:about="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/310">
<title>A program anomaly intrusion detection scheme based on fuzzy inference</title>
<link>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/310</link>
<description>A program anomaly intrusion detection scheme based on fuzzy inference
Hoang, Dau Xuan; Nguyen, Minh Ngoc
A major problem of existing anomaly intrusion detection approaches is that they tend to&#13;
produce excessive false alarms. One reason for this is that the normal and abnormal behaviour of&#13;
a monitored object can overlap or be very close to each other, which makes it difficult to define a&#13;
clear boundary between the two. In this paper, we present a fuzzy-based scheme for program&#13;
anomaly intrusion detection using system calls. Instead of using crisp conditions, or fixed&#13;
thresholds, fuzzy sets are used to represent the parameter space of the program sequences of&#13;
system calls. In addition, fuzzy rules are used to combine multiple parameters of each sequence,&#13;
using fuzzy reasoning, in order to determine the sequence status. Experimental results showed that&#13;
the proposed fuzzy-based detection scheme reduced false positive alarms by 48%, compared to the&#13;
normal database scheme.
</description>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/309">
<title>Finding upper bounds of component instances with deallocation beyond local scope</title>
<link>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/309</link>
<description>Finding upper bounds of component instances with deallocation beyond local scope
Hoang, A. Truong
We develop an abstract component language and a static type system that can tells us&#13;
the maximum resources a program may use. We prove that the upper resource bound is sharp and&#13;
we point out a polynomial algorithm that can infer the sharp bound. Knowing the maximal&#13;
resources a program may request allows us to adjust resource usage of the program and to prevent&#13;
it from raising exceptions or behaving unexpectedly on systems that do not have enough resources.&#13;
This work extends our previous works in one crucial point: the deallocation primitive can free an&#13;
instance beyond its local scope. This semantics makes the language much closer to practical ones.
</description>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/307">
<title>Checking the conformability in CORBA component model specifications</title>
<link>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/307</link>
<description>Checking the conformability in CORBA component model specifications
Tran, Thi Mai Thuong; Vo, Van Thanh; Truong, Ninh Thuan
We proposed in this paper an approach for checking the conformability in CORBA&#13;
component model specifications. In software engineering, it is demonstrated that discovering bugs&#13;
in earlier phases is much more economical than later phases. We focused thus on verifying&#13;
components by their ports specification. In order to do this, firstly we determined constraints on&#13;
kinds of port as well as on types of port which the connection between ports must satisfy, and then&#13;
formalized them to be able to prove automatically using formal prover tools. Here, we proposed to&#13;
use the B method for verifying components in a CCM specification
</description>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/305">
<title>Conflicting chip firing games on graphs and on trees</title>
<link>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/305</link>
<description>Conflicting chip firing games on graphs and on trees
Pham, Tra An; Phan, Thi Ha Duong; Tran, Thi Thu Huong
Chip Firing Games on (directed) graph are widely used in theoretical computer science&#13;
and many other sciences. In this model, chips are fired from one vertex to all of its neighbors at the&#13;
same time. The purpose of our paper is to study an extended version of this model, the Conflicting&#13;
Chip Firing Game, by considering that chips can be fired from one vertex to one of its neighbors at&#13;
each time. Our main results are obtained when the support graph of this game is a rooted tree. In&#13;
this case, we give the characterization of its reachable configurations and of its fixed points.&#13;
Moreover we show the local lattice structure of its configuration space
</description>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
