74,351 research outputs found

    Executive functions in insight versus non-insight problem solving: an individual differences approach

    Get PDF
    Original article can be found at: http://www.informaworld.com/smpp/title~content=t713685607~db=all Copyright Informa / Taylor and FrancisThis study investigated the roles of the executive functions of inhibition and switching and of verbal and visuo-spatial working memory capacities in insight and non-insight tasks. Eighteen insight tasks, 10 non-insight tasks and measures of individual differences in working memory capacities, switching and inhibition were administered to 120 participants. Performance on insight problems was not linked with executive functions of inhibition or switching but was linked positively to measures of verbal and visuo-spatial working memory capacities. Non-insight task performance was positively linked to the executive function of switching (but not to inhibition) and to verbal and visuo-spatial working memory capacities. These patterns regarding executive functions were maintained when the insight and non-insight composites were split into verbal and spatial insight and non-insight composite scores. The results are discussed in relation to dual processing accounts of thinking.Peer reviewe

    Predicting Network Attacks Using Ontology-Driven Inference

    Full text link
    Graph knowledge models and ontologies are very powerful modeling and re asoning tools. We propose an effective approach to model network attacks and attack prediction which plays important roles in security management. The goals of this study are: First we model network attacks, their prerequisites and consequences using knowledge representation methods in order to provide description logic reasoning and inference over attack domain concepts. And secondly, we propose an ontology-based system which predicts potential attacks using inference and observing information which provided by sensory inputs. We generate our ontology and evaluate corresponding methods using CAPEC, CWE, and CVE hierarchical datasets. Results from experiments show significant capability improvements comparing to traditional hierarchical and relational models. Proposed method also reduces false alarms and improves intrusion detection effectiveness.Comment: 9 page

    Federated and autonomic management of multimedia services

    Get PDF
    Over the years, the Internet has significantly evolved in size and complexity. Additionally, the modern multimedia services it offers have considerably more stringent Quality of Service (QoS) requirements than traditional static services. These factors contribute to the ever-increasing complexity and cost to manage the Internet and its services. In the dissertation, a novel network management architecture is proposed to overcome these problems. It supports QoS-guarantees of multimedia services across the Internet, by setting up end-to-end network federations. A network federation is defined as a persistent cross-organizational agreement that enables the cooperating networks to share capabilities. Additionally, the architecture incorporates aspects from autonomic network management to tackle the ever-growing management complexity of modern communications networks. Specifically, a hierarchical approach is presented, which guarantees scalable collaboration of huge amounts of self-governing autonomic management components

    Towards Intelligent Databases

    Get PDF
    This article is a presentation of the objectives and techniques of deductive databases. The deductive approach to databases aims at extending with intensional definitions other database paradigms that describe applications extensionaUy. We first show how constructive specifications can be expressed with deduction rules, and how normative conditions can be defined using integrity constraints. We outline the principles of bottom-up and top-down query answering procedures and present the techniques used for integrity checking. We then argue that it is often desirable to manage with a database system not only database applications, but also specifications of system components. We present such meta-level specifications and discuss their advantages over conventional approaches
    corecore