scispace - formally typeset
Search or ask a question

Showing papers on "Cognitive network published in 1996"


Book ChapterDOI
30 May 1996
TL;DR: The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
Abstract: Rather than searching for the holy grail of steganography, this paper presents the basis for development of a tool kit for creating and exploiting hidden channels within the standard design of network communications protocols. The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem. Descriptions of typical hidden channel design for each layer of the Open Systems Interconnect (OSI) network model are given. Methods of hiding and detection probabilities are summarized. Denying Bob and Alice the ability to communicate electronically may be the only absolute solution.

296 citations


01 Jan 1996
TL;DR: This paper presents a meta-anatomy of the determinants of infectious disease and some of the immune defences that protect against these diseases are listed.
Abstract: .......................................................................................................... ii DEDICATION......................................................................................................iii ACKNOWLEDGMENTS........................................................................................ iv VITA ...................................................................................................................... v Table of

3 citations


Journal ArticleDOI
TL;DR: A self-organizing cognitive network that represents some important topographical and biophysical parameters in the antibody-antigen affinity landscape and has the ability to perform simultaneous (parallel) and associative computations in a multidimensional shape-space is mapped onto the Id network model.
Abstract: A self-organizing cognitive network is mapped here onto the Id network model. The weight-vectors in this network represent some important topographical and biophysical parameters in the antibody-antigen affinity landscape. The Kohonen layers in the network correspond to affinity clones and the involved algorithm simulates the operations of clonal selection, hypermutation, differentiation, diversity, and affinity maturation. Two significant features of this model are: (i) a computationally feasible and biophysically informative representation of the para/epitopes, and (ii) the ability to perform simultaneous (parallel) and associative computations in a multidimensional shape-space. Computational experiments with real data have shown cognitive properties of this network. The results also indicate scope in quantitative characterization of the metadynamics of the above operations/weights in the adaptive development of the antibody repertoire. Key words: antibody shape-space, cognitive networks, immun...

2 citations


Proceedings ArticleDOI
18 Aug 1996
TL;DR: This paper presents a new multi-dimensional network architecture arranged in alternated regular mesh fashion with toroidal boundaries that could make use of the proposed network in local computer networks, processor interconnection, WDM optical networks, and broadband switching architectures applications.
Abstract: This paper presents a new multi-dimensional network architecture arranged in alternated regular mesh fashion with toroidal boundaries. Network performance and cost parameters, such as the network diameter and the network capacity, are derived as functions of the dimension and analyzed for the best adaptation of the its dimension. The possibility of making use of the proposed network in local computer networks, processor interconnection, WDM optical networks, and broadband switching architectures applications is investigated.

1 citations


Proceedings ArticleDOI
18 Feb 1996
TL;DR: The weaknesses of the GDMO(Guidelines for the Definition of Managed Objects) in developing a managed system are analyzed and three extensions to theGDMO are proposed to overcome these weaknesses.
Abstract: This paper concerns developing a managed system in an OSI network management. We suggest an overall architecture of a managed system. We analyze the weaknesses of the GDMO(Guidelines for the Definition of Managed Objects) in developing a managed system and propose three extensions to the GDMO to overcome these weaknesses. We also describe the development procedure and support tools for developing a managed system.

Proceedings ArticleDOI
05 May 1996
TL;DR: The paper describes the concepts development and achievements of the project in the field of OSI network management, which are applied to the project "optical fiber integrated services ring for Shanghai petrochemical complex".
Abstract: Since the advent of computer communication networks, there have been considerable advances in the field of OSI network management. When there are a number-of subsystems operating and manipulating many complex jobs interconnected by a networks, the need for a network management facility is essential. The network management system is based on the ISO standards for OSI management. It is concerned primarily with the management of the communication subsystems in each node connected to an OSI network. The developed system does not attempt to implement all the management functions, but rather shows how the framework can be used to provide these functions. The ISO network management framework, based on the ISO basic reference model, has been defined to provide the means for the communication subsystems in all the nodes connected to a network to be remotely monitored and controlled. The paper describes the concepts development and achievements of our project in the field of OSI network management, which are applied to the project "optical fiber integrated services ring for Shanghai petrochemical complex".