We consider a risk model with a premium rate which varies with the level of free reserves. In this model, the occurrence of claims is described by a Cox process
This paper studies the digit watermark technology of numeric attributes in relational database for databases information security. It proposes a new mechanism b
We first discusses some threats to VoIP system and H.323 architectures designed for VoIP communications on security point of view. Continues with presenting sec
Several models of measuring case similarity in CBR systems are deeply explored. We also discuss the case matching process,and present three matching functions.
We combine the web usage mining and fuzzy clustering and give the concept of web fuzzy clustering, and then put forward the web fuzzy clustering processing mode