Catálogo de publicaciones - libros
Título de Acceso Abierto
25 Years of Transformations of Higher Education Systems in Post-Soviet Countries: Reform and Continuity
1st ed. 2016. 482p.
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
USSR countries; Soviet higher education reform; Soviet higher education policy; Post-Soviet higher education; vertical system differentiation; horizontal system differentiation
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2016 | Directory of Open access Books | ||
No requiere | 2016 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-319-30068-9
ISBN electrónico
978-3-319-30070-2
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2016
Cobertura temática
Tabla de contenidos
The HTM Learning Algorithm
Kjell Jørgen Hole
According to the fail fast principle in Chap. , we need to learn from systems’ abnormal behavior and downright failures to achieve anti-fragility to classes of negative events. The earlier we can detect problems, the smaller the negative consequences are and the faster we can start learning how to improve the systems. Since humans are not good at detecting anomalies, especially in streaming data from large cloud applications, a form of automatic anomaly detection is needed. This first chapter of Part IV introduces a general learning algorithm based on Jeff Hawkins’s developing theory of how the brain learns, called hierarchical temporal memory (HTM). The HTM learning algorithm is used in the next chapter to detect anomalies in a system’s behavior.
Part IV - Anomaly Detection | Pp. 113-124
Anomaly Detection with HTM
Kjell Jørgen Hole
We model information and communications technology (ICT) systems as complex adaptive systems. Since we cannot hope to predict all future incidents in complex systems, real-time monitoring is needed to detect local failures before they propagate into global failures with an intolerable impact. In particular, monitoring is required to determine the consequences of injecting artificial errors into production systems and to learn how to avoid or limit the impact of future incidents.
Part IV - Anomaly Detection | Pp. 125-132
Summary and Future Work
Kjell Jørgen Hole
We have come to the end of the book, which has investigated different aspects of anti-fragile information and communications technology (ICT) systems. This chapter summarizes the book’s main insights into the development and operation of anti-fragile ICT systems, discusses the design of future systems, and outlines the need for anti-fragile processes, especially to handle attacks on the confidentiality, integrity, and availability of ICT systems.
Part V - Future Anti-fragile Systems | Pp. 135-140