Every year, millions of pupils take part in the baccalaureate examination and entrance examinations to universities or colleges in Vietnam. It is vital to keep the questions secret in order to maintain fairness and pr...
详细信息
XML is emerging as the "universal" language for semistructured data description/exchange, and new issues regarding the management of XML data, both in terms of performance and usability, are becoming critica...
详细信息
ISBN:
(纸本)076951507X
XML is emerging as the "universal" language for semistructured data description/exchange, and new issues regarding the management of XML data, both in terms of performance and usability, are becoming critical. The application of knowledge-based synthesization and compression methods (i.e. derivation of synthetic views and loss-less/lossy approximation of contents) can be extremely ben, eficial in this scenario. In this paper we present SqueezeX, a system for the synthesization/compression of XML data based on a multidimensional/classification-based interpretation of their schema and on the application of semantic-and type-oriented compression techniques.
To extract informative terms through known relevance information for query expansion is an important issue in the design of an effective text retrieval system. Various discriminant functions have been developed as a d...
详细信息
ISBN:
(纸本)0769515061;076951507X
To extract informative terms through known relevance information for query expansion is an important issue in the design of an effective text retrieval system. Various discriminant functions have been developed as a device for eliciting good terms. In this paper the notion of informativeness of terms is interpreted and discriminant functions are formalised both based on information-theoretic ideas for auromatic query expansion. Preliminary, results show that the approach adopted in this paper is worthy of continued investigation.
In this paper, e-words are used for coding k-ary trees with n internal nodes. The properties of e-words are discussed in depth, such as the necessary and sufficient condition of e-words, and based on the properties, a...
详细信息
ISBN:
(纸本)076951507X
In this paper, e-words are used for coding k-ary trees with n internal nodes. The properties of e-words are discussed in depth, such as the necessary and sufficient condition of e-words, and based on the properties, a loopless algorithm is obtained to generate e-words for k-ary trees in lexicographic order, which is more efficient in both space and time than the previous algorithm. In addition, e-words can also be easily generated in lexicographic order by a recursive algorithm, and in the order with the Strong Minimal Change Property (SMCP) by a loopless algorithm.
The proceedings contain 118 papers. The topics discussed include: reactive and proactive approaches to media streaming: from scalable coding to content delivery networks;dynamic quality of service mapping framework fo...
ISBN:
(纸本)0769510620
The proceedings contain 118 papers. The topics discussed include: reactive and proactive approaches to media streaming: from scalable coding to content delivery networks;dynamic quality of service mapping framework for relative service differentiation-aware media streaming;multiple description image coding using pre- and post-processing;scalable video coding for failure-free video transmission;data hiding techniques for printed binary images;hologram watermarks for document authentications;an optical watermarking solution for authenticating printed documents;enterprise text processing: a sparse matrix approach;the choice of watermark domain in the presence of compression;watermarking capacity of digital images based on domain-specific masking effects;optimizing watermarking to improve the robustness without affecting the fidelity;and an oblivious and robust watermarking scheme using communications-with-side-information mechanism.
Knowledge management is very important in the consulting business. On the one hand knowledge is the crucial factor of production that differentiates consulting companies from their competitors. On the other hand knowl...
详细信息
ISBN:
(纸本)076951507X
Knowledge management is very important in the consulting business. On the one hand knowledge is the crucial factor of production that differentiates consulting companies from their competitors. On the other hand knowledge management is a consulting service that can be sold to other companies. A holistic approach for the introduction and establishment of knowledge management in consulting companies is presented that covers changes in organization, roles, processes and informationtechnology. It focuses on an innovative approach to capturing implicit knowledge with intelligent software agents.
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of authentication and encryption techniq...
详细信息
ISBN:
(纸本)076951507X
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of authentication and encryption techniques and protocols affect issues such as data throughput and performance throughout the network. This paper looks into two virtual private network models within a corporate network. Two operating system platforms are implemented in this investigation;Novell Netware and Windows 2000. Performance of the two arrangements is, subsequently, analyzed and evaluated.
We present a partitioning method able to manage web log sessions. Sessions are assimilable to transactions, i.e., tuples of variable size of categorical data. We adapt the standard definition of mathematical distance ...
详细信息
ISBN:
(纸本)076951507X
We present a partitioning method able to manage web log sessions. Sessions are assimilable to transactions, i.e., tuples of variable size of categorical data. We adapt the standard definition of mathematical distance used in the K-Weans algorithm to represent transactions dissimilarity, and redefine the notion. of cluster centroid. The cluster centroid is used as the representative of the common properties of cluster elements. We show that using our concept of cluster centroid together with Jaccard distance we obtain results that are comparable with standard approaches, but substantially improve their efficiency.
This paper proposes a joint source and channel coding (JSCC) method for MPEG-2 video transmission. Based on the current channel status, this JSCC method finds the best source and channel code rate distribution. Due to...
详细信息
ISBN:
(纸本)0769515061;076951507X
This paper proposes a joint source and channel coding (JSCC) method for MPEG-2 video transmission. Based on the current channel status, this JSCC method finds the best source and channel code rate distribution. Due to the different bit error sensitivity, of the source code, we apply unequal error protection (UEP) for the source bits by using so-called rate compatible punctured convolution (RCPC) channel coder for efficient protection during channel transmission. In the simulations, we illustrate that under the conditions of the same channel status and total bit rate, our method provides the minimal overall distortion of the MPEG-2 video compared to the equal error protection (EEP) coding.
A Machine Translation (MT) system is an automatic process that translates from one human language to another language by using context information. We evaluate the use of an MT-based approach for query translation in ...
详细信息
ISBN:
(纸本)0769515061;076951507X
A Machine Translation (MT) system is an automatic process that translates from one human language to another language by using context information. We evaluate the use of an MT-based approach for query translation in an Arabic-English Cross-Language information Retrieval (CLIR) system. Me empirically evaluate the use of an MT-based approach for query translation in an Arabic-English CLIR system using the TREC-7 and TREC-9 topics and collections. The effect of query length on the peformance of the machine translation is also investigated to explore how much context is actually required for successful MT processing.
暂无评论