Most previous IE(IE) work relys on the analysis of the DOM tree of HTML *** hundreds of information sources need to be extracted in a specific domain like news,it will lead to decreased *** on the features of news art...
详细信息
ISBN:
(纸本)9783642251870
Most previous IE(IE) work relys on the analysis of the DOM tree of HTML *** hundreds of information sources need to be extracted in a specific domain like news,it will lead to decreased *** on the features of news articles,this paper proposed a new way to get news content desired by washing noise information and text group *** experiment proved the effectiveness of the algorithm.
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity ***,application de...
详细信息
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity ***,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used *** a result,security vulnerabilities are *** on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse *** on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid.
Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation...
详细信息
Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation and scheduling are extremely important challenges in cloud infrastructure. Based on distributed agents, this paper presents trusted data acquisition mechanism for efficient scheduling cloud resources to satisfy various user requests. Our mechanism defines, collects and analyzes multiple key trust targets of cloud service resources based on historical information of servers in a cloud data center. As a result, using our trust computing mechanism, cloud providers can utilize their resources efficiently and also provide highly trusted resources and services to many users.
Video compression is the crucial technology of video representation, transmission, and storage. Recently, learnable video compression has received great attention from both industry and research, as a result of the po...
详细信息
Recently, in a task of face recognition, some researchers proposed a novel method called color space normalization (CSN) which can enhance the discriminating power of color spaces for color face recognition. This meth...
详细信息
Application reconfiguration is a principal method of improving the application flexibility and adaptability to dynamic environment in sensor networks. Motivated by this, we propose a novel Q-learning-based decision ma...
详细信息
The color face recognition method using quaternion matrix representation is based on RGB color space which is a fundamental and widely used space. However, the RGB color space is a relatively weak color space for face...
详细信息
In current years, application layer overlay networks have become a popular solution for video streaming delivering. Ad Hoc networks are composed of mobile nodes without any fundamental structure, these mobile nodes dy...
详细信息
AVS-M is a video encoding standard used for mobile video in wireless environment, developed by the Audio and Video Coding Standard Working Group of China. In order to cope with the burst error in error-prone wireless ...
详细信息
Application reconfiguration is essential in order to complement the flexibility and adaptability for sensor networks in the environment monitoring domain. In this paper, we first describe an effective Environment Adap...
详细信息
暂无评论