Testing-as-a-service (TaaS) is a new model to provide testing capabilities to end users. Users save the cost of complicated maintenance and upgrade effort, and service providers can upgrade their services without impa...
详细信息
Reinforcement learning suffers from inefficiency when the number of potential solutions to be searched is large. This paper describes a method of improving reinforcement learning by applying rule induction in multi-ag...
详细信息
Conceptual frameworks are used to present a preferred approach to an idea or thought. Its use considerably facilitates the productivity of the data modelling phase and hence the development of applications, since it p...
详细信息
ISBN:
(纸本)9789898425065
Conceptual frameworks are used to present a preferred approach to an idea or thought. Its use considerably facilitates the productivity of the data modelling phase and hence the development of applications, since it preserves portability and usability across domains. Evidence-Based Practice (EBP), usually employed in Medicine, represents a decision-making process centered on justifications of relevant information. EBP is used in several areas;however, we did not found conceptual models involving EBP that preserves portability and usability across domains. Besides, the decision-making context can have an impact on evidence-based decision-making, but the integration of evidence and context is still an open issue. This work presents a conceptual framework that integrates evidence with context applying it to the conceptual modelling phase for EBP domains. The use of context allows filtering out more useful information. The main contributions of this paper are: incorporation of contextual information into EBP procedures and presentation of the proposed conceptual framework. Also an implementation that uses the filtering of contextual information to support evidence-based decision making in the area of crime prevention is presented to validate the framework.
HPC systems are notorious for operating at a small fraction of their peak performance, and the ongoing migration to multi-core and multi-socket compute nodes further complicates performance optimization. The readily a...
详细信息
Many participatory sensing applications use data collected by participants to construct a publicmodel of a system or phenomenon. For example, a health application might compute a model relating exercise and diet to am...
详细信息
ISBN:
(纸本)9781450303446
Many participatory sensing applications use data collected by participants to construct a publicmodel of a system or phenomenon. For example, a health application might compute a model relating exercise and diet to amount of weight loss. While the ultimately computed model could be public, the individual input and output data traces used to construct it may be private data of participants (e.g., their individual food intake, lifestyle choices, and resulting weight). This paper proposes and experimentally studies a technique that attempts to keep such input and output data traces private, while allowing accurate model construction. This is significantly different from perturbation-based techniques in that no noise is added. The main contribution of the paper is to show a certain data transformation at the client side that helps keeping the client data private while not introducing any additional error to model construction. We particularly focus on linear regression models which are widely used in participatory sensing applications. We use the data set from a map-based participatory sensing service to evaluate our scheme. The service in question is a green navigation service that constructs regression models from participant data to predict the fuel consumption of vehicles on road segments. We evaluate our proposed mechanism by providing empirical evidence that: i) an individual data trace is generally hard to reconstruct with any reasonable accuracy, and ii) the regression model constructed using the transformed traces has a much smaller error than one based on additive dataperturbation schemes. Copyright 2010 ACM.
In a heterogeneous wireless network (HWN), traffic is distributed primarily by grouping and channelling identical traffic through a particular access point. In this paper, we introduce an effective traffic load balanc...
详细信息
Outlier detection can find its tremendous applications in areas such as intrusion detection, fraud detection, and image processing. Among many outlier detection algorithms, LOF is a very important density-based algori...
详细信息
ISBN:
(纸本)9781424463275
Outlier detection can find its tremendous applications in areas such as intrusion detection, fraud detection, and image processing. Among many outlier detection algorithms, LOF is a very important density-based algorithm in which one critical step is to find the k-distance neighbors. In some privacy preserving circumstances, the cooperation between data holders is necessary while the privacy of the participators should be guaranteed. In this paper, we focus on privacy preserving LOF. We propose a novel algorithm for privacy preserving k-distance neighbors search. Combining it with other secure multiparty computation techniques, we detect outliers by LOF in a privacy preserving way.
The accumulation of high-throughput genomic and proteomic data allows for the reconstruction of the increasingly large and complex metabolic networks. In order to analyze accumulated data and reconstructed networks, i...
详细信息
ISBN:
(纸本)9780769542577
The accumulation of high-throughput genomic and proteomic data allows for the reconstruction of the increasingly large and complex metabolic networks. In order to analyze accumulated data and reconstructed networks, it is critical to identify network patterns and evolutionary relations between metabolic networks. But even finding similar networks is computationally challenging. Based on the property of gene duplication and function sharing in biological network, we have formulated the network alignment problem which asks the optimal vertex-to-vertex mapping allowing path contraction, vertex deletion, and vertex insertions. In this paper we present fixed parameter tractable combinatorial algorithms, which take into account the enzymes' functions and the similarity of arbitrary network topologies such as trees and arbitrary graphs wit hallowing the different types of vertex deletions. The proposed algorithms are fixed parameter tractable in the liner or square of the size of feedback vertex set respectively for the case of disallowing or allowing the deletions. We have developed the web service tool MetNetAligner which aligns metabolic networks. We evaluated our results by the randomizedP-Value computation. In the computation, we followed two standard randomization procedures and further developed two other random graph generators which keep the more stringent and consistent topology constraints. By comparing their distribution of the significant alignment pairs, we observed that the more stringent constraints in the topology the random graph generator has, the more pairs of significant alignments there exist. We also performed pair wise mapping of all pathways for four organisms and found a set of statistically significant pathway similarities. We have applied the network alignment to identifying pathway holes which are resulted by inconsistency and missing enzymes. MetNetAligner is available at http://\\***:8080/MinePW/pages/gmapping/*** Two rand
Recent efforts to produce single photons via heralding have relied on creating spectrally factorable two-photon states in order to achieve both high purity and high production rate. Through a careful multimode analysi...
详细信息
Recent efforts to produce single photons via heralding have relied on creating spectrally factorable two-photon states in order to achieve both high purity and high production rate. Through a careful multimode analysis, we find, however, that spectral factorability is not necessary. Utilizing single-mode detection, a similar or better performance can be achieved with nonfactorable states. This conclusion rides on the fact that even when using a broadband filter, a single-mode measurement can still be realized, as long as the coherence time of the triggering photons exceeds the measurement window of the on-off detector.
暂无评论