Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. Theyseemed to achieve this goal but at the expense of query response time. To mitigate this weakness, prot...
详细信息
Patent classification is a large scale hierarchical text classification (LSHTC) task. Though comprehensive comparisons, either learning algorithms or feature selection strategies, have been fully made in the text cate...
详细信息
Patent classification is a large scale hierarchical text classification (LSHTC) task. Though comprehensive comparisons, either learning algorithms or feature selection strategies, have been fully made in the text categorization field, few work was done for a LSHTC task due to high computational cost and complicated structural label characteristics. For the first time, this paper compares two popular learning frameworks, namely hierarchical support vector machine (SVM) and k nearest neighbor (k-NN) that are applied to a LSHTC task. Experiment results show that the latter outperforms the former in this LSHTC task, which is quite different from the usual results for normal text categorization tasks. Then this paper does a comparative study on different similarity measures and ranking approaches in k-NN framework for LSHTC task. Conclusions can be drawn that k-NN is more appropriate for the LSHTC task than hierarchical SVM and for a specific LSHTC task. BM25 outperforms other similarity measures and List Weak gains a better performance than other ranking approaches. We also find an interesting phenomenon that using all the labels of the retrieved neighbors can remarkably improve classification performance over only using the first label of the retrieved neighbors.
Steganography is an important research direction of information security, which mainly research how to embed secret information into carriers, in order to achieve the objectives of secure communication. In this paper,...
详细信息
ISBN:
(纸本)9781424472352
Steganography is an important research direction of information security, which mainly research how to embed secret information into carriers, in order to achieve the objectives of secure communication. In this paper, a novel Chinese text steganography based on substitution of different forms Chinese characters is proposed. We propose two embedding methods named SSM and HESM. SSM simply substitute some characters to embed the hidden message, which has high embedding rate. In HESM, we first split the hidden message into segments with the same size, and then embed the hidden message segment by segment into the carrier text. The segment length can be adjusted according to the application requirements. The highest embedding rate of the our steganographic algorithm is about 2%. In addition, our algorithm don't change the content of the carrier text, and it can resist traditional attacking methods such as re-layout, and so on.
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new netw...
详细信息
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new network protocols are proposed so that it is now becoming harder to manage the network. In the conditional network, every network protocol uses the fixed port, the so-called well-known port number. In the past, it was easy to classify and manage the network traffic because we could identify the network service by the port number. However, new types of network applications do not use fixed port number. The method of traffic classification with fixed port number is inadequate. In recent years, the DPI (Deep Packet Inspection) is used to classify the traffic. This study deploys a NMS (network management system) based on DPI and SNMP. The NMS controls the network devices and services according to the traffic classification of DPIS (DPI server). The platform of DPIS is implemented on the Netfilter framework in Linux kernel.
The elderly represent a valid group of users who can potentially benefit greatly from engaging with technology, such as healthcare systems or playing digital games. Yet, less attention has been given to the significan...
详细信息
Creativity, innovation and leadership are among the essential attributes of future engineers as identified in the Engineer 2020 report by the National Academy of Engineering. It is critical for students to have the ab...
详细信息
Creativity, innovation and leadership are among the essential attributes of future engineers as identified in the Engineer 2020 report by the National Academy of Engineering. It is critical for students to have the ability to identify new needs and opportunities for technological innovation in highly complex and interdisciplinary domains. Historically, entrepreneurship has fueled innovation and the advent of many technological advances. Therefore, education in entrepreneurship for engineering or computing disciplines that complement strong analytical and technical skills, is likely to significantly enhance students' lifelong ability and desire to innovate. The goal of this panel is to discuss a number of education models in entrepreneurship, innovation, and leadership at different types of computing and engineering schools across the country and internationally, in order to identify common themes and effective components for such programs.
Testing-as-a-service (TaaS) is a new model to provide testing capabilities to end users. Users save the cost of complicated maintenance and upgrade effort, and service providers can upgrade their services without impa...
详细信息
Testing-as-a-service (TaaS) is a new model to provide testing capabilities to end users. Users save the cost of complicated maintenance and upgrade effort, and service providers can upgrade their services without impact on the end-users. Due to uneven volumes of concurrent requests, it is important to address the elasticity of TaaS platform in a cloud environment. Scheduling and dispatching algorithms are developed to improve the utilization of computing resources. We develop a prototype of TaaS over cloud, and evaluate the scalability of the platform by increasing the test task load;analyze the distribution of computing time on test task scheduling and test task processing over the cloud;and examine the performance of proposed algorithms by comparing others.
Rigidity and reflectivity are important properties of objects, identifying these properties is a fundamental problem for many computer vision applications like motion and tracking. In this paper, we extend our previou...
详细信息
Rigidity and reflectivity are important properties of objects, identifying these properties is a fundamental problem for many computer vision applications like motion and tracking. In this paper, we extend our previous work to propose a motion analysis based approach for detecting the object's rigidity and reflectivity. This approach consists of two steps. The first step aims to identify object rigidity based on motion estimation and optic flow matching. The second step is to classify specular rigid and diffuse rigid objects using structure from motion and Procrustes analysis. We show how rigid bodies can be detected without knowing any prior motion information by using a mutual information based matching method. In addition, we use a statistic way to set thresholds for rigidity classification. Presented results demonstrate that our approach can efficiently classify the rigidity and reflectivity of an object.
According to recent work, duplicate bug reports impact negatively on software maintenance and evolution productivity due to, among other factors, the increased time spent on report analysis and validation. Therefore, ...
详细信息
According to recent work, duplicate bug reports impact negatively on software maintenance and evolution productivity due to, among other factors, the increased time spent on report analysis and validation. Therefore, a considerable amount of time is lost mainly with duplicate bug report analysis. In this sense, this work presents am exploratory study using data from bug trackers from private and open source projects, in order to understand the possible factors (i.e. software life-time, size, amount of bug reports, etc.) that cause bug report duplication and its impact on software development. This work also discusses bug report characteristics that could help identifying duplicates.
ParticipART is an initiative aimed at exploring participation in interactive works using ubiquitous computing and mixed reality. It supports and analyses work of artists and creative practitioners incorporating or ref...
详细信息
暂无评论