The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
SaaS (Software-as-a-Service) is a service model provided by cloud computing. It has a high requirement for QoS (Quality of Software) due to its method of providing software service. However, manual identification and ...
详细信息
SaaS (Software-as-a-Service) is a service model provided by cloud computing. It has a high requirement for QoS (Quality of Software) due to its method of providing software service. However, manual identification and diagnosis for performance issues is typically expensive and laborious because of the complexity of the application software and the dynamic nature of the deployment environment. Recently, substantial research efforts have been devoted to automatically identifying and diagnosing performance issues of SaaS software. In this survey, we comprehensively review the different methods about automatically identifying and diagnosing performance issues of SaaS software. We divide them into three steps according to their function: performance log generation, performance issue identification and performance issue diagnosis. We then comprehensively review these methods by their development history. Meanwhile, we give our proposed solution for each step. Finally, the effectiveness of our proposed methods is shown by experiments.
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum m...
详细信息
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more *** secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS *** paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement *** this protocol,the secret sender stores the secret information using Pauli *** obtain their shares by measuring the product state ***,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum *** addition,the particles held by participants in the protocol do not contain any secret *** participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own *** the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the *** analysis indicates that the protocol is not vulnerable to retransmission interception and collusion ***,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent systems with bandit feedback is to explore and understand the equilibrium state to ensure stable and tractable system performance.
The rapid development of ISAs has brought the issue of software compatibility to the forefront in the embedded *** address this challenge,one of the promising solutions is the adoption of a multiple-ISA processor that...
详细信息
The rapid development of ISAs has brought the issue of software compatibility to the forefront in the embedded *** address this challenge,one of the promising solutions is the adoption of a multiple-ISA processor that supports multiple different ***,due to constraints in cost and performance,the architecture of a multiple-ISA processor must be carefully optimized to meet the specific requirements of embedded *** exploring the RISC-V and ARM Thumb ISAs,this paper proposes RVAM16,which is an optimized multiple-ISA processor microarchitecture for embedded devices based on hardware binary translation *** results show that,when running non-native ARM Thumb programs,RVAM16 achieves a significant speedup of over 2.73×with less area and energy consumption compared to using hardware binary translation alone,reaching more than 70%of the performance of native RISC-V programs.
Stock price prediction is a typical complex time series prediction problem characterized by dynamics,nonlinearity,and *** paper introduces a generative adversarial network model that incorporates an attention mechanis...
详细信息
Stock price prediction is a typical complex time series prediction problem characterized by dynamics,nonlinearity,and *** paper introduces a generative adversarial network model that incorporates an attention mechanism(GAN-LSTM-Attention)to improve the accuracy of stock price ***,the generator of this model combines the Long and Short-Term Memory Network(LSTM),the Attention Mechanism and,the Fully-Connected Layer,focusing on generating the predicted stock *** discriminator combines the Convolutional Neural Network(CNN)and the Fully-Connected Layer to discriminate between real stock prices and generated stock ***,to evaluate the practical application ability and generalization ability of the GAN-LSTM-Attention model,four representative stocks in the United States of America(USA)stock market,namely,Standard&Poor’s 500 Index stock,Apple Incorporatedstock,AdvancedMicroDevices Incorporatedstock,and Google Incorporated stock were selected for prediction experiments,and the prediction performance was comprehensively evaluated by using the three evaluation metrics,namely,mean absolute error(MAE),root mean square error(RMSE),and coefficient of determination(R2).Finally,the specific effects of the attention mechanism,convolutional layer,and fully-connected layer on the prediction performance of the model are systematically analyzed through ablation *** results of experiment show that the GAN-LSTM-Attention model exhibits excellent performance and robustness in stock price prediction.
In low-light image enhancement,prevailing Retinex-based methods often struggle with precise illumina-tion estimation and brightness *** can result in issues such as halo artifacts,blurred edges,and diminished details ...
详细信息
In low-light image enhancement,prevailing Retinex-based methods often struggle with precise illumina-tion estimation and brightness *** can result in issues such as halo artifacts,blurred edges,and diminished details in bright regions,particularly under non-uniform illumination *** propose an innovative approach that refines low-light images by leveraging an in-depth awareness of local content within the *** introducing multi-scale effective guided filtering,our method surpasses the limitations of traditional isotropic filters,such as Gaussian filters,in handling non-uniform *** dynamically adjusts regularization parameters in response to local image characteristics and significantly integrates edge perception across different *** balanced approach achieves a harmonious blend of smoothing and detail preservation,enabling more accurate illumination ***,we have designed an adaptive gamma correction function that dynamically adjusts the brightness value based on local pixel intensity,further balancing enhancement effects across different brightness levels in the *** results demonstrate the effectiveness of our proposed method for non-uniform illumination images across various *** exhibits superior quality and objective evaluation scores compared to existing *** method effectively addresses potential issues that existing methods encounter when processing non-uniform illumination images,producing enhanced images with precise details and natural,vivid colors.
Graph similarity learning aims to calculate the similarity between pairs of *** unsupervised graph similarity learning methods based on contrastive learning encounter challenges related to random graph augmentation st...
详细信息
Graph similarity learning aims to calculate the similarity between pairs of *** unsupervised graph similarity learning methods based on contrastive learning encounter challenges related to random graph augmentation strategies,which can harm the semantic and structural information of graphs and overlook the rich structural information present in *** address these issues,we propose a graph similarity learning model based on learnable augmentation and multi-level contrastive ***,to tackle the problem of random augmentation disrupting the semantics and structure of the graph,we design a learnable augmentation method to selectively choose nodes and edges within the *** enhance contrastive levels,we employ a biased random walk method to generate corresponding subgraphs,enriching the contrastive ***,to solve the issue of previous work not considering multi-level contrastive learning,we utilize graph convolutional networks to learn node representations of augmented views and the original graph and calculate the interaction information between the attribute-augmented and structure-augmented views and the original *** goal is to maximize node consistency between different views and learn node matching between different graphs,resulting in node-level representations for each *** representations are then obtained through pooling operations,and we conduct contrastive learning utilizing both node and subgraph ***,the graph similarity score is computed according to different downstream *** conducted three sets of experiments across eight datasets,and the results demonstrate that the proposed model effectively mitigates the issues of random augmentation damaging the original graph’s semantics and structure,as well as the insufficiency of contrastive ***,the model achieves the best overall performance.
Rapid and accurate identification of high-quality patents can accelerate the transformation process of scientific and technological achievements, optimize the management of intellectual property rights and enhance the...
详细信息
Rapid and accurate identification of high-quality patents can accelerate the transformation process of scientific and technological achievements, optimize the management of intellectual property rights and enhance the vitality of innovation. Aiming at the shortcomings of the traditional high-value patent assessment method, which is relatively simple and seldom considers the influence of patentees, this paper proposes a high-quality patent method HMFM (High-Value Patent Multi-Feature Fusion Method) that fuses multi-dimensional features. A weighted node importance assessment method in complex network called GLE (Glob-Local-struEntropy) based on improved structural entropy is designed to calculate the influence of the patentee to form the patentee’s features, and the patent text features are extracted by BERT-DPCNN deep learning model, which is supplemented to the basic patent indicator system. Finally a machine learning algorithm is used to assess the value of patents. Experiment results show that our method can identify high-value patents more effectively and accurately.
Accurate traffic flow prediction has a profound impact on modern traffic management. Traffic flow has complex spatial-temporal correlations and periodicity, which poses difficulties for precise prediction. To address ...
详细信息
Accurate traffic flow prediction has a profound impact on modern traffic management. Traffic flow has complex spatial-temporal correlations and periodicity, which poses difficulties for precise prediction. To address this problem, a Multi-head Self-attention and Spatial-Temporal Graph Convolutional Network (MSSTGCN) for multiscale traffic flow prediction is proposed. Firstly, to capture the hidden traffic periodicity of traffic flow, traffic flow is divided into three kinds of periods, including hourly, daily, and weekly data. Secondly, a graph attention residual layer is constructed to learn the global spatial features across regions. Local spatial-temporal dependence is captured by using a T-GCN module. Thirdly, a transformer layer is introduced to learn the long-term dependence in time. A position embedding mechanism is introduced to label position information for all traffic sequences. Thus, this multi-head self-attention mechanism can recognize the sequence order and allocate weights for different time nodes. Experimental results on four real-world datasets show that the MSSTGCN performs better than the baseline methods and can be successfully adapted to traffic prediction tasks.
暂无评论