Many patterns have been discovered to explain and analyze how people make friends. Among them is the triadic closure, supported by the principle of the transitivity of friendship, which means for an individual the fri...
详细信息
As an emerging portable service platform, OSGi is now taking a more and more important role in constructing a ubiquitous computing system. Since ubiquitous computing system is always a distributed system, people may f...
详细信息
A parallel multi-recipient proxy re-encryption scheme is proposed, which significantly improves the efficiency of group communication in decentralized wireless networks. The network model is presented, that is, powerf...
详细信息
Copy-move is one of the most common image tampering method. Many schemes have been proposed to detect and locate the forged regions. However, many existing schemes fail when the copied region is rotated or ipped befor...
详细信息
The purpose of reconciliation, one of classical aspects of quantum key distribution (QKD) protocol, is to mitigate errors after the distribution of quantum information over a quantum channel. In this paper, a rate-ada...
详细信息
The purpose of reconciliation, one of classical aspects of quantum key distribution (QKD) protocol, is to mitigate errors after the distribution of quantum information over a quantum channel. In this paper, a rate-adaptive method is proposed by means of a channel coding scheme where specific low-density parity-check (LDPC) codes are adapted in the Slepian-Wolf coding system. Puncturing and shortening techniques are adopted to optimize their coding rates with all possible cases of error in QKD. This successful method utilizes the knowledge of the quantum bit error rate (QBER) based on the maximum-likelihood estimator with respect to the syndrome information. Its benefit is that avoids wasting sample keys in the traditional channel estimation and thus increases the size of the final secret key. Evidently, simulation results confirm an improvement in the reconciliation efficiency with minimal interaction that suitable for high QKD throughput applications.
With the rapid development and wide application of the Web services, its security flaws and vulnerabilities are increasing. security has become one of the key issues to constrain the development of Web services techno...
详细信息
In today's Web environment, Service Oriented Architecture (SOA) becomes an efficient paradigm to integrate distributed applications. Due to loosely coupled nature of SOA, security is one of the most important issu...
详细信息
The events of information leak and illegal content propagation often occur on the network. The existing techniques cannot collect sufficient evidences about users' contents to support forensics for these events. A...
详细信息
We propose a semi-informative aware approach using the topic model on query expansion problem in the biomedicine domain. the demographics and disease information is applied to semi-structure the topic model as the “k...
详细信息
We propose a semi-informative aware approach using the topic model on query expansion problem in the biomedicine domain. the demographics and disease information is applied to semi-structure the topic model as the “known” label, compared to the traditional latent topics in topic modelling. Then, we suggest to select three terms from the top ranked documents to expand the query, based on the assumption in the pseudo relevance feedback method that the top ranked results in the first retrieval around are relevant. After that, we conduct the experiments on the TREC medical records data sets with extensive analysis and discussions. Numerically, we achieve the improvements of 7.41% on MAP, 9.29% on Bpref and 5.60% on P@10 respectively over the strong baselines.
暂无评论