Nowadays, multi-label classification methods are of growing interest. Due to the relationships among the labels, traditional single-label classification methods are not directly applicable to the multi-label classific...
详细信息
ISBN:
(纸本)9781479903467
Nowadays, multi-label classification methods are of growing interest. Due to the relationships among the labels, traditional single-label classification methods are not directly applicable to the multi-label classification problem. This paper presents a novel multi-label classification framework based on the variable precision neighborhood rough sets, called Multi-Label classification using Rough Sets (MLRS) which considers the impact of correlation among the labels and the uncertainty that exists in the mapping between the feature space and label space. A series of experiments reported for seven multi-label datasets show that MLRS achieves promising performance when compared with some famous multi-label learning algorithms.
Workflow management is concerned with automated support for business *** management systems are driven by process models specifying the tasks that need to be executed,the order in which they can be executed,which reso...
详细信息
Workflow management is concerned with automated support for business *** management systems are driven by process models specifying the tasks that need to be executed,the order in which they can be executed,which resources are authorised to perform which tasks,and data that is required for,and produced by,these *** workflow instances may run over a sustained period of time,it is important that workflow specifications be checked before they are *** verification is usually concerned with control-flow dependencies only;however,transition conditions based on data may further restrict possible choices between *** this paper we extend workflow nets where transitions have concrete conditions associated with them,called *** then demonstrate that we can determine which execution paths of a WTC-net that are possible according to the control-flow dependencies,are actually possible when considering the conditions based on ***,we are able to more accurately determine at design time whether a workflow net with transition conditions is sound.
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d...
详细信息
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d...
详细信息
Content-based video copy detection is an active research field due to the need for copyright pro- tection and business intellectual property protection. This paper gives a probabilistic spatiotemporal fusion approach ...
详细信息
Content-based video copy detection is an active research field due to the need for copyright pro- tection and business intellectual property protection. This paper gives a probabilistic spatiotemporal fusion approach for video copy detection. This approach directly estimates the location of the copy segment with a probabilistic graphical model. The spatial and temporal consistency of the video copy is embedded in the local probability function. An effective local descriptor and a two-level descriptor pairing method are used to build a video copy detection system to evaluate the approach. Tests show that it outperforms the popular voting algorithm and the probabilistic fusion framework based on the Hidden Markov Model, improving F-score (F1) by 8%.
The AS that hijacks a prefix can black hole and intercept all the hijacked traffic and thus, cause a denial-of-service attack or a man-in-the-middle attack against the prefix owner. There have been many incidents of I...
详细信息
Cloud Computing has emerged as a resource sharing platform, which allows different service providers to deliver software as services. However, for many security sensitive applications such as critical data processing ...
详细信息
In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine moni...
详细信息
Private health information once confined to local medical institutions is migrating onto the Internet as an Electronic Health Record (EHR) that is accessed by cloud computing. No matter where it is hosted, health data...
详细信息
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an...
详细信息
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model and analyze a new electronic *** are found in the protocol and their mechanisms are discussed.A variety of solutions are given to different security *** improved protocol is proven to be robust and secure.
暂无评论