An important research branch of human-computer interaction(HCI) is to develop predictive models for human performance in fundamental interactions [1]. On today's graphical user interface(GUI), users often implicit...
An important research branch of human-computer interaction(HCI) is to develop predictive models for human performance in fundamental interactions [1]. On today's graphical user interface(GUI), users often implicitly perform various trajectory-based interactions, such as navigating through menus [2], entering the boundary of a button,
Pull-based development has become an important paradigm for distributed software *** this model,each developer independently works on a copied repository(i.e.,a fork)from the central *** is essential for developers to...
详细信息
Pull-based development has become an important paradigm for distributed software *** this model,each developer independently works on a copied repository(i.e.,a fork)from the central *** is essential for developers to maintain awareness of the state of other forks to improve collaboration *** this paper,we propose a method to automatically generate a summary of a *** first use the random forest method to generate the label of a fork,i.e.,feature implementation or a bug *** on the information of the fork-related commits,we then use the TextRank algorithm to generate detailed activity information of the ***,we apply a set of rules to integrate all related information to construct a complete fork *** validate the effectiveness of our method,we conduct 30 groups of manual experiment and 77 groups of case studies on *** propose Fea_(avg)to evaluate the performance of Fea_(avg)the generated fork summary,considering the content accuracy,content integrity,sentence fluency,and label extraction *** results show that the average of of the fork summary generated by this method is *** than 63%of project maintainers and the contributors believe that the fork summary can improve development efficiency.
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ...
详细信息
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a balance between data benefits and privacy threats,leading to conservative data uploads and low revenue or excessive uploads and privacy *** solve this problem,a Dynamic Privacy Measurement and Protection(DPMP)framework is proposed based on differential privacy and reinforcement ***,a DPM model is designed to quantify the amount of data privacy,and a calculation method for personalized privacy threshold of different users is also ***,a Dynamic Private sensing data Selection(DPS)algorithm is proposed to help sensing users maximize data benefits within their privacy ***,theoretical analysis and ample experiment results show that DPMP framework is effective and efficient to achieve a balance between data benefits and sensing user privacy protection,in particular,the proposed DPMP framework has 63%and 23%higher training efficiency and data benefits,respectively,compared to the Monte Carlo algorithm.
Distributed learning is essential for training large-scale deep models. Asynchronous SGD (ASGD) and its variants are commonly used distributed learning methods, particularly in scenarios where the computing capabiliti...
We introduce an improved position-based dynamics method with corrected smoothed particle hydrodynamics(SPH) kernel to simulate deformable solids. Using a strain energy constraint that follows the continuum mechanics, ...
详细信息
We introduce an improved position-based dynamics method with corrected smoothed particle hydrodynamics(SPH) kernel to simulate deformable solids. Using a strain energy constraint that follows the continuum mechanics, the method can maintain the efficiency and stability of the position-based approach while improving the physical plausibility of the simulation. We can easily simulate the behavior of anisotropic and plastic materials because the method is based on physics. Unlike the previous position-based simulations of continuous materials, we use weakly structured particles to discretize the model for the convenience of deformable object cutting. In this case, a corrected SPH kernel function is adopted to measure the deformation gradient and calculate the strain energy on each particle. We also propose a solution for the interparticle inversion and penetration in large deformation. To perform complex interaction scenarios, we provide a simple method for collision detection. We demonstrate the flexibility, efficiency, and robustness of the proposed method by simulating various scenes, including anisotropic elastic deformation, plastic deformation, model cutting, and large-scale elastic collision.
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s...
详细信息
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,such as privacy-preservingmachine elearning gand secure biometric *** solutions have been put forward to solve this challenging ***,the existing schemes still suffer from various limitations in terms of efficiency and *** this paper,we propose a new encrypt-then-index strategy for the secure k-NN query,which can simultaneously achieve sub-linear search complexity(efficiency)and support dynamical update over the encrypted database(flexibility).Specifically,we propose a novel algorithm to transform the encrypted database and encrypted query points in the *** indexing the transformed database using spatial data structures such as the R-tree index,our strategy enables sub-linear complexity for secure k-NN queries and allows users to dynamically update the encrypted *** the best of our knowledge,the proposed strategy is the first to simultaneously provide these two *** theoretical analysis and extensive experiments,we formally prove the security and demonstrate the efficiency of our scheme.
As the application of smart contracts in blockchain technology becomes increasingly widespread, their security issues have emerged as a focal point of both research and practice. Although symbolic execution technology...
详细信息
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym...
详细信息
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asymmetry in the credit assessment ***,this research designs a credit risk assessment model based on federated learning and feature selection for micro and small enterprises(MSEs)using multi-dimensional enterprise data and multi-perspective enterprise *** proposed model includes four main processes:namely encrypted entity alignment,hybrid feature selection,secure multi-party computation,and global model ***,a two-step feature selection algorithm based on wrapper and filter is designed to construct the optimal feature set in multi-source heterogeneous data,which can provide excellent accuracy and *** addition,a local update screening strategy is proposed to select trustworthy model parameters for aggregation each time to ensure the quality of the global *** results of the study show that the model error rate is reduced by 6.22%and the recall rate is improved by 11.03%compared to the algorithms commonly used in credit risk research,significantly improving the ability to identify ***,the business operations of commercial banks are used to confirm the potential of the proposed model for real-world implementation.
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage...
详细信息
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage in complex interactive *** the effectiveness of manual testing is highly dependent on the user operation process(UOP)of experienced *** on the UOP,we propose an iterative Android automated testing(IAAT)method that automatically records,extracts,and integrates UOPs to guide the test logic of the tool across the complex Activity *** feedback test results can train the UOPs to achieve higher coverage in each *** extracted 50 UOPs and conducted experiments on 10 popular mobile APPs to demonstrate IAAT’s effectiveness compared with Monkey and the initial automated *** experimental results show a noticeable improvement in the IAAT compared with the test logic without human *** the 60 minutes test time,the average code coverage is improved by 13.98%to 37.83%,higher than the 27.48%of Monkey under the same conditions.
暂无评论