This paper presents our work for the Realtime Adhoc Task of TREC 2011 Microblog Track. Microblog texts like tweets are generally characterized by the inclusion of a large proportion of irregular expressions, such as i...
详细信息
This paper presents our work for the Realtime Adhoc Task of TREC 2011 Microblog Track. Microblog texts like tweets are generally characterized by the inclusion of a large proportion of irregular expressions, such as ill- formed words, which can lead to significant mismatch between query terms and tweets. In addition. Twitter queries are distinguished from Web queries with many unique characteristics, one of which reflects the clearly distinct temporal aspects of Twitter search behavior. In this study, we deal with the first problem by normalizing tweet texts and the second by capturing the temporal characteristics of a topic. We divided topics into two categories: time-sensitive and time-insensitive. For the time-sensitive ones, we introduce a decay factor to adjust the relevance score of results according to the expected date of the topical event to happen, and then re-rank the search results. Experiments demonstrate that our methods are significantly better than baseline and outperform the medium of all runs.
The Infrastructure-as-a-Service (IaaS) cloud computing model has become a compelling computing solution with a proven ability to reduce costs and improve resource efficiency. Virtualization has a key role in supportin...
详细信息
Self representation problem is very important for the negative selection algorithms. In this paper, two methods, named as K-NN-ASR and B-NN-ASR, are proposed to calculate the self radius of a self sample in the contin...
详细信息
Exchange protocols are an important theoretic basis to make secure electronic commerce and electronic business transactions possible, in which the fairness is a crucial property. To ensure and verify the property, a s...
详细信息
Textual use cases are often used to describe system requirements and are believed to be a good basis for system testing. However, due to the lacking of formal syntax and semantics of textual use cases, it is hard to b...
详细信息
Textual use cases are often used to describe system requirements and are believed to be a good basis for system testing. However, due to the lacking of formal syntax and semantics of textual use cases, it is hard to build automating process to generate test cases from textual use cases. In this paper, we propose a new approach for this automating process. The use cases are written in a restricted yet acceptable language style. An Extended Finite State Machine(EFSM) are extracted from text use cases, then test cases are generated from the EFSM. Statements coverage is adopted as the criterion to generate test cases. A Market Information System(MIS) is employed to demonstrate our approach. This method can offer us at least three benefits: 1) test cases can be automatically generated from textual use cases. 2) new test cases can be generated if requirements are updated. 3) debugging information can be derived.
Service-based architectures have now become commonplace, creating the need to address their systematic maintenance and evolution. We propose to enable transformation-driven evolution for service architectures in a sem...
详细信息
Service-based architectures have now become commonplace, creating the need to address their systematic maintenance and evolution. We propose to enable transformation-driven evolution for service architectures in a semi-automated fashion. In contrast to the existing solutions like service wrapping, migration or run-time adaptation etc., the proposal supports primitive and customisable architectural transformations to support an incremental evolution for service architectures. An empirical approach is adopted to investigate the extent to which the architecture evolution tasks (i.e. modeling, transformation and refinement) can be automated and validated in context to the central hypothesis for architecture-centric software evolution. Based on the initial results, we plan to proceed toward modeling and automating the architectural evolution in a formal way.
Large-scale software systems represent an important class of artificial complex systems, which can be investigated from the complex network perspective. Based on the collaboration network model, the collaboration rela...
详细信息
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi...
详细信息
Construction of saliency map in multimedia data is useful for applications in multimedia like object segmentation, quality assessment, and object recognition. In this paper, we propose a novel saliency map model calle...
详细信息
In this paper, we develop a novel context-aware approach for quality of experience (QoE) modeling, reasoning and inferencing in mobile and pervasive computing environments. The proposed model is based upon a state-spa...
详细信息
暂无评论