Given two convex polygons P and Q with n and m edges, the maximum overlap problem is to find a translation of P that maximizes the area of its intersection with Q. We give the first randomized algorithm for this probl...
详细信息
Link prediction and node classification are two important downstream tasks of network representation learning. Existing methods have achieved acceptable results but they perform these two tasks separately, which requi...
详细信息
As a markup language for describing web resources, RDF is often used to represent graph data. SPARQL is a standard query language for RDF data, which is convenient in querying RDF. As RDF data grows rapidly, how to de...
详细信息
As a markup language for describing web resources, RDF is often used to represent graph data. SPARQL is a standard query language for RDF data, which is convenient in querying RDF. As RDF data grows rapidly, how to deal with complex queries over large-scale data in a reasonable time still remains many challenges. The existing RDF query systems often fail to respond within a reasonable time when dealing with complex SPARQL queries. Therefore, we propose an efficient parallel SPARQL query system and novel in three aspects. First, the proposed design provides a dynamic selectivity estimation strategy and generates an optimal query plan for parallel query processing. Second, the new design proposes a parallel processing model to maximize the parallelism of the system. Finally, chunk-based task distribution strategy is implemented to assist the parallel processing model. Based on the proposed design, we implement an efficient parallel query system (Grace). Extensive experiments on LUBM and BTC benchmarks show that Grace outperforms RDF-3X, Virtuoso, TripleBit and achieves a good performance of scalability on the number of threads.
In implant prosthesis treatment, the surgical guide of implant is used to ensure accurate implantation. However, such design heavily relies on the manual location of the implant position. When deep neural network has ...
In implant prosthesis treatment, the surgical guide of implant is used to ensure accurate implantation. However, such design heavily relies on the manual location of the implant position. When deep neural network has been proposed to assist the dentist in locating the implant position, most of them take a single slice as input, which do not fully explore 3D contextual information and ignores the influence of implant slope. In this paper, we design a Text Guided 3D Context and Slope Aware Triple Network (TCSloT) to integrate the perception of contextual information from multiple adjacent slices and awareness of variation of implant slopes. A Texture Variation Perception (TVP) module is correspondingly design to process the multiple slices and capture the texture variation among slices and a Slope-Aware Loss (SAL) is proposed to dynamically assign adaptive weights for the regression head. Additionally, we design a conditional text guidance (CTG) module to integrate the text condition (i.e., left, middle and right) from the CLIP to assist the implant position prediction. Extensive experiments on a dental implant dataset through five-fold cross-validation, demonstrated that the proposed TCSloT achieves superior performance than existing methods.
Hardware-based multi-factor authentication is a broad and extensive security solution approach to overcome the impact of cyber data compromises that are happening these days in applications using cutting-edge technolo...
Hardware-based multi-factor authentication is a broad and extensive security solution approach to overcome the impact of cyber data compromises that are happening these days in applications using cutting-edge technologies. Our proposed work handles the high-end security modules by developing frameworks in parallel to the IoT-based security visualization to make the system’s security an unbreakable unit. This work depicts the idea of prototyping a hardware key, termed in this paper as “AppSec Key” that handles the MFA/2FA checkpoints into a hardware level making it impossible for hackers to bypass it online using the tools. The visualization of IoT setup to the software security is a new revolution to the complication of mishandling data online. This work proposes sequence-based authentication that adds an extra protection layer. The overall approaches to tackle the existing cyber threats are been discussed with many real-world instances.
Machine learning-based simulations, especially calorimeter simulations, are promising tools for approximating the precision of classical high energy physics simulations with a fraction of the generation time. Nearly a...
详细信息
This paper presents a framework to characterize and identify local sequences of proteins that are statistically redundant under the measure of Shannon information content while accounting for variations in their occur...
详细信息
To break data silos and address the challenge of green communication, federated learning (FL) is widely used at network edges to train deep learning models in mobile edge computing (MEC) networks. However, many existi...
To break data silos and address the challenge of green communication, federated learning (FL) is widely used at network edges to train deep learning models in mobile edge computing (MEC) networks. However, many existing FL algorithms do not fully consider the dynamic environment, resulting in slower convergence of the model and larger training energy consumption. In this paper, we design a dynamic asynchronous federated learning (DAFL) model to improve the efficiency of FL in MEC networks. Specifically, we dynamically choose a certain number of mobile devices (MDs) by their arrival order to participate in the global aggregation at each epoch. Meanwhile, we analyze the energy consumption model of local update and upload update, and formulate the problem as a dynamic sequential decision problem to minimize the energy consumption, which is NP-hard. To address it, we propose an energy-efficient algorithm based on deep reinforcement learning named DDAFL, to intelligently determine the number of MDs participating in global aggregation according to the state of MEC networks at each epoch. Compared with baseline schemes, the proposed algorithm can significantly reduce energy consumption and accelerate model convergence.
In-Context Learning (ICL) has gained prominence due to its ability to perform tasks without requiring extensive training data and its robustness to noisy labels. A typical ICL workflow involves selecting localized exa...
Third-party libraries with rich functionalities facilitate the fast development of JavaScript software, leading to the explosive growth of the NPM ecosystem. However, it also brings new security threats that vulnerabi...
详细信息
Third-party libraries with rich functionalities facilitate the fast development of JavaScript software, leading to the explosive growth of the NPM ecosystem. However, it also brings new security threats that vulnerabilities could be introduced through dependencies from third-party libraries. In particular, the threats could be excessively amplified by transitive dependencies. Existing research only considers direct dependencies or reasoning transitive dependencies based on reachability analysis, which neglects the NPM-specific dependency resolution rules as adapted during real installation, resulting in wrongly resolved dependencies. Consequently, further fine-grained analysis, such as precise vulnerability propagation and their evolution over time in dependencies, cannot be carried out precisely at a large scale, as well as deriving ecosystem-wide solutions for vulnerabilities in dependencies. To fill this gap, we propose a knowledge graph-based dependency resolution, which resolves the inner dependency relations of dependencies as trees (i.e., dependency trees), and investigates the security threats from vulnerabilities in dependency trees at a large scale. Specifically, we first construct a complete dependencyvulnerability knowledge graph (DVGraph) that captures the whole NPM ecosystem (over 10 million library versions and 60 million well-resolved dependency relations). Based on it, we propose a novel algorithm (DTResolver) to statically and precisely resolve dependency trees, as well as transitive vulnerability propagation paths, for each package by taking the official dependency resolution rules into account. Based on that, we carry out an ecosystem-wide empirical study on vulnerability propagation and its evolution in dependency trees. Our study unveils lots of useful findings, and we further discuss the lessons learned and solutions for different stakeholders to mitigate the vulnerability impact in NPM based on our findings. For example, we implement a depend
暂无评论