Workload prediction is critical in enabling proactive resource management of cloud *** workload prediction is valuable for cloud users and providers as it can effectively guide many practices,such as performance assur...
详细信息
Workload prediction is critical in enabling proactive resource management of cloud *** workload prediction is valuable for cloud users and providers as it can effectively guide many practices,such as performance assurance,cost reduction,and energy consumption ***,cloud workload prediction is highly challenging due to the complexity and dynamics of workloads,and various solutions have been proposed to enhance the prediction *** paper aims to provide an in-depth understanding and categorization of existing solutions through extensive literature *** existing surveys,for the first time,we comprehensively sort out and analyze the development landscape of workload prediction from a new perspective,i.e.,application-oriented rather than prediction methodologies per ***,we first introduce the basic features of workload prediction,and then analyze and categorize existing efforts based on two significant characteristics of cloud applications:variability and ***,we also investigate how workload prediction is applied to resource ***,open research opportunities in workload prediction are highlighted to foster further advancements.
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we...
详细信息
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some well-known schemes, including the full-domain hash(FDH) signature(Eurocrypt1996) and the Boneh-Franklin identity-based encryption(IBE) scheme(Crypto 2001), are provably secure under CPReds;(2) we prove that a CPRed associated with an instance-extraction algorithm implies a reduction in the quantum ROM(QROM). This unifies several recent results, including the security of the Gentry-Peikert-Vaikuntanathan IBE scheme by Zhandry(Crypto 2012) and the key encapsulation mechanism(KEM) variants using the Fujisaki-Okamoto transform by Jiang et al.(Crypto 2018) in the ***, we show that CPReds are incomparable to non-programming reductions(NPReds) and randomly-programming reductions(RPReds) formalized by Fischlin et al.(Asiacrypt 2010).
Sequential recommendation systems which aim to predict the users’ future clicking items are essential in both research and industry services. Based on the contextual characteristics of users, a large number of existi...
详细信息
The proliferation of GPS-enabled devices has led to the accumulation of a substantial corpus of historical trajectory data. By leveraging these data for training machine learning models, researchers have devised novel...
详细信息
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden...
详细信息
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden,a TOD protocol with novel update rules on protocol weights is designed for scheduling measurement *** addition,unknown nonlinear functions vulnerable to DoS attacks are considered due to the openness and vulnerability of the network.
In this paper, the problem of remote state estimation is investigated for a class of complex networks with noisy wireless communication channels. The employment of the binary encoding scheme allows for the description...
详细信息
The fracture risk of patients with diabetes is higher than those of patients without diabetes due to hyperglycemia,usage of diabetes drugs,changes in insulin levels,and excretion,and this risk begins as early as *** f...
详细信息
The fracture risk of patients with diabetes is higher than those of patients without diabetes due to hyperglycemia,usage of diabetes drugs,changes in insulin levels,and excretion,and this risk begins as early as *** factors including demographic data(such as age,height,weight,and gender),medical history(such as smoking,drinking,and menopause),and examination(such as bone mineral density,blood routine,and urine routine)may be related to bone metabolism in patients with ***,most of the existing methods are qualitative assessments and do not consider the interactions of the physiological factors of *** addition,the fracture risk of patients with diabetes and osteoporosis has not been further studied *** this paper,a hybrid model combining XGBoost with deep neural network is used to predict the fracture risk of patients with diabetes and osteoporosis,and investigate the effect of patients’physiological factors on fracture risk.A total of 147 raw input features are considered in our *** presented model is compared with several benchmarks based on various metrics to prove its ***,the top 18 influencing factors of fracture risks of patients with diabetes are determined.
Continuous glucose monitoring(CGM) technology has grown rapidly to track real-time blood glucose levels and trends with improved sensor accuracy. The ease of use and wide availability of CGM will facilitate safe and e...
详细信息
Continuous glucose monitoring(CGM) technology has grown rapidly to track real-time blood glucose levels and trends with improved sensor accuracy. The ease of use and wide availability of CGM will facilitate safe and effective decision making for diabetes management. Here, we developed an attention-based deep learning model, CGMformer, pretrained on a well-controlled and diverse corpus of CGM data to represent individual's intrinsic metabolic state and enable clinical applications. During pretraining, CGMformer encodes glucose dynamics including glucose level, fluctuation, hyperglycemia, and hypoglycemia into latent space with self-supervised learning. It shows generalizability in imputing glucose value across five external datasets with different populations and metabolic states(MAE = 3.7 mg/d L). We then fine-tuned CGMformer towards a diverse panel of downstream tasks in the screening of diabetes and its complications using task-specific data, which demonstrated a consistently boosted predictive accuracy over direct fine-tuning on a single task(AUROC = 0.914 for type 2 diabetes(T2D) screening and 0.741 for complication screening). By learning an intrinsic representation of an individual's glucose dynamics,CGMformer classifies non-diabetic individuals into six clusters with elevated T2D risks, and identifies a specific cluster with lean body-shape but high risk of glucose metabolism disorders, which is overlooked by traditional glucose measurements. Furthermore, CGMformer achieves high accuracy in predicting an individual's postprandial glucose response with dietary modelling(Pearson correlation coefficient = 0.763)and helps personalized dietary recommendations. Overall, CGMformer pretrains a transformer neural network architecture to learn an intrinsic representation by borrowing information from a large amount of daily glucose profiles, and demonstrates predictive capabilities fine-tuned towards a broad range of downstream applications, holding promise for the ear
Current semi-supervised learning-based sample selection methods for noisy label image classification typically utilize all clean and noisy samples for model training. However, not all noisy samples contribute positive...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriving from the opponents’best response(BR),is technically the optimal strategy for the ***,computing an SSE strategy may be difficult since it needs to solve a mixed-integer program and has exponential complexity in the number of *** this end,the authors propose an equalizer ZD strategy,which can unilaterally restrict the opponent’s expected *** authors first study the existence of an equalizer ZD strategy with one-to-one situations,and analyze an upper bound of its performance with the baseline SSE *** the authors turn to multi-player models,where there exists one player adopting an equalizer ZD *** authors give bounds of the weighted sum of opponents’s utilities,and compare it with the SSE ***,the authors give simulations on unmanned aerial vehicles(UAVs)and the moving target defense(MTD)to verify the effectiveness of the proposed approach.
暂无评论