With a growing number of Web documents, many approaches have been proposed for knowledge discovery on Web documents. The documents do not always provide keywords or categories, so unsupervised approaches are desirable...
详细信息
With a growing number of Web documents, many approaches have been proposed for knowledge discovery on Web documents. The documents do not always provide keywords or categories, so unsupervised approaches are desirable, and topic modeling is such an approach for knowledge discovery without using labels. Further, Web documents usually have time information such as publish years, so knowledge patterns over time can be captured by incorporating the time information. In this paper, we propose a new topic model called the Author Topic-Flow (ATF) model whose objective is to capture temporal patterns of research interests of authors over time, where each topic is associated with a research domain. The design of the ATF model is based on the hypothesis that direct topic flows are better than indirect topic flows in the state-of-the-art Temporal Author Topic (TAT) model, which is the most similar approach to ours. We prove the hypothesis by showing the effectiveness of the ATF model compared to the TAT model.
Based on time-dependent travel times for N past days, we consider the computation of robust routes according to the min-max relative regret criterion. For this method we seek a path minimizing its maximum weight in an...
详细信息
ISBN:
(纸本)9783939897996
Based on time-dependent travel times for N past days, we consider the computation of robust routes according to the min-max relative regret criterion. For this method we seek a path minimizing its maximum weight in any one of the N days, normalized by the weight of an optimum for the respective day. In order to speed-up this computationally demanding approach, we observe that its output belongs to the Pareto front of the network with time-dependent multi-criteria edge weights. We adapt a well-known algorithm for computing Pareto fronts in time-dependent graphs and apply the bi-directional search technique to it. We also show how to parametrize this algorithm by a value K to compute a K-approximate Pareto front. An experimental evaluation for the cases N = 2 and N = 3 indicates a considerable speed-up of the bi-directional search over the uni-directional.
With the rapid enlargement in mobile communication, the bandwidth has become the most challenging resource. The total available bandwidth spectrum is divided in to some channels and that are allocated to different mob...
详细信息
ISBN:
(纸本)9781467366229
With the rapid enlargement in mobile communication, the bandwidth has become the most challenging resource. The total available bandwidth spectrum is divided in to some channels and that are allocated to different mobile hosts that belongs to some cells at the time of initiation of a call. So channel allocation must be done efficiently. In case of static allocation when number of mobile host increases in a particular cell, it gets overloaded. Where dynamic channel allocation minimizes the problem and increases channel utilization. But the dynamic channel allocation has to follow distributed approaches because centralized allocation is neither scalable nor reliable. In case of distributed approaches the mobile base station takes the responsibility of allocating channels to the mobile stations that correspond to the same cell. Such allocations must be made considering minimized interference between calls, while satisfying the demands for channels. We have analyzed this optimization problem by using genetic algorithm (GA). The proposed method is studied with the data of some benchmark problems, taken from the literature, and the results are obvious.
In this paper, we present a visualization tool that efficiently supports rotation-invariant boundary image matching. Supporting the rotation invariance in boundary image matching is very important for the more accurat...
详细信息
Our quantitative understanding of how scientists choose and shift their research focus over time is highly consequential, because it affects the ways in which scientists are trained, science is funded, knowledge is or...
In a faulty environment, comparisons between two elements with respect to an underlying linear order can come out right or go wrong. A wrong comparison is a recurring comparison fault if comparing the same two element...
详细信息
ISBN:
(纸本)9783319221762
In a faulty environment, comparisons between two elements with respect to an underlying linear order can come out right or go wrong. A wrong comparison is a recurring comparison fault if comparing the same two elements yields the very same result each time we compare the elements. We examine the impact of such faults on the elementary problems of sorting a set of distinct elements and finding a minimum element in such a set. The more faults occur, the worse the approaches to solve these problems can become and we parametrize our analysis by an upper bound k on the number of faults. We first explain that reconstructing the sorted order of the elements is impossible in the presence of even one fault. Then, we focus on the maximum information content we get by performing all possible comparisons. We consider two natural approaches for sorting the elements that involve knowledge of the outcomes of all comparisons: the first approach finds a permutation (compatible solution) that contradicts at most k times the outcomes of comparisons, and the second approach sorts the elements by the number of times an element is returned to be larger in the outcomes of its comparisons with all other elements (score solution). In such permutations the elements can be dislocated from their positions in the linear order. We measure the quality of such permutations by three measures: the maximum dislocation of an element, the sum of dislocations of all elements, and the Kemeny distance compared to the linear order. We show for compatible solutions that the Kemeny distance is at most 2k, the sum of dislocations at most 4k, and the maximum dislocation at most 2k. In score solutions the Kemeny distance is smaller than 4k, the sum of dislocations smaller than 8k, and the maximum dislocation at most k +1. Our upper bounds are tight for compatible solutions, but possibly not tight for score solutions. It turns out that none of the two approaches is better than the other in all measures. For the
There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devic...
详细信息
ISBN:
(纸本)9781509048526
There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.
Variable influence duration (VID) join is a novel spatio-temporal join operation between a set T of trajectories and a set P of spatial points. Here, trajectories are traveling histories of moving objects (e.g., tr...
详细信息
Variable influence duration (VID) join is a novel spatio-temporal join operation between a set T of trajectories and a set P of spatial points. Here, trajectories are traveling histories of moving objects (e.g., travelers), and spatial points are points of interest (POIs, e.g., restaurants). VID join returns all pairs of (τs, p) if τs is spatially close to p for a long period of time, where τs is a segment of trajectory τ ∈ T and p ∈ P. Each returned (τs, p) implies that the moving object associated with τs stayed at p (e.g., having dinner at a restaurant). Such information is useful in many aspects, such as targeted advertising, social security, and social activity analysis. The concepts of influence and influence duration are introduced to measure the spatial closeness between τ and p, and the time spanned, respectively. Compared to the conventional spatio-temporal join, the VID join is more challenging since the join condition varies for different POIs, and the additional temporal requirement cannot be indexed effectively. To process the VID join e?ciently, three algorithms are developed and several optimization techniques are applied, including spatial duplication reuse and time duration based pruning. The performance of the developed algorithms is verified by extensive experiments on real spatial data.
暂无评论