Graph clustering, also known as community detection, is a long-standing problem in data mining. However, with the proliferation of rich attribute information available for objects in real-world graphs, how to leverage...
详细信息
In a virtualized data center, survivability can be enhanced by creating redundant Virtual Machines (VMs) as backup for VMs such that after VM or server failures, affected services can be quickly switched over to backu...
详细信息
Due to the strong impact of the deregulation of the electricity sector there is a growing need for the correct and timely information from different parts of the system. The introduction of an increasing number of mod...
详细信息
Due to the strong impact of the deregulation of the electricity sector there is a growing need for the correct and timely information from different parts of the system. The introduction of an increasing number of modern intelligent electronic devices enables the interaction between devices in the electric power facility. This enables vertical and horizontal multi-dimensional data exchange. Different generations of different devices with their proprietary communication solutions prevent the establishment of free data and information exchange. Need for standardization of communication within the power system has resulted in the emergence of new standards. The increasing emphasis on ecology and sustainable development lead to a continuous growth of renewable energy sources. With the growing number of distributed energy resources on the power grid there is a need to establish a new model for process information system. This paper gives an overview of new technological solutions and standards that enable more efficient utilization of all available resources. Basic building blocks for the modeling process are presented. Certain specifics of distributed energy resources that affect the modeling process of information system for modern electric power system are presented in this work.
We study multi-pattern matching in a scenario where the pattern set is to be matched to several texts and hence indexing the pattern set is affordable. This kind of scenarios arise, for example, in metagenomics, where...
详细信息
Spectra attacks proposed recently are more data efficient than algebraic attacks against stream cipher. They are also time-and-space efficient. A measurement of the security of a stream cipher against spectra attacks ...
详细信息
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio...
详细信息
More than 700,000 Fluoroscopic Guided Interventional Radiology procedures are performed in the US every day. The modalities used for this type of procedures emit X-ray exposure and have a complicated geometry setting....
详细信息
ISBN:
(纸本)9780983762416
More than 700,000 Fluoroscopic Guided Interventional Radiology procedures are performed in the US every day. The modalities used for this type of procedures emit X-ray exposure and have a complicated geometry setting. Each exposure deposits a fraction of the emitted energy in the tissue after attenuation. Some of the body organs are sensitive and absorbed dose in those organs may enhance the risk of cancer induction. Since the energy required for the procedure and field of exposure affects the amount of the absorbed dose in the organs, this paper presents a mathematical model to minimize the absorbed radiation dose in the critical organs of the body with respect to the image quality. The measure we use for the image quality is signal to noise ratio and a lower bound and upper bound indicate the required signal to noise ratio for a reasonable image quality. Primary computational results are provided for the breasts as an example for the critical organs.
Mortality rates are considered one of the most important indicators for assessing the performance of neonatal care. Increasingly, newborns with very low birth weight (
ISBN:
(纸本)9780769547107
Mortality rates are considered one of the most important indicators for assessing the performance of neonatal care. Increasingly, newborns with very low birth weight (
Application developers require cloud solutions that offer a highly scalable and secure development environment. Some Platform-as-a-Service (PaaS) solutions fail to meet the security requirements of developers, adminis...
详细信息
Application developers require cloud solutions that offer a highly scalable and secure development environment. Some Platform-as-a-Service (PaaS) solutions fail to meet the security requirements of developers, administrators, and final users in a satisfactory and flexible manner. While some providers do offer secure cloud solutions, users are obliged to redesign and adapt their applications in order to conform to the provided environment. The present work introduces MagosCloud Secure, a highly-scalable, opportunistic, declarative, and secure solution constructed on the basis of MagosCloud[1], designed to meet the needs of traditional and e-science application developers. It allows the deployment of a variety of platforms, providing an access control model whereby developers may declaratively state how they wish their data and application resources to be automatically shared with other users. It relies on the concept of `separation of concerns', such that developers need only be concerned with creating their applications, entrusting MagosCloud Secure with the responsibility of providing a secure, highly scalable platform. Finally, the results of tests concerning the automatic generation of secure platforms, as well as run time considerations, are analyzed.
Social Tagging systems are web applications in which users upload resources (e.g., bookmarks, videos, photos, etc.) and annotate it with a list of freely chosen keywords called tags. This is a grassroots approach to o...
详细信息
ISBN:
(数字)9781461418948
ISBN:
(纸本)9781461418931
Social Tagging systems are web applications in which users upload resources (e.g., bookmarks, videos, photos, etc.) and annotate it with a list of freely chosen keywords called tags. This is a grassroots approach to organize a site and help users to find the resources they are interested in. Social tagging systems are open and inherently social; features that have been proven to encourage participation. However, with the large popularity of these systems and the increasing amount of user-contributed content, information overload rapidly becomes an issue. Recommender systems are well known applications for increasing the level of relevant content over the “noise” that continuously grows as more and more content becomes available online. In social tagging systems, however, we face new challenges. While in classic recommender systems the mode of recommendation is basically the resource, in social tagging systems there are three possible modes of recommendation: users, resources, or tags. Therefore suitable methods that properly exploit the different dimensions of social tagging systems data are needed. In this book, we survey the most recent and state-of-the-art work about a whole new generation of recommender systems built to serve social tagging systems. The book is divided into self-contained chapters covering the background material on social tagging systems and recommender systems to the more advanced techniques like the ones based on tensor factorization and graph-based models.
暂无评论