Certain characteristics of software are often hidden in its structure and can only be discovered when the software is executed dynamically. So mining important patterns from dynamic call graph of software plays an imp...
详细信息
Previous key path mining algorithms have high computation complexity in the whole software executing network. But the network can be clustered into modules to find key paths in the module. If simplified strategy, weig...
详细信息
The characteristics of the MicroBlog data are analyzed firstly. Then WeiBo graph is constructed through tweets forwarded path and user influence ranking calculation method which according to the classic PageRank is gi...
详细信息
The main purpose of studying the software structure is considered to understand and recognize the structure easily by also taking into account the quality of software. In this paper, we define and analyze the node imp...
详细信息
A software execution trace can be viewed as a series of events. An event may correspond to the execution of a basic block, the invocation of a class or a method. These traces imply important unique characteristics of ...
详细信息
In this paper, two new methods of constructing ternary sequence pairs based on cyclotomy are presented. The ternary sequence pairs with three-level correlation are constructed based on cyclotomic numbers of order 4. A...
详细信息
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune ...
详细信息
ISBN:
(纸本)9781510803084
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which users are not interested in and shortens the running time. It adopts histogram statistic pattern to get the standardization description to item interval of the mining patterns, making the mining sequences include the item interval information which is valuable to user decision.
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr...
详细信息
Cardinality estimation is the process to survey the quantity of tags in a RFID system. Generally, the cardinality is estimated by exchanging information between reader(s) and tags. To ensure the time efficiency and ac...
详细信息
ISBN:
(纸本)9781467375887
Cardinality estimation is the process to survey the quantity of tags in a RFID system. Generally, the cardinality is estimated by exchanging information between reader(s) and tags. To ensure the time efficiency and accuracy of estimation, numerous probability-based approaches have been proposed, most of which follow a similar way of minimizing the number of required time slots from tags to reader. The overall execution time of the estimator, however, is not necessarily minimized. The estimation accuracy of those approaches also largely depends on the repeated rounds, leading to a dilemma of choosing efficiency or accuracy. In this paper, we propose BFCE, a Bloom Filter based Cardinality Estimator, which only needs a constant number of time slots to meet desired estimation accuracy, regardless of the actual tag cardinality. The overall communication overhead is also significantly cut down, as the reader only needs to broadcast a constant number of messages for parameter setting. Results from extensive simulations under various tag IDs distributions shows that BFCE is accurate and highly efficient. In terms of the overall execution time, BFCE is 30 times faster than ZOE and 2 times faster than SRC in average, the two state-of-the-arts estimation approaches.
In this paper, we present a new method for constructing quaternary sequence with even period 2f based on cyclotomic classes of order two. Under the premise of v = 2f +1, we construct two binary sequences with period 2...
详细信息
暂无评论