In the paper, we present a new method for constructing a class of quaternary sequence pairs with even period 2N from the known binary sequence pairs with odd period N by using the reverse Gray mapping and interleaving...
详细信息
The existing recommendation algorithms have lower robustness against shilling attacks. With this in mind, in this paper we propose a robust recommendation algorithm based on the identification of suspicious users and ...
详细信息
In this paper, we focus on efficient construction of restricted subtree (RSubtree) results for XML keyword queries on a multicore system. We firstly show that the perfor- mance bottlenecks for existing methods lie i...
详细信息
In this paper, we focus on efficient construction of restricted subtree (RSubtree) results for XML keyword queries on a multicore system. We firstly show that the perfor- mance bottlenecks for existing methods lie in 1) computing the set of relevant keyword nodes (RKNs) for each subtree root node, 2) constructing the corresponding RSubtree, and 3) parallel execution. We then propose a two-step generic top-down subtree construction algorithm, which computes SLCA/ELCA nodes in the first step, and parallelly gets RKNs and generates RSubtree results in the second step, where generic means that 1) our method can be used to compute dif- ferent kinds of subtree results, 2) our method is independent of the query semantics; top-down means that our method con- structs each RSubtree by visiting nodes of the subtree con- structed based on an RKN set level-by-level from left to right, such that to avoid visiting as many useless nodes as possible. The experimental results show that our method is much more efficient than existing ones according to various metrics.
In this paper, we try to systematically study how to perform doctor recommendation in medical social net- works (MSNs). Specifically, employing a real-world medical dataset as the source in our work, we propose iBol...
详细信息
In this paper, we try to systematically study how to perform doctor recommendation in medical social net- works (MSNs). Specifically, employing a real-world medical dataset as the source in our work, we propose iBole, a novel hybrid multi-layer architecture, to solve this problem. First, we mine doctor-patient relationships/ties via a time-constraint probability factor graph model (TPFG). Second, we extract network features for ranking nodes. Finally, we propose RWR- Model, a doctor recommendation model via the random walk with restart method. Our real-world experiments validate the effectiveness of the proposed methods. Experimental results show that we obtain good accuracy in mining doctor-patient relationships from the network, and the doctor recommendation performance is better than that of the baseline algorithms: traditional Ranking SVM (RSVM) and the individual doctor recommendation model (IDR-Model). The results of our RWR-Model are more reasonable and satisfactory than those of the baseline approaches.
Multi-access Edge Computing (MEC) has been a promising solution that enables Internet of Things (IoT) devices to support computation-intensive applications by offloading some tasks to the network edge. However, most e...
Multi-access Edge Computing (MEC) has been a promising solution that enables Internet of Things (IoT) devices to support computation-intensive applications by offloading some tasks to the network edge. However, most existing offloading methods in MEC systems are based on the premise of scenarios with either single-type or stable users, which is not aligned with the practical situations of users’ diversity and mobility. In addition, these methods always ignore energy saving strategies in MEC systems, which inevitably degrades Utility Energy Efficiency (UEE). To tackle these issues, considering personalized requirements from diverse users and idle energy consumption in MEC servers, we propose a novel computation offloading architecture with adaptive sleeping mechanism and heterogeneous MEC servers. Based on the architecture, we investigate energy-efficient computation offloading in mobility-aware MEC systems with diverse users. Under the Deep Reinforcement Learning (DRL) framework, we propose a Twin Delayed Deep Deterministic Policy Gradient Algorithm with Bursty Traffic (TD3-BT), in which the inherent correlation of task arrivals is taken into account to capture the behavior of correlated traffic and provide rational metrics estimation within one time slot. A long-term system cost minimization problem is formulated to optimize computation offloading for the trade-off between system delay and UEE. Assisted by TD3-BT, the formulated problem is effectively solved and the decision making in each time slot is provided for diverse users. Experimental results demonstrate that our TD3-BT algorithm achieves superior performance under various offloading scenarios compared to some benchmarks.
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support...
详细信息
Dynamic pricing and inventory play a respective role. The purpose of inventory is to try best to maintain an even production speed and efficiently ease supply-and-demand contradiction during the production process and...
详细信息
Dynamic pricing and inventory play a respective role. The purpose of inventory is to try best to maintain an even production speed and efficiently ease supply-and-demand contradiction during the production process and among enterprises in the supply chain. However, dynamic pricing aims at maximizing revenues by setting commodities or services at different price levels according to diversified demands of consumers and different commodity or service price evaluation by consumers in different periods. Therefore, it is important for enterprises to optimize their dynamic pricing strategies and commodity inventory so as to maximize value of researches. However, demands for tangible commodities are uncertain. Generally speaking, the commodity demand volume should first be confirmed before any specific analysis. Therefore, this paper focuses on introducing the commodity demand function and relevant factors influencing the commodity demand volume. The utility function describing consumers' demands for a single commodity is analyzed. The specific power demand function model based on utility maximization is built through the utility function. At last, we conduct an in-depth analysis and simulation of the model.
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing sets. By extracting the most representative passing and failing graphs based on these sets, the discriminative sub-graph is mined between the two representative graphs. First, Sig BB searches the max common graph, and then gets the opposite nodes set. The discriminative sub-graph is obtained by organizing and extending the set finally. Since the detected code scale is associated with the sorting of suspicious nodes, a suspicious metric strategy is also designed to sort the nodes in the discriminative sub-graph. Experimental results indicate that our method is both effective and efficient for software fault localization.
Friend recommendation is popular in social site to help people make new friends and expand their social networks. However, the conventional friend recommendation method is low accuracy for the sparsity of data and col...
详细信息
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ...
详细信息
暂无评论