information hiding based on error correcting code is one of the difficulties in information hiding research. Current information hiding algorithms cannot confirm the upper bound of covert channel capacity when channel...
详细信息
This paper analyzes some features of discovering frequent patterns on large set of transactions. On this basis, it gives an improved algorithm (called AprioriAdjust) with the development of two techniques: (1) applyin...
详细信息
This paper analyzes some features of discovering frequent patterns on large set of transactions. On this basis, it gives an improved algorithm (called AprioriAdjust) with the development of two techniques: (1) applying the compressive processing of the transaction set for mining sequential patterns;(2) presenting a method based on the statistical mechanism to evaluate the sequence's support, in which the convergence of average value of the support in the whole procedure is considered, so as to effectively prune the candidate set of the frequent patterns. Furthermore, it discusses the results of the experiments. Compared to the AprioriTID algorithm, it shows that the AprioriAdjust algorithm is more efficient and scalable over the large sets of transactions.
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ...
详细信息
Network programming is the act of writing computer codes for communications between programs or processes in different computers across networks. It is crucial for applications and services using networks, including e...
详细信息
Requirements Elicitation (RE) is a critical process in system/softwareengineering. Its goal is to capture the stakeholders expectations, needs and constraints, which can be elicited, analyzed and specified as require...
详细信息
The goal of requirements elicitation is to understand the stakeholders' needs and constraints, and form the system requirements. But gathering requirements correctly, completely and understandably in a natural way...
详细信息
We present the design of pService system for P2P Web services discovery supporting similarity earch with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. ser...
详细信息
In the paper, a new parallel LZW-Like algorithm, bidirectory LZW algorithm (BD-LZW) will be interpreted The new algorithm can be used in data compression/decompression system which runs on multi-microprocessor system,...
详细信息
In this paper, a discriminant manifold learning method based on Locally Linear Embedding (LLE), which is named Locally Linear Representation Fisher Criterion (LLRFC), is proposed for the classification of tumor gene e...
详细信息
G-mixing and G-equicontinuity have an important significance in terms of theory and application. According to the definition of mixing and equicontinuity, we give the concept of G-mixing and G-equicontinuity in this p...
详细信息
暂无评论