Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
Link Detection (abbr. LDT) is to determine whether two stories discuss the same topic in Topic Detection and Tracking (abbr. TDT) track. The key issue is to correctly measure the relevance between two stories. Most re...
详细信息
Link Detection (abbr. LDT) is to determine whether two stories discuss the same topic in Topic Detection and Tracking (abbr. TDT) track. The key issue is to correctly measure the relevance between two stories. Most researches on LDT use a series of independent words to describe stories (each story is a text specially discussing news), and the relevance between two stories is determined based on the percentage and weight of overlapping words between them. Although substantial improvement has been achieved, inadequate descriptions of word sense and semantics still have negative influences on the accuracy of LDT. In this paper we propose an online semantic tree, which is hierarchically constructed by the most relevant words extracted from previous story streams. In online semantic tree, word sense is described by a series of words in a sense closed-loop, and semantic relation among words is measured by depth and width of level that words locate in. In LDT, online semantic tree is built for each story, and the relevance between two stories is determined by measuring the KL divergence between their online semantic trees. The method performs quite well on TDT4 corpus. The Min Norm CDet of the method in testing is 0.2274 lower than that of the baseline.
In this paper, we propose an Inverse Depth Line (IDL) model of LiDAR data for traversable region segmentation. This model first organizes the disordered point cloud with a 2D structure array to store and index the poi...
详细信息
The traveling salesman problem (TSP) is among the most important combinatorial problems. Ant colony optimization (ACO) algorithm is a recently developed algorithm which has been successfully applied to several NP-hard...
详细信息
The traveling salesman problem (TSP) is among the most important combinatorial problems. Ant colony optimization (ACO) algorithm is a recently developed algorithm which has been successfully applied to several NP-hard problems, such as traveling salesman problem, quadratic assignment problem and job-shop problem. Association rule (AR) is the key in knowledge in data mining for finding the best data sequence. A new algorithm which integrates ACO and AR is proposed to solve TSP problems. Compare with the simulated annealing algorithm, the standard genetic algorithm and the standard ant colony algorithm, the new algorithm is better than ACO.
In his paper, Prof. Ye Dongyi pointed out that the reduction approach introduced by Hu Xiaohua etc. will give wrong result in some situation. In this paper we come to a conclusion by analysis that the reduction approa...
详细信息
Based on the analysis of color histogram for image retrieval, a new descriptor, bit-plane distribution feature(BPDF), is proposed in this paper. The image is firstly divided into eight bit-planes. Meantime, the Gray c...
详细信息
In general,Chinese event factuality is determined by the specific vocabularies and syntactic structures of *** Chinese event factuality corpus is to annotate these specific vocabularies and syntactic *** these informa...
详细信息
In general,Chinese event factuality is determined by the specific vocabularies and syntactic structures of *** Chinese event factuality corpus is to annotate these specific vocabularies and syntactic *** these information is raw and complex,it will result in high computation complexity and low correct rate if we use these information to compute factuality *** paper proposes a 3D representation of Chinese event factuality based on the annotated factual information in a Chinese event factuality *** also presents the transformation rules between the factual information and 3D representation and those between the 3D representation and event *** experimental results demonstrate the effectiveness of our 3D representation.
Fountain code is a class of graph-based linear erasure codes, which can effectively solve the problems such as network congestion and feedback cracking for its characteristics of rateless and can resume when interrupt...
详细信息
ISBN:
(纸本)9781479973408
Fountain code is a class of graph-based linear erasure codes, which can effectively solve the problems such as network congestion and feedback cracking for its characteristics of rateless and can resume when interrupted, and has a lower complexity of encoding and decoding. However, there are still some problems in the process of encoding and decoding, including the degree distribution structure may be destroyed, parameters of the generating matrix are not fixed, and it cannot recover source datas from the remaining encoded packets with no degree one. So, the basic theory of fountain codes from three aspects are introduced in this paper, i.e., degree distribution, encoding and decoding principles. Therefore the improved algorithms according to the above three aspects are presented. Simulation results show that the proposed algorithm is more efficient than the previous one.
This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009. The 42 full papers presented together with 26 short papers and the a...
详细信息
ISBN:
(数字)9783642006722
ISBN:
(纸本)9783642006715
This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009. The 42 full papers presented together with 26 short papers and the abstracts of 2 keynote speeches were carefully reviewed and selected for inclusion in the book. The topics covered are query processing, topic-based techniques, Web data processing, multidimensional data analysis, stream data processing, data mining and its applications, and data management support to advanced applications.
暂无评论