A Top-k aggregate query ranks groups of tuples by their aggregate values, sum or average for example, and returns k groups with the highest aggregate values. We propose a dynamic programming based method to process un...
详细信息
An effective way to optimize XML queries is to minimize XML queries. In this paper, we improve redundance elimination in XPath queries greatly by incorporating two novel kinds of constraints: parent constraint and sib...
详细信息
An effective way to optimize XML queries is to minimize XML queries. In this paper, we improve redundance elimination in XPath queries greatly by incorporating two novel kinds of constraints: parent constraint and sibling constraint, and by extending the tractable fragment to include descendant-or-self axis. The two novel kinds of constraints, together with child constraint and descendant constraint, form a family of constraints, which complicate the problem but offer possibilities for further minimization. Two techniques, tree augmentation and simulation augmentation, are employed to cope with constraints. We elaborate on the minimizing algorithms and running efficiencies both in the absence and in the presence of various kinds of constraints.
Reliable telecommunication applications in future need the supports from replication real-time main memory databases. In order to improve recovery performance and provide predictable recovery, this paper proposes a ne...
详细信息
Finding credible pages is a challenging problem on the Web. Our key observation in this paper is that credible pages usually link to credible content-related pages, which is different from a normal page usually links ...
详细信息
The technical analysis and machine learning have been integrated in stock trading signal forecasting. And it has been proved that there are some weaknesses in technical analysis because of the complex environment in t...
详细信息
The technical analysis and machine learning have been integrated in stock trading signal forecasting. And it has been proved that there are some weaknesses in technical analysis because of the complex environment in the stock market. In our prediction system, web news media sentiment analysis is regarded as a supplementary way to cover the shortage of technical analysis. It is considered to bring the stock market sentiment which reflects the subjective information of investors into the prediction system. Web news media sentiment indicators (WNMS) are designed to bring the information about stock market sentiment in our system. The WNMS is generated by analyzing the variance of sentiment elements from the news in the Stock Timely Rain Sector of Sina Finance and Economics Website and it is imported into the prediction system as features combined with common feature indicators (CFI). GMKL is applied to establish the relationship between the trading signals generated by piecewise linear representation (PLR) and the features of the trading signals (SCFI). Comparative experiments are adopted in nine stocks from Shanghai and Shenzhen Stock Exchange to determine the effect of PLR-GMKL and WNMS in prediction. From the aspects of the prediction accuracy and the profit, the final comparative results show that the PLR-GMKL model performs better than the PLR-WSVM model. And the prediction system performs best when adding WNMS into features and using PLRGMKL model.
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p...
详细信息
ISBN:
(纸本)9781450305648
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. To address these issues, we start our work by analyzing the technical details of 2,600 malware samples one by one and performing experiments over two types of MAC enforced operating systems. Based on the preliminary studies, we design a novel MAC model incorporating intrusion detection and tracing in a commercial operating system, named Tracer, in order to disable malware on hosts while offering good compatibility to existing software and good usability to common users who are not system experts. The model conceptually consists of three actions: detecting, tracing and restricting suspected intruders. One novelty is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviors, where intruders represent processes and executables that are potential agents of a remote attacker. Our prototyping and experiments on Windows show that Tracer can effectively defeat all malware samples tested via blocking malware behaviors while not causing a significant compatibility problem. Copyright 2011 ACM.
knowledge base question generation (KBQG) aims to generate natural language questions from a set of triplet facts extracted from KB. Existing methods have significantly boosted the performance of KBQG via pre-trained ...
详细信息
Schema summarization on large-scale databases is a challenge. In a typical large database schema, a great proportion of the tables are closely connected through a few high degree tables. It is thus dificult to separat...
详细信息
It is insufficient to search temporal text by only focusing on either time attribute or keywords today as we pay close attention to the evolution of event with time. Both temporal and textual constraints need to be co...
详细信息
ISBN:
(纸本)9781450325981
It is insufficient to search temporal text by only focusing on either time attribute or keywords today as we pay close attention to the evolution of event with time. Both temporal and textual constraints need to be considered in one single query, called Top-k Interval keyword Query (TIKQ). In this paper, we presents a cloud-based system named INK that supports efficient execution of TIKQs with appropriate effectiveness on Hadoop and HBase. In INK, an Adaptive Index Selector (AIS) is devised to choose the better execution plan for various TIKQs adaptively based on the proposed cost model, and leverage two novel hybrid index modules (TriI and IS-Tree) to combine keyword and interval filtration seamlessly.
In this paper, by strict mathematic reasoning, we discover the relation between the similarity relation and lower approximation. Based on this relation, we design a fast algorithm to build a rule based fuzzy rough cla...
详细信息
暂无评论