One or few failure nodes will cause cascading failure in software network, which would bring about security issues. Thus, analyzing nodes becomes an indispensable aid in software security. In this paper, software exec...
详细信息
Vulnerability discovery is at the centre of attention in computer security. Most vulnerability detection methods need considerable human auditing, thus making vulnerability detection inefficient and unreliable. Simila...
详细信息
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ...
详细信息
Data grid provides a large amount of computing resources and storage space to handle data-intensive applications. Because of the limitation of available resources and the production of large-scale workload in grid, th...
详细信息
Friend recommendation is popular in social site to help people make new friends and expand their social networks. However, the conventional friend recommendation method is low accuracy for the sparsity of data and col...
详细信息
Several dynamic junction over-constrained parallel-parallel mechanisms are proposed in this paper with a new method based on graph theory synthesis. This kind of mechanism is the pivotal part of the equivalent mechani...
详细信息
We present a novel system that can transfer facial expressions from an actor to a non-human-like character. Compared with a lot of previous studies, our system requires no special light conditions or facial markers fo...
详细信息
Analyzing structure of a software system is not sufficient for understanding its functionality. Certain characteristics of software are often hidden in its structure and can only be discovered when the various executi...
详细信息
The energy consumption of virtualized data centers has grown very fast in last several years. Because a large number of hosts are running in an idle state, virtualized data centers waste a large amount of electric ene...
详细信息
Maximal frequent pattern mining usually adopts a global pattern growth way, and a maximal frequent pattern can be obtained unless most of its subsets are checked to be frequent. An algorithm for mining maximal frequen...
详细信息
暂无评论