Finding justifications plays an important role in the development and maintenance of ontologies. It helps users or developers to understand the entailments by presenting the minimal subsets of the ontology which are r...
详细信息
The problem of multi-label classification has attracted great interests in the last decade. Multi-label classification refers to the problems where an example that is represented by a single instance can be assigned t...
详细信息
Most application layer multicast (ALM) protocols build the delivery tree by the distributed way, which is necessary for large-scale group applications because of its good scalability. However, it is difficult for the ...
详细信息
ISBN:
(纸本)9781479975761
Most application layer multicast (ALM) protocols build the delivery tree by the distributed way, which is necessary for large-scale group applications because of its good scalability. However, it is difficult for the distributed way to obtain high performance. To address the above problem, we study a VM-assisted ALM tree optimization solution (called ALMTO). The proposed solution uses cloud virtual machines (VMs) to collect the structure information on the ALM tree, and uses a centralized way to effectively reduce average latency of the ALM tree built by the distribute way.
The law of equipments or products life is the calculation fundament of reliability indexes in power plant. Aim to how to determine the most fitted life distribution type, the linear regression and correlation coeffici...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, every hierarchical node is composed of perceptual nodes which provide resources with the same levels of security. More hierarchical nodes can be modeled as a set of partially ordered classes. With this mode, a deterministic key derivation algorithm is designed, which makes every user and perceptual node possesses a single key material to get some keys, and obtains the resources at the presented class and all descendant classes in the hierarchy. Furthermore, a mechanism of Merkle tree is introduced to guarantee secure and efficient multi-user key material derivation by independent of each hash link. Compared with previous proposals, the scheme is more suitable for multi-user to access resources of perceptual layer in IoT.
Location-aware devices and cloud computing services have triggered the widespread development of location-based applications. However, such applications require users to disclose their actual locations, which raises s...
详细信息
Location-aware devices and cloud computing services have triggered the widespread development of location-based applications. However, such applications require users to disclose their actual locations, which raises serious privacy concerns. As a kind of spatial transformation method, the standard Hilbert curve (SHC) is widely used in privacy preserving for spatial data. But there are still many limitations for SHC, such as high CPU cost, using the unified partition granularity and inability to support partial region authorization, etc. In this paper, we present a density-based space filling curve (DSC) for spatial data transformation, which partition the space based on the density of points of interest (POI) and supports partial authorization of the space, and need relatively low CPU cost. Our experiments show that the security risk of DSC is lower than that of SHC, and DSC provides better index building and range query processing performance than SHC.
In the composite service which runs for a long time under the heterogeneous and loose-coupled circumstance, the failure of service tends to occur. The transaction and recovery mechanism is urgently needed in order to ...
详细信息
Data-intensive applications, such as data mining and data visualization, need to deal with huge amount of data. Service-oriented architecture, on the other hand, offers a scalable and flexible framework to implement l...
详细信息
In this paper, we focus on efficient processing of XML keyword queries based on smallest lowest common ancestor (SLCA) semantics. For a given query Q with m keywords, we propose to use stable matches as the basis fo...
详细信息
In this paper, we focus on efficient processing of XML keyword queries based on smallest lowest common ancestor (SLCA) semantics. For a given query Q with m keywords, we propose to use stable matches as the basis for SLCA computation, where each stable match M consists of m nodes that belong to the m distinct keyword inverted lists of Q. M satisfies that no other lowest common ancestor (LCA) node of Q can be found to be located after the first node of M and be a descendant of the LCA of M, based on which the operation of locating a stable match can skip more useless nodes. We propose two stable match based algorithms for SLCA computation, i.e., BSLCA and HSLCA. BSLCA processes two keyword inverted lists each time from the shortest to the longest, while HSLCA processes all keyword inverted lists in a holistic way to avoid the problem of redundant computation invoked by BSLCA. Our extensive experimental results verify the performance advantages of our methods according to various evaluation metrics.
The retrieval and recommendation of social media have provided an immense opportunity to exploit the collective behavior of community users through linked multi-modal data, such as images and tags, where tags provide ...
详细信息
ISBN:
(纸本)9781479947164
The retrieval and recommendation of social media have provided an immense opportunity to exploit the collective behavior of community users through linked multi-modal data, such as images and tags, where tags provide context information, and images represent visual content. The stability of content information is more reliable than user contributed context information, which was ignored by many existing methods. In this paper, through discovering the latent feature space between visual features and context, we propose a novel approach for social image retrieval by imposing context regularization terms to constraint visual features. The method can effectively reflect the interior visual structure for social image representation. Experimental results on the NUS-WIDEOBJECT dataset demonstrate that the proposed approach obtains competitive performance compared with state-of-the-art methods.
暂无评论