In order to fully utilize the minimum support threshold to prune the rowset search space and avoid scanning the whole dataset in close-checking, we proposed two new data structure, Rowset-Itemset-Hybrid-Search-Tree (R...
详细信息
In order to fully utilize the minimum support threshold to prune the rowset search space and avoid scanning the whole dataset in close-checking, we proposed two new data structure, Rowset-Itemset-Hybrid-Search-Tree (RIHS-Tree) and Frequent-Closed-Itemset-Rowset-Tree (FCIR-Tree). The former stores the rowsets which share common rowid prefixes, according to some predefined order of rowids. Each path from the root node to the leaf node represents a rowset in which the rowids increase. The later also stores the large rowsets which also share common rowid prefixes. The corresponding closed itemsets are stored in the nodes carrying the last rowids in rowsets. Moreover, a new algorithm, RIHS-Tree-based algorithm for mining frequent closed patterns (FCIM-RIHS), is proposed. We translate the whole dataset into a transposed table, construct RIHS-Tree according to the rowsets in the transposed table and use a bottom-up search strategy to traverse RIHS-Tree. In the process of mining, we use the rowsets-inclusion strategy to implement pattern growth and then obtain large rowsets with their corresponding frequent closed itemsets. In FCIR-Tree, if the nodes in the subtree rooted by the nodes carrying the last rowid in the rowsets do not contain the found itemsets, the found itemsets are frequent closed itemsets. The experiment results with dataset demonstrate that FCIM-RIHS has highly efficiency.
Relighting a portrait in a single image is still a challenging problem, particularly when only a single artistic reference photograph or painting is provided In this paper, we propose an artistic illumination transfer...
详细信息
Panorama has the full directional view of the scene and can provide an object vision persistently from its emerging to vanishing except occlusion. Though, traditional tracking algorithms are apt to fail since the obje...
详细信息
As regard to improve the efficiency of grouping aggregation calculation, the data is compressed by using binary encoding, and the dimension hierarchical grouping attribute set encodings of each dimension table are cal...
详细信息
In this paper, we present an image tagging framework based on multiple feature tag relevance learning (MFTRL). First, in specific feature space, each training image is encoded as a sparse linear combination of other t...
详细信息
According to the classical rough set, the attribute reduction set may be far from satisfactory due to the non-existence of core in the attribute reduction process of decision table. Aiming at this issue, this paper pu...
详细信息
We articulate a novel approach to geometric model completion via interactive sketches in this ***,the initial incomplete model (with holes) is decomposed into a base model and a high-frequency component,which represen...
详细信息
We articulate a novel approach to geometric model completion via interactive sketches in this ***,the initial incomplete model (with holes) is decomposed into a base model and a high-frequency component,which represents global rough shape and geometric details,*** then repair the base model via smooth hole-filling,and compute the geometry detail image using high frequency *** novel element of our approach is that we allow users to interactively sketch a few structural curves that span across hole regions,with a goal to repair both local geometric details and global *** the help of local parameterization,we convert detailed geometry into gradient-domain images which can propagate along user-specified *** integrating recovered gradient-domain images and base shape,we can generate a complete model that faithfully recovers both global structure and local *** salient contribution of this paper is the unified approach for user interaction,global structure,and geometry details towards high-fidelity model *** demonstrate our new approach using a number of examples that exhibit salient global structure as well as local geometry details.
During the process of real-time multi-resolution terrain rendering, avoiding cracks between LOD (Level of Detail) has always been a tedious task that requires extra complicated handling. In this paper, we propose a no...
详细信息
Policy is an essential part of computer network defense, which also has important guidance effect in the deployment, implementation, and configuration of the defense system. Thus, the possibility of conflicts existing...
详细信息
ISBN:
(纸本)9781467348065
Policy is an essential part of computer network defense, which also has important guidance effect in the deployment, implementation, and configuration of the defense system. Thus, the possibility of conflicts existing in defense policies is becoming more and more crucial for ensuring the security of policies themselves. In this paper, we use a computer network defense policy specification language called CNDPSL, according to a model called CNDPM, to describe computer network defense policies, which can provide a uniform method of specifying policies of protection, detection and response. First, this article analyses conflicts existing in defense policies and shows the classification of these conflicts. Then, it gives a computer network defense policy detection model. Finally, this article shows a prototype system of computer network defense policy conflict detection, and validates the effectiveness of the prototype system with experiments.
As the improvement of the significance of human's intention in human-computer interaction, attentions should be paid to the research on CND decision theory and technology. Clearly defined CND intention with a form...
详细信息
ISBN:
(纸本)9781467348065
As the improvement of the significance of human's intention in human-computer interaction, attentions should be paid to the research on CND decision theory and technology. Clearly defined CND intention with a formal definition is a basic activity in the process of CND decision. In this paper, we define the concept of CND intention, which includes formal descriptions of its extension and intension, and presented detailed components and relations between them. Based on this definition, a formal description language of CND intention CNDIDL is proposed to describe the content of CND intention. We present the main accidence and syntax of CNDIDL, and verify the validity of the language with an experiment in a concrete network scenario. The result shows that CNDIDL has powerful ability of describing human's subjective requirement of CND, which remedies the defect of CND decision in the description of human's high level intention.
暂无评论