Canonical Artificial bee colony(ABC) algorithm with a single species is insufficient to extend the diversity of solutions and may be trapped into the local optimal solution. This paper proposes a new co-evolutionary A...
详细信息
Canonical Artificial bee colony(ABC) algorithm with a single species is insufficient to extend the diversity of solutions and may be trapped into the local optimal solution. This paper proposes a new co-evolutionary ABC algorithm(HABC) based on Hierarchical communication model(HCM). HCM combines advantages of global and local communication pattern. With adjustment strategies on species and groups, HCM can reduce the computational complexity dynamically. Performance tests show that the HABC algorithm exhibit good performance on accuracy, robustness and convergence speed. Compared with ABC and Integrated co-evolution algorithm(IABC),HABC performs better in solving complex multimodal functions.
The performance of distributed video coding (DVC) relies heavily on the quality of the side information (SI), and better performance can be expected if multiple SIs are employed. In this paper, we consider the scenari...
详细信息
While hardware transactional memory (HTM) has recently been adopted to construct efficient concurrent search tree structures, such designs fail to deliver scalable performance under contention. In this paper, we first...
详细信息
The Traveling Salesman Problem (TSP) belongs to the class of NP-hard optimization problems. Its solving procedure is complicated, especially for large scale problems. In order to solve the large scale TSPs efficiently...
详细信息
With the rapid development of computer technology, web services has been widely used. In these applications, the uncertain data is in the form of streams. In view of this kind of situation, present a new generalized d...
详细信息
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally p...
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally published electronically on the publisher’s internet portal.
To solve the two problems that users are independent of each other, it does not form indirect trust relationship between user and cloud service providers, and the traditional method of quantitative measures user's...
详细信息
ISBN:
(纸本)9789811100086
To solve the two problems that users are independent of each other, it does not form indirect trust relationship between user and cloud service providers, and the traditional method of quantitative measures user's granularity so small. This paper introduces model of assessment of trustworthy user based on fuzzy theory. This model divides the range of trustworthy area based on fuzzy theory in mathematical thought in moderate granularity, and introduces the impact factor that is the neighboring access interval, solves the problem of establishing between user and service providers that is indirect trust. Finally, this paper mines the important influence factors through the simulated experiment, proves this model can measure trustworthy user in directly.
Generative Summarization is of great importance in understanding large-scale textual data. In this work, we propose an attention-based Tree-LSTM model for sentence summarization, which utilizes an attention-based synt...
详细信息
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en...
详细信息
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key encryption". It does this by signing and *** a message in a single step. An aggregate signcryption scheme allows individual signcryption ciphertexts intended for the same recipi- ent to be aggregated into a single (shorter) combined ciphertext without losing any of the security guarantees. We present an aggregate signcryption scheme in the identity-based setting using multilinear maps, and provide a proof of security in the standard model. To the best of our knowledge, our new scheme is the first aggregate signcryption scheme that is secure in the standard model.
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problem...
详细信息
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problems for search engines,and many methods have been proposed for spam *** exploit the content features of non-spam in contrast to those of *** content features for non-spam pages always possess lots of statistical regularities; but those for spam pages possess very few statistical regularities,because spam pages are made randomly in order to increase the page *** this paper,we summarize the regularities distributions of content features for non-spam pages,and propose the calculating probability formulae of the entropy and independent n-grams ***,we put forward the calculation formulae of multi features *** them,the notable content features may be used as auxiliary information for spam detection.
暂无评论