Search engines and web crawlers can not access the Deep Web directly. The workable way to access the hidden database is through query interfaces. Automatic extracting attributes from query interfaces and translating q...
详细信息
In this paper, a hybrid algorithm named DPSOSA is proposed to find near-to-optimal elimination orderings in Bayesian networks. DPSO-SA is a discrete particle swarm optimization method enhanced by simulated annealing. ...
详细信息
In this paper, a hybrid algorithm named DPSOSA is proposed to find near-to-optimal elimination orderings in Bayesian networks. DPSO-SA is a discrete particle swarm optimization method enhanced by simulated annealing. Computational tests show that this hybrid method is very effective and robust for the elimination ordering problem.
To find an optimal elimination ordering for Bayesian networks, a multi-heuristic-based ant colony system named MHC-HS-ACS is proposed. MHC-HS-ACS uses a set of heuristics to guide the ants to search solutions. The heu...
详细信息
To find an optimal elimination ordering for Bayesian networks, a multi-heuristic-based ant colony system named MHC-HS-ACS is proposed. MHC-HS-ACS uses a set of heuristics to guide the ants to search solutions. The heuristic set can evolve with the searching procedure in an adaptive way. MHC-HS-ACS also utilizes a heuristic-based local search to accelerate its convergence. Computational experiments show that MHC-HS-ACS can find very high quality solutions.
According to the characteristics of the optimal elimination ordering problem in Bayesian networks, a heuristic-based genetic algorithm, a cooperative coevolutionary genetic framework and five grouping schemes are prop...
详细信息
According to the characteristics of the optimal elimination ordering problem in Bayesian networks, a heuristic-based genetic algorithm, a cooperative coevolutionary genetic framework and five grouping schemes are proposed. Based on these works, six cooperative coevolutionary genetic algorithms are constructed. Numerical experiments show that these algorithms are more robust than other existing swarm intelligence methods when solving the elimination ordering problem.
Improving energy efficiency of mass storage systems has become an important and pressing research issue in large HPC centers and data centers. New energy conservation techniques in storage systems constantly spring up...
Improving energy efficiency of mass storage systems has become an important and pressing research issue in large HPC centers and data centers. New energy conservation techniques in storage systems constantly spring up; however, there is a lack of systematic and uniform way of accurately evaluating energy-efficient storage systems and objectively comparing a wide range of energy-saving techniques. This research presents a new integrated scheme, called TRACER, for evaluating energy-efficiency of mass storage systems and judging energy-saving techniques. The TRACER scheme consists of a toolkit used to measure energy efficiency of storage systems as well as performance and energy metrics. In addition, TRACER contains a novel and accurate workload-control module to acquire power varying with workload modes and I/O load intensity. The workload generator in TRACER facilitates a block-level trace replay mechanism. The main goal of the workload-control module is to select a certain percentage (e.g., anywhere from 10% to 100%) of trace entries from a real-world I/O trace file uniformly and to replay filtered trace entries to reach any level of I/O load intensity. TRACER is experimentally validated on a general RAID5 enterprise disk array. Our experiments demonstrate that energy-efficient mass storage systems can be accurately evaluated on full scales by TRACER. We applied TRACER to investigate impacts of workload modes and load intensity on energy-efficiency of storage devices. This work shows that TRACER can enable storage system developers to evaluate energy efficiency designs for storage systems.
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Seco...
详细信息
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Second, we extend HMA algorithm and put forward HFMA algorithm. In HFMA, We only need collect data inside filter and aggregate influence coefficient during sampling period. Base station can compute median result according to the sample data inside filter and influence coefficient aggregation value. Experimental results have shown that HFMA outperforms Naive algorithm and HMA algorithm and can prolong the lifetime of sensor network.
Based on FP-tree algorithm, this article introduced the method of multi-thread processing and a Multi-Threaded Paralleled frequent item-set mining Algorithm - MTPA was proposed. It has been applied to an enterprise hu...
详细信息
Based on FP-tree algorithm, this article introduced the method of multi-thread processing and a Multi-Threaded Paralleled frequent item-set mining Algorithm - MTPA was proposed. It has been applied to an enterprise human resources management system. Through the experiments of paralleled mining by using increasing multi-thread processing, it has been proved that MTPA which on the condition of multi-core processors can improve the efficiency of frequent item-set mining effectively.
Vehicular ad hoc networks (VANETs) are designed to improve traffic safety and efficiency. To this end, the traffic communication must be authenticated to guarantee trustworthiness for guiding drivers and establishing ...
Vehicular ad hoc networks (VANETs) are designed to improve traffic safety and efficiency. To this end, the traffic communication must be authenticated to guarantee trustworthiness for guiding drivers and establishing liability in case of traffic accident investigation. Cryptographic authentication techniques have been extensively exploited to secure VANETs. Applying cryptographic authentication techniques such as digital signatures raises challenges to efficiently store signatures on messages growing with time. To alleviate the conflict between traffic liability investigation and limited storage capacity in vehicles, this paper proposes to aggregate signatures in VANETs. Our proposal can preserve privacy for honest vehicles and trace misbehaving ones, and provides a practical balance between security and privacy in VANETs. With our proposal, cryptographic witnesses of safety-related traffic messages can be significantly compressed so that they can be stored for a long period for liability investigation. Our proposal allows a large number of traffic messages to be verified as if they were a single one, which speeds up the response of vehicles to traffic reports.
With the rapid development of vehicle electronic systems, the vehicle software failure rate has also been rising over time. Providing the convenient and effective maintenance on the vehicle software has become a funda...
详细信息
With the rapid development of vehicle electronic systems, the vehicle software failure rate has also been rising over time. Providing the convenient and effective maintenance on the vehicle software has become a fundamental block constraining the progress of vehicle electronic industry. A trusted remote remediation framework for vehicle software is presented and realized to enable drivers to online upgrade version or fix bug without needing for driving the vehicles back to the factories or using the specific devices. In this framework, the trusted remediation server takes responsibility for managing and providing the patch programs and the trusted remediation client can download directly from the remediation server to upgrade programs or fix software errors, achieving the self-repair in complex vehicular networks.
One kind of semantic Web service modeling and reasoning method based on description logic with Boolean role constructors (SROIQB) was introduced. By using DL to figure out the hyponymy relationship between concepts in...
详细信息
One kind of semantic Web service modeling and reasoning method based on description logic with Boolean role constructors (SROIQB) was introduced. By using DL to figure out the hyponymy relationship between concepts in domain ontology and model Web service functional semantic in ServiceProfile, and define Boolean role expressions to describe the composition process in ProcessProfile respectively. Furthermore, Boolean role expression is introduced to describe all possible composition structures of atomic services and then semantic Web service composition can be regarded as a process of consistence checking and class subsumption computing reasoning on DL knowledge base. Thus the comparison and example validation show that introduced one kind of new and reasonable semantic Web service modeling and composition method in the framework of semantic Web by using SROIQB, which with more strong expressive capability and decidable type inference.
暂无评论