As more public cloud computing platforms are emerging in the market, a great challenge for these Infrastructure as a Server (IaaS) providers is how to measure the cost and charge the Software as a Service (SaaS) clien...
详细信息
According to the attributes of nodes and the linkages between them, most real-world complex networks could be assortative and disassortative. Community structures are ubiquitous in both types of networks. The ability ...
详细信息
In algorithm trading, computer algorithms are used to make the decision on the time, quantity, and direction of operations (buy, sell, or hold) automatically. To create a useful algorithm, the parameters of the algori...
详细信息
In algorithm trading, computer algorithms are used to make the decision on the time, quantity, and direction of operations (buy, sell, or hold) automatically. To create a useful algorithm, the parameters of the algorithm should be optimized based on historical data. However, Parameter optimization is a time consuming task, due to the large search space. We propose to search the parameter combination space using the MapReduce framework, with the expectation that runtime of optimization be cut down by leveraging the parallel processing capability of MapReduce. This paper presents the details of our method and some experiment results to demonstrate its efficiency. We also show that a rule based strategy after being optimized performs better in terms of stability than the one whose parameters are arbitrarily preset, while making a comparable profit.
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes ses...
详细信息
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes session boundary discrimination model (the binary classification tree) utilizing time interval and query likelihood on the basis of COBWEB. The model has prominently improved recall ratio, precision ratio and value F to more than 90 percent and particularly the value F for yes class rises compared with previous study. It is an incremental algorithm that can deal with large scale data, which will be perfectly applied into user interest mining. Owing to its good performance in session boundary discrimination, the application of the model can serve as a tool in fields like personalized information retrieval, query suggestion, search activity analysis and other fields which have connection with search results improvement.
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they ma...
详细信息
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they may instead pay more attention to fresh information. This demand poses challenges to traditional search engines, which concern more about relevance and importance of web pagesA search engine compresses three modules: crawler, indexer and searcherChanges are needed for all these three parts to improve search engine's freshness. This paper investigates the first part of search engine – crawler, we analyze the requirements for real-time crawler, and propose a novel real-time crawler based on more accurate estimation of refresh timeExperimental results demonstrate that the proposed real-time crawler can help search engine improve its freshness.
This paper proposes a novel method for breast cancer diagnosis using the features generated by genetic programming (GP). We developed a new individual combination pattern (Composite individual genetic programming) whi...
详细信息
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,...
详细信息
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel sc...
详细信息
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel scheme called index inner table used in the reader. Index inner table may efficiently utilize calculation capacity and storage space of the reader to construct a filter which can sift authentication applications from tags, thus, it could alleviate workload of the backend server and resist replay attack from an adversary. The structure, filter algorithm, update and sorting algorithm, eraser algorithm of index inner table would be introduced detailedly in this paper. In addition, this protocol is particularly suitable for the low-cost RFID systems;the security and performance of this protocol are analyzed as well.
The speech interaction in-vehicle was mainly realized by the speech recognition. The human-machine interaction around was usually disturbed by the noise, and the speech received by the receiver was not the original pu...
详细信息
Well scalability is an important requirement for RFID systems, how to alleviate workload of the backend server so as to deal with large scale tags becomes a challenging research object. Index inner table used in RFID ...
详细信息
Well scalability is an important requirement for RFID systems, how to alleviate workload of the backend server so as to deal with large scale tags becomes a challenging research object. Index inner table used in RFID reader can efficiently utilize calculation capacity and storage space of a reader to construct a filter which can sift authentication applications from tags, thus, alleviate workload of the backend server and resist replay attack from an adversary. In this paper, revised index inner table is proposed, then modified structure and filter algorithm, update and sorting algorithm, eraser algorithm of index inner table can be applied in different filter modes according to various factual application environments.
暂无评论