W384 Mining is defined as the use of Data Mining techniques to extract information from web, automatically. Web Mining techniques are widely used to observe user patterns accessing the web server logs. Web logs are th...
详细信息
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** there are various types of nodes and interactions in LBSNs,they can be treated as Heterogeneous Information network(HIN) where multiple semantic meta-paths can be *** by the recent success of meta-path context based embedding techniques in HIN,in this paper,we design a deep neural network framework leveraging various meta-path contexts for fine-grained user location *** results based on two real-world LBSN datasets demonstrate the best effectiveness of the proposed approach using various evaluation metrics than others.
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction,...
详细信息
Physical-layer key generation (PKG) in multi-user massive MIMO networks faces great challenges due to the large length of pilots and the high dimension of channel matrix. To tackle these problems, we propose a novel m...
详细信息
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is ge...
详细信息
Let F2m be a finite field of 2m elements, and R = F2m[u]/huki = 2m + u2m + . . . + uk-1F2m (uk = 0) where k is an integer satisfying k ≥ 2. For any odd positive integer n, an explicit representation for every self-du...
Human activity recognition (HAR) is indispensable for human-machine interaction. Related applications in many fields, e.g. medical, military, and security, facilitate and even change the lives of human beings. However...
详细信息
Simon’s problem is an essential example demonstrating the faster speed of quantum computers than classical computers for solving some problems. The optimal separation between exact quantum and classical query complex...
详细信息
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien...
详细信息
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficient conditions for two compressing sequences to be s-uniform with α provided that the compressing map is of the form φ(x;, x;,..., x;) = g(x;) + η(x;, x;,..., x;), where g(x;) is a permutation polynomial over Z/(p) and η is an(e-1)-variable polynomial over Z/(p).
Community detection is a significant research direction in the research of social networks. To improve the quality of seeds selection and expansion, we propose an influence seeds extension overlapping community detect...
详细信息
暂无评论