Sentiment analysis in tourism domain has drawn much attention in past few years, which calls for more precise sentiment word embedding method. The article proposes a kernel optimization function for sentiment word emb...
详细信息
Sentiment analysis in tourism domain has drawn much attention in past few years, which calls for more precise sentiment word embedding method. The article proposes a kernel optimization function for sentiment word embedding. And the method aims at integrating the semantic information, statistics information and sentiment information and maintains the similarity between sentiment words in terms of sentiment orientation. The experiment result shows that the optimal sentiment vectors successfully extract the features in terms of sentiment information and the difference between concretization and abstraction of a sentiment words.
Join is one of the most important operations in data analytics systems. Prior works focus mainly on join optimization using GPUs, but little is known about performance impact on the MICs. In order to investigate poten...
详细信息
Attribute reduction is an inevitable problem in machine learning and statistical learning. To improve the traditional rough set reduction, statistical rough sets is then proposed by introducing random sampling into th...
详细信息
Semantic association represents group relationship among objects in linked data. Searching semantic associations is complicated, which involves the search of multiple objects and the search of their group relationship...
详细信息
Recently, listwise ranking-oriented collaborative filtering (CF) algorithms have gained great success in recommender systems. However, the ranked preference list may compromise the privacy of individuals. A notable pa...
详细信息
ISBN:
(纸本)9781509006809
Recently, listwise ranking-oriented collaborative filtering (CF) algorithms have gained great success in recommender systems. However, the ranked preference list may compromise the privacy of individuals. A notable paradigm for offering strong privacy guarantee is differential privacy. In this paper, we propose DPListCF, a differentially private algorithm based on ListCF (a state-of-art listwise CF algorithm). The main idea of DPListCF is to make both of the similarity calculation phase and rank prediction phase of ListCF satisfy differential privacy, by using input perturbation method and output perturbation method in the two phases respectively. Extensive experiments using two real datasets evaluate the performance of DPListCF, and demonstrate that the proposed algorithm outperforms state-of-art approaches.
This paper proposes a novel method for cross-modal retrieval. Different from vector (text)-to-vector (image) framework of the traditional cross-modal methods, we adopt a vector (text)-to-matrix (image) framework. We a...
详细信息
ISBN:
(纸本)9781509060689
This paper proposes a novel method for cross-modal retrieval. Different from vector (text)-to-vector (image) framework of the traditional cross-modal methods, we adopt a vector (text)-to-matrix (image) framework. We assume that compared with vectors, matrices can directly represent images and characterize the structure of feature space. Furthermore, we propose a Metric based on Multi-order spaces (MMs). Multi-order statistic features are used to represent images for enriching the semantic information, and metrics among the multi-spaces are jointly learned to measure the similarity between two different modalities. Specifically, there are three steps for MMs. First, we jointly use the bags of visual features (zero-order), mean (first-order) and covariance (second-order) to characterize each image. Second, considering that covariance matrices and vectors lie on a Riemannian manifold and an Euclidean space respectively, we embed multi-order spaces into their corresponding Hilbert spaces to reduce the heterogeneity among the original spaces. Finally, the similarity between two different modalities can be measured by learning multiple transformations from the different Hilbert spaces to a common subspace. The performance of the proposed method over the state-of-the-art has been demonstrated through the experiments on two public datasets.
Although Social Network Services (SNSs) continuance usage has recently emerged as an important issue in information systems adaption, the research into older adults' continuance intention towards SNS is still very...
详细信息
Construction of network-based academic resources is undergoing rapid development in this big data era, displaying a trend to replace digital libraries. This challenge calls for the construction of digital libraries to...
Construction of network-based academic resources is undergoing rapid development in this big data era, displaying a trend to replace digital libraries. This challenge calls for the construction of digital libraries to have big data related considerations, i.e., from resource construction aspect, we should expand the resource scope, aggrandize the breadth of resource integration, and increase the depth of the resource organization and processing;from technology application aspect, we should attach great importance to the semantic technology, emphasize the application of clustering technology, widely adopt data analysis technology, and elevate the retrieval technology level;from service aspect, we need to enrich services and product categories of digital libraries, and convert the passive, and general service mode to the proactive and personalized mode. The construction of next generation digital libraries must differ from the traditional way. Comprehensive service ideas should be established;comprehensive resource services should be provided;the conventional service mode and transmission form also need to be expanded;even the librarians of digital libraries are required to become data analysts.
IT product trial is an important method to promote consumers' attitude toward IT product. Affect is one of the most essential factors and components in determining consumers' attitude. However, previous studie...
详细信息
ISBN:
(纸本)9789860491029
IT product trial is an important method to promote consumers' attitude toward IT product. Affect is one of the most essential factors and components in determining consumers' attitude. However, previous studies pay more attention to the affective response to trial, which measure the holistic feeling about product trial experience. Affect in product trial is complex and multipartite that different parts may have different influence on consumers' attitude. Therefore, we build the Affective Response Framework to divide consumers' affect into affective response to product, affective response to behaviour, and affective response to environment. And then we analyse the relationship between three components of affective response and consumers' attitude. In order to test the hypothesis, we launch a field study of new IT product trial (an electroencephalogram product) among 205 college students. Results reveal that affective response to product and behaviour have positive influence on attitude toward product;affective response to behaviour and environment have positive influence on attitude toward trial.
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and thei...
详细信息
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and their employees have hired the enterprise cloud services, and put much important information in the cloud gradually. Cloud service systems have become the main targets of malicious attacks. However, the cloud computing technologies are still not perfect, and the management and maintenance of enterprise cloud services are more complex compared to traditional network services of cloud computing. So, enterprise cloud services are more likely to encounter some security problems, and the influenced scale of these security problems is broad. But there are few researches on the security of enterprise cloud services. In this paper, we analyze the software as a service(Saa S) enterprise cloud services and introduce the research status of security problems in cloud computing environment. Combining with the analysis of the characteristics and application architecture of Saa S enterprise cloud services, we propose the security problems analysis model, the analysis system architecture and the relational model. Our researches can support further research of the automatic generation of solutions and guide the deployment of security policies of Saa S enterprise cloud services.
暂无评论