Unsupervised neural machine translation (UNMT) is beneficial especially for low resource languages such as those from the Dravidian family. However, UNMT systems tend to fail in realistic scenarios involving actual lo...
详细信息
Implementing runtime integrity measurement in an acceptable way is a big challenge. We tackle this challenge by developing a framework called Patos. This paper discusses the design and implementation concepts of our o...
详细信息
Recently there have been growing interests in the applications of wireless sensor networks. Given a query point, which is a value, find a set of K nodes whose values are nearest to this point. We call this query the v...
详细信息
Efficiently locating learning content and web services for adaptive and personalized online courses is a demanding research area. This paper identifies the key challenges that need to be addressed. An approach is then...
详细信息
Update management is very important for data integration systems. So update management in peer data management systems (PDMSs) is a hot research area. This paper researches on view maintenance in PDMSs. First, the d...
详细信息
Update management is very important for data integration systems. So update management in peer data management systems (PDMSs) is a hot research area. This paper researches on view maintenance in PDMSs. First, the definition of view is extended and the peer view, local view and global view are proposed according to the requirements of applications. There are two main factors to influence materialized views in PDMSs. One is that schema mappings between peers are changed, and the other is that peers update their data. Based on the requirements, this paper proposes an algorithm called 2DCMA, which includes two sub-algorithms: data and definition consistency maintenance algorithm% to effectively maintain views. For data consistency maintenance, Mork's rules are extended for governing the use of updategrams and boosters. The new rule system can be used to optimize the execution plan. And are extended for the data consistency maintenance algorithm is based on the new rule system. Furthermore, an ECA rule is adopted for definition consistency maintenance. Finally, extensive simulation experiments are conducted in SPDMS. The simulation results show that the 2DCMA algorithm has better performance than that of Mork's when maintaining data consistency. And the 2DCMA algorithm has better performance than that of centralized view maintenance algorithm when maintaining definition consistency.
Text-to-image synthesis refers to generating visual-realistic and semantically consistent images from given textual descriptions. Previous approaches generate an initial low-resolution image and then refine it to be h...
详细信息
Text-to-image synthesis refers to generating visual-realistic and semantically consistent images from given textual descriptions. Previous approaches generate an initial low-resolution image and then refine it to be high-resolution. Despite the remarkable progress, these methods are limited in fully utilizing the given texts and could generate text-mismatched images, especially when the text description is complex. We propose a novel finegrained text-image fusion based generative adversarial networks(FF-GAN), which consists of two modules: Finegrained text-image fusion block(FF-Block) and global semantic refinement(GSR). The proposed FF-Block integrates an attention block and several convolution layers to effectively fuse the fine-grained word-context features into the corresponding visual features, in which the text information is fully used to refine the initial image with more details. And the GSR is proposed to improve the global semantic consistency between linguistic and visual features during the refinement process. Extensive experiments on CUB-200 and COCO datasets demonstrate the superiority of FF-GAN over other state-of-the-art approaches in generating images with semantic consistency to the given texts.
Active database systems use situation-action rules to define which action has to be taken vt hen a particular situation occurs. Situation diagrams, which are introduced in this paper, provide a high-level graphical re...
详细信息
ISBN:
(纸本)354061656X
Active database systems use situation-action rules to define which action has to be taken vt hen a particular situation occurs. Situation diagrams, which are introduced in this paper, provide a high-level graphical representation of situations for the conceptual design of active object-oriented databases. A situation is specified declaratively as a graphical query with temporal and logical conditions over members of object classes, event classes, and interval classes.
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in unt...
详细信息
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in untrustworthy ***,these features of this technology are also easily exploited by unscrupulous individuals,a typical example of which is the Ponzi scheme in *** negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been *** solve this problem,we propose a detection model for detecting Ponzi schemes in smart contracts using *** this model,our innovation is shown in two aspects:We first propose to use two bytes as one characteristic,which can quickly transform the bytecode into a high-dimensional matrix,and this matrix contains all the implied characteristics in the ***,We innovatively transformed the Ponzi schemes detection into an anomaly detection ***,an anomaly detection algorithm is used to identify Ponzi schemes in smart *** results show that the proposed detection model can greatly improve the accuracy of the detection of the Ponzi scheme ***,the F1-score of this model can reach 0.88,which is far better than those of other traditional detection models.
Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources. This presents a significant challenge a...
详细信息
暂无评论