In this paper, we focus on examining the effects of Ad-context on the click-Through rate (CTR) for the online advertising. Many researches have shown that ad-context congruity is a key factor to CTR, but the features ...
详细信息
Recently there have been growing interests in the applications of wireless sensor networks. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an ef...
详细信息
Nowadays, WSMO (Web Service Modeling Ontology)1 has received great attention of academic and business communities, since its potential to achieve dynamic and scalable infrastructure for web services is extracted. Ther...
详细信息
Music classification can be performed by classifying music according to its genre, style, mood, and others. Various methods have been implemented to automatically classify music. Naïve Bayes learning algorithm is...
详细信息
Heterogeneous Graphs (HGs) effectively model complex relationships in the real world through multi-type nodes and edges. In recent years, inspired by self-supervised learning (SSL), contrastive learning (CL)-based Het...
详细信息
NBSVM is one of the most popular methods for text classification and has been widely used as baselines for various text representation approaches. It uses Naive Bayes (NB) feature to weight sparse bag-of-n-grams repre...
详细信息
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation *** work has shown incorporating trust mechanism into traditional collaborativ...
详细信息
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation *** work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these *** argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender *** the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender *** analyze the attack problem,and find that "victim" nodes play a significant role in the ***,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender *** study of the defend method is done with the dataset crawled from Epinions website.
MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects for multimedia indexing techniques. In kNN search, MINDIST and MINMAXDIST was the most popular pruning metrics employed by MBR...
详细信息
Keyword Search Over Relational databases (KSORD) enables casual or Web users easily access databases through free-form keyword queries. Improving the performance of KSORD systems is a critical issue in this area. In...
详细信息
Keyword Search Over Relational databases (KSORD) enables casual or Web users easily access databases through free-form keyword queries. Improving the performance of KSORD systems is a critical issue in this area. In this paper, a new approach CLASCN (Classification, Learning And Selection of Candidate Network) is developed to efficiently perform top-κ keyword queries in schema-graph-based online KSORD systems. In this approach, the Candidate Networks (CNs) from trained keyword queries or executed user queries are classified and stored in the databases, and top-κ results from the CNs are learned for constructing CN Language Models (CNLMs). The CNLMs are used to compute the similarity scores between a new user query and the CNs from the query. The CNs with relatively large similarity score, which are the most promising ones to produce top-κ results, will be selected and performed. Currently, CLASCN is only applicable for past queries and New All-keyword-Used (NAU) queries which are frequently submitted queries. Extensive experiments also show the efficiency and effectiveness of our CLASCN approach.
Numerous high-performance updatable learned indexes have recently been designed to support the writing requirements in practical systems. Researchers have proposed various strategies to improve the availability of upd...
详细信息
暂无评论