Linear classifiers are of great significance in the classification field. In this paper, with meticulous studies on the linear classifiers, we gained a general framework for constructing fast trained linear classifier...
详细信息
To improve search efficiency and reduce unnecessary traffic in Peer-to-Peer (P2P) networks, this paper proposes a trust-based probabilistic search algorithm, called preferential walk (P-Walk). Every peer ranks its nei...
详细信息
ISBN:
(纸本)1595930515
To improve search efficiency and reduce unnecessary traffic in Peer-to-Peer (P2P) networks, this paper proposes a trust-based probabilistic search algorithm, called preferential walk (P-Walk). Every peer ranks its neighbors according to searching experience. The highly ranked neighbors have higher probabilities to be queried. Simulation results show that P-Walk is not only efficient, but also robust against malicious behaviors. Furthermore, we measure peers' rank distribution and draw implications.
Comic-like summaries exploit the narrative structure of comics to create intuitive and easily readable abstracts. However, real comics use complex composition techniques which are difficult to mimic in an unsupervised...
详细信息
This paper proposes a method which is not for summarization but for extracting multiple facets from a text according to the keyword sets representing readers' interests, so that readers can obtain the interested f...
详细信息
Smart sensing garments can extend the functionality of clothing beyond aesthetic and protective purposes. In contrast to skin-mounted sensors, garment-embedded sensor performance depends on fitting. In this work, we p...
详细信息
This paper discusses the improvement of premature convergence in genetic algorithm (GA) used for optimizing multimodal numerical problems. Mutation is the principle operation in GA for enhancing the degree of populati...
详细信息
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th...
详细信息
As Magnetic Resonance Imaging (MRI) is an important technology of radiological evaluation and computeraided diagnosis, the accuracy of the MR image segmentation directly influences the validity of following processing...
详细信息
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when ...
详细信息
Reversible data hiding in encrypted domain (RDH-ED) fortifies data security and privacy safeguards while upholding the original data’s integrity and accessibility. Current research on RDH-ED focuses on 2D images, whi...
详细信息
暂无评论