On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, ...
详细信息
On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, and often redundant lawyer information, we propose a new information integration method using multi-source information cross-validation. Based on the unified integrated data, a lawyer recommendation system is built. Several key technologies are presented and evaluated, including the multi-source information acquisition and validation. Experimental results indicate the key techniques used in the system are effective for lawyer information integration and recommendation.
Big data analysis is a main challenge we meet recently. Cloud computing is attracting more and more big data analysis applications, due to its well scalability and fault-tolerance. Some aggregation functions, like SUM...
详细信息
Big data analysis is a main challenge we meet recently. Cloud computing is attracting more and more big data analysis applications, due to its well scalability and fault-tolerance. Some aggregation functions, like SUM, can be computed in parallel, because they satisfy distributive law of addition. Unfortunately, some of statistical functions are not naturally parallelizable. That means they do not satisfy distributive law of addition. In this paper, we focus on percentile computing problem. We proposed an iterative-style prediction-based parallel algorithm in a distributed system. Prediction is done through a sampling technique. Experiment results verify the efficiency of our algorithm.
Recommender systems have been accepted as a vital application on the web by offering product advice or information that users might be interested in. Despite its success, similarity-based collaborative filtering suffe...
详细信息
More and more literature has been written on electronic records management (ERM) in e-government in recent three years, however, much is limited to experiences of one country with more focus on electronic records mana...
详细信息
More and more literature has been written on electronic records management (ERM) in e-government in recent three years, however, much is limited to experiences of one country with more focus on electronic records management systems (ERMS). This paper aims to investigate current trends and future directions of ERM including ERMS in e-government with more focus on comprehensive approaches internationally. Representative shows current ERMS have limitations either from IT perspectives or records and archives management perspectives managing records as data. Future research is called for more concerns of e-government and more involvement in efficient civil service. Case studies of representative policies, regulations, best practices guidelines from Australia, Canada, New Zealand, UK and U.S show challenges of ERM in e-government are getting more and more recognized in information risk, data governance and efficient civil service. Current trends of ERM in e-government are toward multidisciplinary and collaborative approaches to ERM managing records as information resources and business asset. Findings indicate that future directions of ERM in e-government would be toward meta-synthesis management at both organizational and national level, with integration concerns of collaboration, optimization and innovation of both ERM and e-government for civil service. The findings may have implications to be of use to both ERM and e-government professions internationally.
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is...
详细信息
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is a method by which the packaging relationship of objects amounts to testing whether one object is an prefix of the other, whereas the region numbering scheme is a method by which an ancestor query amount to an interval containment test on the labels. This paper first presents a mixed-encoding scheme based on Huffman algorithm, then propose a variant of this encoding scheme in which new "virtual nodes" are involved in order to improve the stability of encoding. Our experiments prove that the mixed-based encoding scheme is effective due to the enhancement of update performance and query efficiency.
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on large-scale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems...
详细信息
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on large-scale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems, a collaborative scheduling process based on manufacturing cells is designed. Moreover, focused on the coupling problem in scheduling process in the context of cellular manufacturing, a decomposition method is suggested to achieve the decomposition of cross-cell jobs. Finally, the whole scheduling process is simplified through redefining the environment of cellular manufacturing.
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on largescale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems,...
详细信息
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system....
详细信息
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. With the support of changed LS 2 , we model three types of isolation. Moreover, we formally analyze the integrity measurement property of TrustVisor proposed recently which provides the isolated execution environment for security-sensitive code.
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re...
详细信息
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation requirement frequently, the massive delay is inevitable. Without the modification to TPM, we propose Batch Integrity Report Protocol (BIRP) to overcome the performance bottleneck. B-IRP bundles these requirements in interval as a batch requirement, and creates the response messages for these requirements with one expensive TPM operation. Discussion shows that B-IRP has improved the performance without loss of security.
暂无评论