We propose a model for a class of web services which are powered by relational databases and annotated by social commitment. Our model can be viewed as an extension of WSDL specification where schemas of service opera...
详细信息
Brain-computer interface (BCI) is a new way for man-machine interaction with wide applications, in which steady-state visual evoked potentials (SSVEP) is a promising option. However, many characteristics of SSVEP show...
详细信息
The problem of "rich topics get richer"(RTGR) is popular to the topic models,which will bring the wrong topic distribution if the distributing process has not been *** standard LDA(Latent Dirichlet Allocatio...
详细信息
The problem of "rich topics get richer"(RTGR) is popular to the topic models,which will bring the wrong topic distribution if the distributing process has not been *** standard LDA(Latent Dirichlet Allocation) model,each word in all the documents has the same statistical *** fact,the words have different impact towards different *** the guidance of this thought,we extend ILDA(Infinite LDA) by considering the bias role of words to divide the *** propose a self-adaptive topic model to overcome the RTGR problem *** model proposed in this paper is adapted to three questions:(1) the topic number is changeable with the collection of the documents,which is suitable for the dynamic data;(2) the words have discriminating attributes to topic distribution;(3) a selfadaptive method is used to realize the automatic *** verify our model,we design a topic evolution analysis system which can realize the following functions:the topic classification in each cycle,the topic correlation in the adjacent cycles and the strength calculation of the sub topics in the *** experiment both on NIPS corpus and our self-built news collections showed that the system could meet the given demand,the result was feasible.
We present a novel audio information hiding scheme based on robust message authentication code (rMAC). By combining coefficient quantization based information hiding scheme with rMAC and chaotic encryption, proposed s...
详细信息
With the rapidly growing amount of information available on the internet, recommender systems become popular tools to promote relevant online information to a given user. Although collaborative filtering is the most p...
详细信息
Failure handling of business transactions is essential in E-Business *** paper extends the service process specification proposed in a contract-centered constraint-based service modelling framework with failure handli...
详细信息
ISBN:
(纸本)9781467349994
Failure handling of business transactions is essential in E-Business *** paper extends the service process specification proposed in a contract-centered constraint-based service modelling framework with failure handling *** failure in process model,generalized failure such as QoS violation can be modelled in *** semantics for failure handling in E-Business services as well as policies are discussed via a state transition system.A virtual machine is built for contracting and executing of services under this framework.
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into account. However, the network conditions will obviously influence the...
详细信息
With the rapid development of the technology of group broadcast, distributed computation and wireless network, how to construct a secure Group Key Exchange (GKE) protocol for a number of participants on channels is dr...
详细信息
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into ***,the network conditions will obviously influence the efficiency of...
详细信息
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into ***,the network conditions will obviously influence the efficiency of a protocol such as the time delay and the overhead considering the packet loss rate or something *** adjusting the parameters adaptively to achieve the ideal state with the dynamic network is *** achieve a high authentication rate and adapt to the changeable and unstable network environment,we proposed a multicast data origin authentication protocol which is adaptive depending on the packet error rates as well as the time delay,and is robust against the packet loss and *** model can estimate a more appropriate packet error rate and make the time delay lower according to the feedback values got from the receivers using the Markov chain so that it can be ***’s more,the IDA (information Dispersal Algorithm) and the Merkle HASH tree are also combined to resist the packet loss or *** strategy is especially efficient in terms of not only the adaptation of dynamic network but also the shortcut of overhead and delay,because the reliable intelligent algorithm is included in and only the necessary parts are involved in to authenticate.
The self-healing ability is very important for service-oriented systems in a highly dynamic environment. Case-based reasoning is adopted to cope with the component services failing to meet with the functional and nonf...
详细信息
暂无评论