In this paper, we address the problem of personalized next Point-of-interest (POI) recommendation which has become an important and very challenging task for location-based social networks (LBSNs), but not well studie...
详细信息
Test case prioritization is a technique to schedule the test case in order to maximize some objective function. Early fault detection can provide a faster feedback generating a scope for debuggers to carry out their t...
详细信息
We propose an algorithm of automatically identifying maximal-length evaluation (MEP) based on statistics and rules. The principle of the algorithm is that transform the problem of evaluation phrase recognition into a ...
详细信息
We propose an algorithm of automatically identifying maximal-length evaluation (MEP) based on statistics and rules. The principle of the algorithm is that transform the problem of evaluation phrase recognition into a sequence tagging problem, use conditional random fields model for recognizing simple structure phrase of evaluation, and then automatically identify MEP with complex structure based on the establishment and application of the rule base. The testing precision and recall rate reached 72.38%. Based on the work above, we proposed a new algorithm of automatically extracting collocation of evaluation based on rules and make the automatic extraction of evaluation object and the MEP become reality. Experiment was conducted at Netease car portal for test, and got a higher accuracy rate.
In Large Scale database system storage system, Raid 6 is to be used to tolerate failure disks and provide high reliability with the support of different codes. In large system there is no any risk of data loss or disk...
详细信息
In Large Scale database system storage system, Raid 6 is to be used to tolerate failure disks and provide high reliability with the support of different codes. In large system there is no any risk of data loss or disk failure but in case of disaster or suddenly something happened with the risk of data failure Raid can be tolerate more than three disk failure. In this paper we optimize the partial stripe write with the erasure correcting code. Moreover, some erasure correcting can be evaluate or optimize on different codes in Raid, here we focus on partial stripe write where data can be written on disk either fully or partially.
Layered SSD/HDD hybrid storage system has been widely used. However, most traditional designs are performance oriented, and not optimized for SSD lifespan. In this paper, SSD lifespan oriented layered model and cache ...
详细信息
Layered SSD/HDD hybrid storage system has been widely used. However, most traditional designs are performance oriented, and not optimized for SSD lifespan. In this paper, SSD lifespan oriented layered model and cache algorithm are proposed. To decrease SSD wear rate, HDD-RAM switch tunnel is appended to the traditional layered hybrid structure. Cache window size is considered in cache algorithm to filter data, avoiding unnecessary cache cost. Results show optimized designs significantly reduced erase times on SSD, and slightly influenced original performance.
In order to tackle the slow response caused by massive patent literatures, a patent literatures translation system based on Hadoop is proposed in this paper. The paper presents a hybrid storage structure and a paralle...
详细信息
Feature based image source identification plays an important role in the toolbox for forensics investigations on images. Conventional feature based identification schemes suffer from the problem of noise, that is, the...
详细信息
Amodel are proposed for modeling data-centric Web services which are powered by relational databases and interact with users according to logical formulas specifying input constraints, control-flow constraints and sta...
详细信息
Amodel are proposed for modeling data-centric Web services which are powered by relational databases and interact with users according to logical formulas specifying input constraints, control-flow constraints and state/output/action rules. The Linear Temporal First-Order Logic (LTL-FO) formulas over inputs, states, outputs and actions are used to express the properties to be *** have proven that automatic verification of LTL-FO properties of data-centric Web services under input-bounded constraints is decidable by reducing Web services to data-centric Web applications. Thus, we can verify Web service specifications using existing verifier designed for Web applications.
The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby people can collect and share data from ambient environment for the benefit of themselves or community. To encourage partic...
详细信息
The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby people can collect and share data from ambient environment for the benefit of themselves or community. To encourage participation of all stakeholders and guarantee system functionality, a privacy-preserving participatory sensing system should be established to hide querier's and participant's sensitive information(e.g., interest, location and content). Meanwhile, it is also imperative for server to provide an accurate and quick service(match the “need” with “supply” and retrieve the desired result from collected data set) for queriers when queries and reports are encrypted to protect privacy. In this paper, we propose Query and Report privacy-preserving protocol(QueRe) in participatory sensing system aiming to protect the query privacy and report privacy without sacrificing the service quality. Security analysis and performance simulation show our method achieves superior performance in privacy protection and service quality. To the best of our knowledge, our work is first attempt for protecting query privacy and report privacy while considering server's service quality.
There are many challenges in machine reading comprehension when it comes to extracting semantically complete evidence for specific statement. Existing works on unsupervised evidence extraction can be mainly divided in...
详细信息
暂无评论