In this paper, we investigate belief revision in possibilistic logic, which is a weighted logic proposed to deal with incomplete and uncertain information. Existing revision operators in possibilistic logic are restri...
详细信息
Time interrupts play an important role in the system. When time interrupts occur, system will inspect process running state, providing an opportunity to schedule, which is important for improving system real time perf...
详细信息
This paper focuses efforts on the problem of computing the inverse of cardinal direction relations (CRs), which is a fundamental problem in qualitative spatial reasoning. We study the quite expressive cardinal directi...
详细信息
This paper focuses efforts on the problem of computing the inverse of cardinal direction relations (CRs), which is a fundamental problem in qualitative spatial reasoning. We study the quite expressive cardinal direction relation model for extended objects, known as cardinal direction calculus (CDC). We first concentrate on a set of a special type of CRs defined in CDC, named rectangle-CRs, and compute the inverse of rectangle-CRs by exploiting the evident connection between basic rectangle- CRs and interval relations. Then, we consider progressively the general cardinal direction relations in CDC, or called CDC relations for short, the inverse of which is computed by reducing to the computation of the inverse of rectangle-CRs. This simplifies the computations. Analyzing in theory and the final results both demonstrate that our algorithms are correct and complete and the time complexity is bounded by a constant number of operations.
Link prediction in networks has attracted increasing attention by researchers coming from different branches of science, and has been applied in many important domains, such as protein-protein interaction networks in ...
详细信息
According to the attributes of nodes and the linkages between them, most real-world complex networks could be assortative and disassortative. Community structures are ubiquitous in both types of networks. The ability ...
详细信息
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes ses...
详细信息
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes session boundary discrimination model (the binary classification tree) utilizing time interval and query likelihood on the basis of COBWEB. The model has prominently improved recall ratio, precision ratio and value F to more than 90 percent and particularly the value F for yes class rises compared with previous study. It is an incremental algorithm that can deal with large scale data, which will be perfectly applied into user interest mining. Owing to its good performance in session boundary discrimination, the application of the model can serve as a tool in fields like personalized information retrieval, query suggestion, search activity analysis and other fields which have connection with search results improvement.
In this paper, we present a new regularization classification method based on extreme learning machine for within network node classification problem. In particular, we define a new objective function, which contains ...
详细信息
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they ma...
详细信息
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they may instead pay more attention to fresh information. This demand poses challenges to traditional search engines, which concern more about relevance and importance of web pagesA search engine compresses three modules: crawler, indexer and searcherChanges are needed for all these three parts to improve search engine's freshness. This paper investigates the first part of search engine – crawler, we analyze the requirements for real-time crawler, and propose a novel real-time crawler based on more accurate estimation of refresh timeExperimental results demonstrate that the proposed real-time crawler can help search engine improve its freshness.
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,...
详细信息
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel sc...
详细信息
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel scheme called index inner table used in the reader. Index inner table may efficiently utilize calculation capacity and storage space of the reader to construct a filter which can sift authentication applications from tags, thus, it could alleviate workload of the backend server and resist replay attack from an adversary. The structure, filter algorithm, update and sorting algorithm, eraser algorithm of index inner table would be introduced detailedly in this paper. In addition, this protocol is particularly suitable for the low-cost RFID systems;the security and performance of this protocol are analyzed as well.
暂无评论