Traditional approaches typically flatten the process when checking the conformance of complex processes. However, this flattening approach can result in the loss of dependencies between objects, reducing the accuracy ...
详细信息
Docker,as a mainstream container solution,adopts the Copy-on-Write(CoW)mechanism in its storage *** mechanism satisfies the need of different containers to share the same ***,when a single container performs operation...
详细信息
Docker,as a mainstream container solution,adopts the Copy-on-Write(CoW)mechanism in its storage *** mechanism satisfies the need of different containers to share the same ***,when a single container performs operations such as modification of an image file,a duplicate is created in the upper readwrite layer,which contributes to the runtime *** the accessed image file is fairly large,this additional overhead becomes *** we present the concept of Dynamic Prefetching Strategy Optimization(DPSO),which optimizes the Co W mechanism for a Docker container on the basis of the dynamic prefetching *** the beginning of the container life cycle,DPSO pre-copies up the image files that are most likely to be copied up later to eliminate the overhead caused by performing this operation during application *** experimental results show that DPSO has an average prefetch accuracy of greater than 78%in complex scenarios and could effectively eliminate the overhead caused by the CoW mechanism.
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ...
详细信息
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense ***,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense *** designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions.
The primary objective of the recommendation system is to suggest suitable products to users. The need for a personalized recommendation system has become essential with the continuous growth in the number of users and...
详细信息
Machine learning (ML) models are susceptible to membership inference attacks (MIAs), which aim to infer whether a particular sample was involved in model training. Previous research suggests that the difference in los...
详细信息
Personalized learner modeling uses learners’ historical behavior data to diagnose their cognitive abilities, a process known as Cognitive Diagnosis (CD). This is essential for web-based learning services such as lear...
详细信息
Let W^(1,n)(R^(n))be the standard Sobolev *** any T>0 and p>n>2,we denote■Define a norm in W^(1,n)(R^(n))by■where 0≤α<λ_(n,p).Using a rearrangement argument and blow-up analysis,we will prove■can be ...
详细信息
Let W^(1,n)(R^(n))be the standard Sobolev *** any T>0 and p>n>2,we denote■Define a norm in W^(1,n)(R^(n))by■where 0≤α<λ_(n,p).Using a rearrangement argument and blow-up analysis,we will prove■can be attained by some function u_(0)∈W^(1,n)(R^(n))∩C^(1)(R^(n))with ||u_(0)||_(n,p)=1,here a_(n)=n■_(n-1)^(1/n-1) and ■_(n-1) is the measure of the unit sphere in R^(n).
This paper presents an efficient and scalable incomplete multi-view clustering method, referred to as Enhanced Dictionary-Induced tenSorized incomplete multi-view clustering with Gaussian errOr raNk minimization (EDIS...
详细信息
This paper presents an efficient and scalable incomplete multi-view clustering method, referred to as Enhanced Dictionary-Induced tenSorized incomplete multi-view clustering with Gaussian errOr raNk minimization (EDISON). Specifically, EDISON employs an enhanced dictionary representation strategy as the foundation for inferring missing data and constructing anchor graphs, ensuring robustness to less-than-ideal data and maintaining high computational efficiency. Additionally, we introduce Gaussian error rank as a concise approximation of the true tensor rank, facilitating a comprehensive exploration of the diverse information encapsulated by various singular values in tensor data. Furthermore, we integrate a hyper-anchor graph Laplacian manifold regularization into the tensor representation, allowing for the simultaneous utilization of inter-view high-order correlations and intra-view local correlations. Extensive experiments demonstrate the superiority of the EDISON model in both effectiveness and efficiency compared to SOTA methods. Copyright 2024 by the author(s)
When some application scenarios need to use semantic segmentation technology, like automatic driving, the primary concern comes to real-time performance rather than extremely high segmentation accuracy. To achieve a g...
详细信息
Landslide extraction plays a critical role in facilitating effective rescue operations and emergency response. However, existing methods face difficulties in accurately extracting landslide areas due to complex terrai...
详细信息
暂无评论