作者:
Hu, HeDu, XiaoyongSchool of Information
Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MoE No. 59 Zhongguancun St. Beijing100872 China
Online tagging is crucial for the acquisition and organization of web knowledge. We present TYG (Tag-as-You-Go) in this paper, a web browser extension for online tagging of personal knowledge on standard web pages. We...
详细信息
Social media plays a fundamental role in the diffusion of information. There are two different ways of information diffusion in social media platforms such as Twitter and Weibo. Users can either re-share messages post...
详细信息
ISBN:
(纸本)9781479984435
Social media plays a fundamental role in the diffusion of information. There are two different ways of information diffusion in social media platforms such as Twitter and Weibo. Users can either re-share messages posted by their friends or re-create messages based on the information acquired from other non-local information sources such as the mass media. By analyzing around 60 million messages from a large micro-blog site, we find that about 69% of the diffusion volume can be attributed to users' re-sharing behaviors, and the remaining 31% are caused by users' re-creating behaviors. The information diffusions caused by the two kinds of behaviors have different characteristics and variation trends, but most existing models of information diffusion do not distinguish them. The recent availability of massive online social streams allows us to study the process of information diffusion in much finer detail. In this paper, we introduce a novel model to capture and simulate the process of information diffusion in the micro-blog platforms, which distinguishes users' re-sharing behaviors from re-creating behaviors by introducing two different components. Thus, our model not only considers the effect of the underlying network structure, but also the influence of other non-local information sources. The empirical results show the superiority of our proposed model in the fitting and prediction tasks of information diffusion.
Hadoop is now the de facto standard for storing and processing big data, not only for unstructured data but also for some structured data. As a result, providing SQL analysis functionality to the big data resided in H...
详细信息
In an effort to provide lawful interception for session initiation protocol (SIP) voice over Internet protocol (VoIP), an interception architecture using session border controller (SBC) is proposed. Moreover, a protot...
详细信息
Recently, a number of advanced data collection and processing methodologies have led to the proliferation of uncertain data. When discovering from such uncertain data, we should handle these uncertainties with caution...
详细信息
Wildfire spread is a complex process affected by many elements. FARSITE (Fire Area Simulator) is a forest fire spread simulation system widely applied and recognized in the world. This paper briefly describes the prin...
详细信息
An emerging topic in multimedia retrieval is to detect a complex event in video using only a handful of video examples. Different from existing work which learns a ranker from positive video examples and hundreds of n...
详细信息
ISBN:
(纸本)1595930361
An emerging topic in multimedia retrieval is to detect a complex event in video using only a handful of video examples. Different from existing work which learns a ranker from positive video examples and hundreds of negative examples, we aim to query web video for events using zero or only a few visual examples. To that end, we propose in this paper a tag-based video retrieval system which propagates tags from a tagged video source to an unlabeled video collection without the need of any training examples. Our algorithm is based on weighted frequency neighbor voting using concept vector similarity. Once tags are propagated to unlabeled video we can rely on off-the-shelf language models to rank these videos by the tag similarity. We study the behavior of our tag-based video event retrieval system by performing three experiments on web videos from the TRECVID multimedia event detection corpus, with zero, one and multiple query examples that beats a recent alternative. Copyright 2014 ACM.
The information on the Web is usually fabricated to be understandable by human users rather than ***'s not easy to automatically catalogue and extract the Web information solely with a software *** on these observ...
详细信息
ISBN:
(纸本)9781479951499
The information on the Web is usually fabricated to be understandable by human users rather than ***'s not easy to automatically catalogue and extract the Web information solely with a software *** on these observations,we present an approach that uses human guided operations to automatically generate a PQL query,a SQL like query language focusing on Web pages,to extract the interested information fragments on Web *** PQL query uses XPath expressions to locating the target HTML *** develop a K-Medoid clustering algorithm to process PQL queries to generate the structural *** extracted information is structured as a relational table(in CSV format)which can be manipulated smoothly with spreadsheet software or a relational DBMS system.
It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, t...
详细信息
It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable.
暂无评论