An algorithm named F Stream for mining frequent items in a stream based on sliding window is *** algorithm can detect ε approximate frequent items in a data stream using O(ε-1) memory space and the processing time f...
详细信息
An algorithm named F Stream for mining frequent items in a stream based on sliding window is *** algorithm can detect ε approximate frequent items in a data stream using O(ε-1) memory space and the processing time for each data item is O(ε-1).Extensive experimental results show that F Stream outperforms other methods in terms of accuracy,memory requirement,and processing speed.
Bipartite ranking aims to learn a real-valued ranking function that orders positive instances before negative instances. Recent efforts of bipartite ranking are focused on optimizing ranking accuracy at the top of the...
Bipartite ranking aims to learn a real-valued ranking function that orders positive instances before negative instances. Recent efforts of bipartite ranking are focused on optimizing ranking accuracy at the top of the ranked list. Most existing approaches are either to optimize task specific metrics or to extend the rank loss by emphasizing more on the error associated with the top ranked instances, leading to a high computational cost that is super-linear in the number of training instances. We propose a highly efficient approach, titled TopPush, for optimizing accuracy at the top that has computational complexity linear in the number of training instances. We present a novel analysis that bounds the generalization error for the top ranked instances for the proposed approach. Empirical study shows that the proposed approach is highly competitive to the state-of-the-art approaches and is 10-100 times faster.
This paper proposes a real-time dynamic hand gesture recognition system based on Hidden Markov Models with incremental learning method (IL-HMMs) to provide natural human-computer interaction. The system is divided int...
详细信息
ISBN:
(纸本)9781479914821
This paper proposes a real-time dynamic hand gesture recognition system based on Hidden Markov Models with incremental learning method (IL-HMMs) to provide natural human-computer interaction. The system is divided into four parts: hand detecting and tracking, feature extraction and vector quantization, HMMs training and hand gesture recognition, incremental learning. After quantized hand gesture vector being recognized by HMMs, incremental learning method is adopted to modify the parameters of corresponding recognized model to make itself more adaptable to the coming new gestures. Experiment results show that comparing with traditional one, the proposed system can obtain better recognition rates.
This paper presents a batch learning algorithm and an online learning algorithm for radial basis function networks based on the self-organizing incremental neural network (SOINN), together referred to as SOINN-RBF. Th...
详细信息
ISBN:
(纸本)9781479914821
This paper presents a batch learning algorithm and an online learning algorithm for radial basis function networks based on the self-organizing incremental neural network (SOINN), together referred to as SOINN-RBF. The batch SOINN-RBF is a combination of SOINN and least square algorithm. It achieves a comparable performance with SVM for regression. The online SOINN-RBF is based on the self-adaption procedure of SOINN and adopts the growing and pruning strategy of the minimal resource allocation network (MRAN). The growing and pruning criteria use the redefined significance, which is originally introduced by the growing and pruning algorithm for RBF (GGAP-RBF). Simulation results for both artificial and real-world data sets show that, comparing with other online algorithms, the online SOINN-RBF has comparable approximation accuracy, network compactness and better learning efficiency.
Internetware applications must adapt themselves to keep their satisfaction with sufficient functionality,performance and *** this paper,we introduce a comprehensive technical platform to support such *** and low disru...
详细信息
Internetware applications must adapt themselves to keep their satisfaction with sufficient functionality,performance and *** this paper,we introduce a comprehensive technical platform to support such *** and low disruptive software updating techniques for multi-grained abstractions,namely objects,processes/workflows,components and coordinated systems,are proposed toward a seamless adaptation *** platform integrates all the techniques organically to support the practical adaptation scenarios that need the synergy of multiple *** implement the platform in accordance with industrial standards with its feasibility and efficiency demonstrated and hope the platform can be a stepping stone for future technical research for the Internetware paradigm.
In wireless networks, a recent trend is to make spectrum access dynamic for the sake of efficient utilization of spectrum. In this case, one promising approach is using auction-based market mechanism where available c...
详细信息
ISBN:
(纸本)9781479930845
In wireless networks, a recent trend is to make spectrum access dynamic for the sake of efficient utilization of spectrum. In this case, one promising approach is using auction-based market mechanism where available channels are periodically allocated to users. Two of the key objectives in designing an auction mechanism are strategy-proofness and social welfare maximization. It is hard to design a practical auction achieving both objectives. Prior work either do not consider strategy-proofness or do not guarantee performance ratio. In this paper, we achieve a tradeoff between supporting strong strategy-proofness and maximizing social welfare. We design a polynomial-time spectrum auction mechanism that is approximately strategy-proof which bounds the profit gain of a bidder from a lying bid, and yields an allocation with approximate social welfare. Through simulations, we show that our mechanism improves performance by about 30% in terms of social welfare and spectrum utilization, compared to the state-of-art mechanisms.
Python is widely used for web programming and GUI development. Due to the dynamic features of Python, Python programs may contain various unlimited errors. Dynamic slicing extracts those statements from a program whic...
详细信息
ISBN:
(纸本)9781479935765
Python is widely used for web programming and GUI development. Due to the dynamic features of Python, Python programs may contain various unlimited errors. Dynamic slicing extracts those statements from a program which affect the variables in a slicing criterion with a particular input. Dynamic slicing of Python programs is essential for program debugging and fault location. In this paper, we propose an approach of dynamic slicing for Python programs which combines static analysis and dynamic tracing of the Python byte code. It precisely handles the dynamic features of Python, such as dynamic typing of variables, heavy usage of first-class objects, and dynamic modifications of classes and instances. Finally, we evaluate our approach on several Python programs. Experimental results show that the whole dynamic slicing for each subject program spends at most about 13 seconds on the average and costs at most 7.58 mb memory space overhead. Furthermore, the average slice ratio of Python source code ranges from 9.26% to 59.42%. According to it, our dynamic slicing approach can be effectively and efficiently performed. To the best of our knowledge, it is the first one of dynamic slicing for Python programs.
Informative gene selection is an important topic in the field of bioinformatics which has attracted intensive interest in recent years. It aims to identify the genes which are differentially expressed in different gro...
详细信息
ISBN:
(纸本)9781479975037
Informative gene selection is an important topic in the field of bioinformatics which has attracted intensive interest in recent years. It aims to identify the genes which are differentially expressed in different groups, and thus are informative for the classification between the groups. For this purpose, many micro array experiments have been conducted by various medical institutes on their own sets of patients and test subjects. For those institutes who have conducted experiments regarding the same type of disease, it would be beneficial to all of them if they learn on the union of their data to find the informative genes instead of learn just on their own datasets, since the amount of data each institute holds is very limited. However, in many cases, the institutes are not allowed to share their data with others because micro array datasets contain private information about the patients and test subjects. In this paper, we focus on this problem and propose a privacy preserving algorithm that allows multiple parties to perform the widely used informative gene selection method, the Fisher criterion, on the union of their data, without revealing each party's data to others. Basically, we utilize the homomorphic cryptographic system to protect the data during the calculations. Experimental results on real world datasets show the effectiveness of the proposed method.
Today's public cloud providers typically deploy their small sized data centers in multiple geographically different locations, so as to improve data center power usage effectiveness and locate resources closer to ...
详细信息
Today's public cloud providers typically deploy their small sized data centers in multiple geographically different locations, so as to improve data center power usage effectiveness and locate resources closer to users. A major challenge is resource allocation. Many results have been reported regarding this issue from the perspectives of virtual machine consolidation, network-aware virtual machine placement, traffic engineering, dynamic capacity provisioning, and so on. However, there has not been any focus on stable resource allocations, where no resource request or data center has any migration incentives. To the best of our knowledge, this paper is the first attempt at gaining a better understanding of the structure of the Stable rEsource Allocation (SEA) problem. We introduce a formal problem statement and develop two algorithms for the 1-dimensional (1-D) and 2-D cases, respectively. Simulation results show that the proposed algorithms have good scalability and convergence.
Virtual networks that allow tenants to explicitly specify their computing as well as networking resources are recently proposed to be better interfaces between cloud providers and tenants. Many virtual networks have t...
详细信息
Virtual networks that allow tenants to explicitly specify their computing as well as networking resources are recently proposed to be better interfaces between cloud providers and tenants. Many virtual networks have time-varying resource demands, as evidenced in prior studies [1-3]. New opportunities emerge when such variation is exploited. In this paper, we design a novel resource demand model for tenants to flexibly trade off between application performance and cost, and propose a work-conserving allocation algorithm, WCA, for deploying virtual networks with time-varying resource demands. WCA places virtual nodes in a first-fit fashion, and places virtual links through path-splitting. In each physical node or link, by opportunistically sharing physical resources among multiple variable parts of resource demands, physical utilization can be improved, and more virtual networks can be deployed concurrently. Our evaluation results show that WCA achieves a 4% higher physical resource utilization and rejects 18% less virtual network requests than a state-of-the-art algorithm [4].
暂无评论