A mass of heterogeneous, distributed and dynamic information on the World Wide Web (the Web) has resulted in 'information overload'. It's an important and urgent research issue to provide users with effec...
详细信息
A mass of heterogeneous, distributed and dynamic information on the World Wide Web (the Web) has resulted in 'information overload'. It's an important and urgent research issue to provide users with effective information retrieval service on the Web. Web search engines attempt to solve this problem, yet their effect is far from satisfying. In this paper, a distributed and cooperative strategy for information retrieval on the Web is proposed to substitute the centralized mode adopted by the current search engines. Then a new information retrieval system model IRSM is presented, which supports the retrieval of metadata about Web documents and uses Z39.50 standard protocol to unify the heterogeneous interfaces of. different systems. Based on that, a distributed and cooperative information retrieval framework, called DCIRF, is designed to help users in fast and effective information retrieval on the Web.
Internetware applications are emerging and being widely *** can adapt their behavior based on environmental contexts and deliver smart *** contexts can be subject to various noises,which cause them to be inaccurate,in...
详细信息
Internetware applications are emerging and being widely *** can adapt their behavior based on environmental contexts and deliver smart *** contexts can be subject to various noises,which cause them to be inaccurate,incomplete,or even to conflict with each *** is known as context inconsistency *** inconsistency can trigger unexpected behavior to applications,and therefore should be *** promising approach is to check contexts against consistency constraints so as to detect the occurrences of context inconsistency at *** techniques have attempted different ways to improve the checking efficiency or effectiveness with different trade-offs in space overhead or communication ***,none of them has exploited multi-core computing capability to systematically improve the checking *** this paper,we propose a novel concurrent checking technique Con-C to efficiently detect inconsistencies in huge volumes of dynamic ***-C derives checking subtasks for each consistency constraint based on its structure and *** achieves this in a fully automated way,and at the same time can guarantee its derived checking subtasks to be persistently *** evaluated Con-C by controlled experiments through a large-scale real-world *** reported promising results that Con-C improved the checking efficiency by extra 57.0%,in addition to what had been gained by incremental checking.
Recently smartphones and mobile devices have gained incredible popularity for their vibrant feature-rich applications (or apps). Because it is easy to repackage Android apps, software plagiarism has become a serious p...
详细信息
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti...
详细信息
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problem...
详细信息
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problems for search engines,and many methods have been proposed for spam *** exploit the content features of non-spam in contrast to those of *** content features for non-spam pages always possess lots of statistical regularities; but those for spam pages possess very few statistical regularities,because spam pages are made randomly in order to increase the page *** this paper,we summarize the regularities distributions of content features for non-spam pages,and propose the calculating probability formulae of the entropy and independent n-grams ***,we put forward the calculation formulae of multi features *** them,the notable content features may be used as auxiliary information for spam detection.
This paper studies the problem of semi-supervised learning on graphs, which has recently aroused widespread interest in relational data mining. The focal point of exploration in this area has been the utilization of g...
详细信息
This paper proposes the notion of a greylevel difference classification algorithm in fractal image compression. Then an example of the greylevel difference classification algo rithm is given as an improvement of the q...
详细信息
This paper proposes the notion of a greylevel difference classification algorithm in fractal image compression. Then an example of the greylevel difference classification algo rithm is given as an improvement of the quadrant greylevel and variance classification in the quadtree-based encoding algorithm. The algorithm incorporates the frequency feature in spatial analysis using the notion of average quadrant greylevel difference, leading to an enhancement in terms of encoding time, PSNR value and compression ratio.
Load balance and failure tolerance are the crucial issues for multihomed mobile network. However, existing solutions are still far away from our expectation. In this paper, we first analyze the problems of multihoming...
详细信息
Load balance and failure tolerance are the crucial issues for multihomed mobile network. However, existing solutions are still far away from our expectation. In this paper, we first analyze the problems of multihoming in a nested mobile network and review their existing schemes in the eye of load balance and failure tolerance. Then we give a strengthened model of access router tree, where a novel and comprehensive metric for best path recognition is proposed to realize the load balance. In order to enhance the failure tolerance of the system, we further propose fast handover algorithms which can be used when burst access failure appears. We perform extensive simulations to evaluate the proposed scheme. Results indicate that comprehensive load balance and failure tolerance can be achieved. Moreover, our proposed handover algorithm achieves least latency of package transmission compared with its existing counterparts.
A model of intelligent resource management in a large distributed system is proposed. This model not only can efficiently solve the problem concerning the incompletion of the global states and the monotony of the mana...
详细信息
A model of intelligent resource management in a large distributed system is proposed. This model not only can efficiently solve the problem concerning the incompletion of the global states and the monotony of the management tactics, but also has the self-adapting ability in a large distributed system, so that the system can maintain high performance all the time.
Line segment clipping is a basic operation of the visualization process in computer graphics. So far there exist four computational models for clipping a line segment against a window, (1) the encoding, (2) the parame...
详细信息
Line segment clipping is a basic operation of the visualization process in computer graphics. So far there exist four computational models for clipping a line segment against a window, (1) the encoding, (2) the parametric, (3) the geometric transformation, and (4) the parallel cutting. This paper presents an algorithm that is based on the third method. By making use of symmetric properties of a window and transformation operations, both endpoints of a line segment are transformed, so that the basic cases are reduced into two that can be easily handled, thus the problems in NLN and AS where there are too many sulyprocedure calls and basic cases that are difficult to deal with are tackled. Both analytical and experimental results from random input data show that the algorithm is better than other developed ones, in view of the speed and the number of operations.
暂无评论