The key escrow problem and high computational cost are the two major problems that hinder the wider adoption of hierarchical identity-based signature (HIBS) scheme. HIBS schemes with either escrow-free (EF) or online/...
详细信息
Spin-transfer torque random access memory (STT-RAM) is one of the most promising substitutes for universal main memory and cache due to its excellent scalability, high density and low leakage power. Nevertheless, the ...
详细信息
In this paper, we consider a wide class of constrained nonconvex regularized minimization problems, where the constraints are linearly constraints. It was reported in the litera- ture that nonconvex regularization usu...
详细信息
The global open source software resources have become an Internet-scale repository,which provide abundant resources for software ***,how to locate the desired resource efficiently and accurately from such large amount...
详细信息
The global open source software resources have become an Internet-scale repository,which provide abundant resources for software ***,how to locate the desired resource efficiently and accurately from such large amounts is quite a challenge *** of recent works barely focus on the semantic similarity by analyzing the software itself,which often result in inappropriate *** this paper,we propose Dolphin,a global OSS search engine,which leverage the crowd discussions around OSS across communities for optimizing software *** employs the crowd wisdom as an important factor and combines it with the semantic similarity to optimize search results *** implement an OSS search engine based on the proposed approach,which provides online service *** experiments and user studies suggest the effectiveness of our approach.
Software projects are not developed in isolation but often build upon other open source resources. These projects form a kind of reference ecosystem regarded as a software world. Most of social computing works focus o...
详细信息
Software projects are not developed in isolation but often build upon other open source resources. These projects form a kind of reference ecosystem regarded as a software world. Most of social computing works focus on social networks such as Facebook and weibo to mine information. However, few previous works analyze Open Source Community which could help developers conduct collaborative development. In this paper, we model the Java reference ecosystem as a network based on the reuse relationships of Git Hub-hosted Java projects and analyze the characteristics and the patterns of this reference ecosystem by using community detection and pattern discovery algorithms. Our study indicates that(1) Developers prefer to reuse software limited in only a small part of projects with cross cutting functionality or advanced applications.(2)Developers usually select software reused with similar function widely depending on different requirements, resulting to different patterns. Based on these collective intelligence, our study opens up several possible future directions of reuse recommendation, which are considered as guidance of collaborative development.
High reliability is an essential factor of modern software. At the same time, as software complexity is increasing day by day, bug counts and rate inevitably rises, leading to undermine software reliability. To avoid ...
详细信息
ISBN:
(纸本)9781510830028
High reliability is an essential factor of modern software. At the same time, as software complexity is increasing day by day, bug counts and rate inevitably rises, leading to undermine software reliability. To avoid this problem, programmers always use issue-finding tools(bug detection) to discover the defects from source code in development of software. Recently, software inspection has been shown to be an effective way to speed up the process of source code verification and to move a portion of discovered defects from test to coding phase. As we know, modern software is often developed over many years. During this time, the commit metadata is becoming an important source of social characteristics. In this paper, our aim is to devise an empirical method to assess the percentage and the types of the issues found by issue finding tools are actual defects of the software.
Multiple-kernel k-means (MKKM) clustering has demonstrated good clustering performance by combining pre-specified kernels. In this paper, we argue that deep relationships within data and the complementary information ...
详细信息
ISBN:
(纸本)9781509006212
Multiple-kernel k-means (MKKM) clustering has demonstrated good clustering performance by combining pre-specified kernels. In this paper, we argue that deep relationships within data and the complementary information among them can improve the performance of MKKM. To illustrate this idea, we propose a diversity-induced MKKM algorithm with extreme learning machine (ELM)-based feature extracting method. First, ELM, which has randomly chosen weights of hidden and output nodes, is applied to thoroughly extract features from data by generating different numbers of hidden nodes and using different functions. Second, an MKKM algorithm with diversity-induced regularization is utilized to explore the complementary information among kernels constructed from features. The problem could be solved efficiently by alternating optimization. Experimental results demonstrate that the proposed method outperforms state-of-the-art kernel methods.
LESAP is a combustion simulation application capable of simulating the chemical reactions and supersonic flows in the scramjet engines. It can be used to solve practical engineering problems and involves a large amoun...
详细信息
One of the most important topics in Human-Centered Computing (HCC) is to recognise human's activities. In this paper, the technology of wireless-based activity recognition is introduced. By using wireless signals,...
详细信息
ISBN:
(纸本)9781509006212
One of the most important topics in Human-Centered Computing (HCC) is to recognise human's activities. In this paper, the technology of wireless-based activity recognition is introduced. By using wireless signals, one can achieve Non-Line-Of-Sight (NLOS) recognition without carrying any devices. Also, it is easy to deploy a wireless-based recognition system due to the ubiquity of wireless communication systems. The basic idea is to detect different characteristics of signal propagation that correspond to the distinct human behaviors. As a result, action recognition is performed by analyzing the distinguishable features of signal propagation. This paper introduces the basic principles and applications of wireless-based activity recognition, and discusses the challenges and related performance metrics. Finally, open problems are discussed to point out the future research trends.
Support Vector Machines (SVMs) are powerful classification tools. However, the model training is very time-consuming when meeting large scale data sets. Some efforts have been devoted to screening out non-support vect...
详细信息
ISBN:
(纸本)9781509044603
Support Vector Machines (SVMs) are powerful classification tools. However, the model training is very time-consuming when meeting large scale data sets. Some efforts have been devoted to screening out non-support vectors (non-SVs) to accelerate the training. But their processes rely on prior knowledge of other classifiers with different parameters to screen out non-SVs. In this paper, we propose Directional Indicator Support Vector Machines (DISVMs) to efficiently identify non-SVs. DISVMs employs a directional indicator, which points to the approximately orthogonal direction of the separating hyperplane, to qualitatively define the location of different samples and thus identify non-SVs. Furthermore, DISVMs leverages a two-stage algorithm: the first stage is to compute the directional indicator. The second stage is to identify non-SVs using the indicator. To avoid misjudgement, we propose CnSV method for non-SVs based on the majority rule. DISVMs screens out non-SVs with light computation and little accuracy loss. Experiments show that our approach significantly reduces the total computation cost.
暂无评论