The sparsity of data and the diversity of ratings have a great effect on the performance of recommendation systems. To deal with these two issues, this paper proposes a reliable neighbors-based collab.rative filtering...
详细信息
Semi-supervised feature selection is an active topic in machine learning and data mining. Laplacian support vector machine (LapSVM) has been successfully applied to semi-supervised learning. However, LapSVM cannot be ...
详细信息
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem,and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself,and it can defend positive attack of dealer and participants.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem, and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
We introduce a new logic programming paradigm-answer set programming with uncertain facts (LPuF for short). A LPuF program is an extension of answer set programs (ASP for short). We first define the syntax of LPuF pro...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they give two solutions that are applicable for the case k>m/2,in Nikov et al.'s scheme,they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k,in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b...
详细信息
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation by using the similar method in an English SRL system. We also explore dependency-based predicate analysis in Chinese SRL. We perform our experiments on two datasets. Our results show that dependency-based Chinese SRL is not only feasible but also superior to the constituent-based SRL in some respects.
It is very important to find a criterion when to perform a resampling step. Aimed at this problem, an adaptive resampling algorithm in particle filter based on diversity measures is presented. Based on the analysis an...
详细信息
暂无评论