The large-scale application of medical knowledge graphs has greatly raised the intelligence level of modern medicine. Considering that entity references between multiple medical knowledge graphs can lead to redundancy...
详细信息
Assessing data quality through Functional Depen-dencies (FDs) is a crucial aspect of data governance. However, with the diverse range of data sources and the exponential growth in data volume, exact FDs can sometimes ...
详细信息
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-...
详细信息
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-heterogeneous task ***,a variety of heterogeneous objects coexist in real-world SC *** dramatically expands the space for searching the optimal task allocation solution,affecting the quality and efficiency of data *** this paper,an aggregation-based dual heterogeneous task allocation algorithm is put *** investigates the impact of dual heterogeneous on the task allocation problem and seeks to maximize the quality of task completion and minimize the average travel *** problem is first proved to be ***,a task aggregation method based on locations and requirements is built to reduce task ***,a time-constrained shortest path planning is also developed to shorten the travel distance in a *** that,two evolutionary task allocation schemes are ***,extensive experiments are conducted based on real-world datasets in various *** with baseline algorithms,our proposed schemes enhance the quality of task completion by up to 25% and utilize 34% less average travel distance.
Every employee in the company who deals with data needs to have clean, noise-free data. Since data warehouses store and update enormous amounts of data from several sources, there is a potential that some of those ref...
详细信息
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud-centric framework to fulfil the applicati...
详细信息
What is the widest community in which a person exercises a strong impact? Although extensive attention has been devoted to searching communities containing given individuals, the problem of finding their unique commun...
详细信息
Global routing is a critical problem in PCB routing, and its quality greatly affect the PCB design cost. Unlike existing methods based on traditional rectangular grid, this paper present a novel algorithm based on tri...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
In the evolving landscape of machine learning research, two significant developments have emerged to prominence: foundation models and federated learning. The FL@FM-TheWebConf’24 workshop provides an exciting forum f...
详细信息
Incomplete spatio-temporal data in the real world has spawned much research. However, existing methods often utilize iterative message-passing across temporal and spatial dimensions, resulting in substantial informati...
ISBN:
(纸本)9798331314385
Incomplete spatio-temporal data in the real world has spawned much research. However, existing methods often utilize iterative message-passing across temporal and spatial dimensions, resulting in substantial information loss and high computational cost. We provide a theoretical analysis revealing that such iterative models are susceptible to data and graph sparsity, causing unstable performances on different datasets. To overcome these limitations, we introduce a novel method named One-step Propagation and Confidence-based Refinement (OPCR). In the first stage, OPCR leverages inherent spatial and temporal relationships by employing a sparse attention mechanism. These modules propagate limited observations directly to the global context through one-step imputation, which is theoretically affected only by data sparsity. Following this, we assign confidence levels to the initial imputations by correlating missing data with valid data. This confidence-based propagation refines the separate spatial and temporal imputation results through spatio-temporal dependencies. We evaluate the proposed model across various downstream tasks involving highly sparse spatio-temporal data. Empirical results indicate that our model outperforms state-of-the-art imputation methods, demonstrating its effectiveness and robustness.
暂无评论