Phishing is a web-based attack which end users are lured to visit fraudulent websites and give away personal information unconsciously. Typically, the captured information is used to get an illegal economic profit. Al...
详细信息
Given a set of training instances of sequences (time series), the problem of anomalistic sequence detection is to predict whether a newly observed time series novel or normal. Anomalistic sequence detection is very us...
详细信息
In homogeneous or heterogeneous databases, the main direction of research on XML-based information interaction between databases is taking XML as middleware to realize the information exchange between data in the envi...
详细信息
In homogeneous or heterogeneous databases, the main direction of research on XML-based information interaction between databases is taking XML as middleware to realize the information exchange between data in the environment of small and medium-sized databases. Considering the insufficiency of the traditional text file-based information interaction method, the paper puts forward an XML-based method of information exchanging between databases, and the corresponding database exchanging system is developed. The utmost feature and advantage of the system is taking hibernate XML mapping table file for converting middleware to realize information interaction between databases. The experiment result shows that the system provides a certain reference value for data mining and data warehouse.
In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density \lambda \in [1,n], we study the tradeoffs between the aggregation throughput and gathering efficiency. The gathering eff...
详细信息
In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density \lambda \in [1,n], we study the tradeoffs between the aggregation throughput and gathering efficiency. The gathering efficiency refers to the ratio of the number of the sensors whose data have been gathered to the total number of sensors. Specifically, we design two efficient aggregation schemes, called single-hop-length (SHL) scheme and multiple-hop-length (MHL) scheme. By novelly integrating these two schemes, we theoretically prove that our protocol achieves the optimal tradeoffs, and derive the optimal aggregation throughput depending on a given threshold value (lower bound) on gathering efficiency. Particularly, we show that under the MHL scheme, for a practically important set of symmetric functions called divisible perfectly compressible (DPC) functions, including the mean, max, and various kinds of indicator functions, etc., the data from \Theta (n) sensors can be aggregated to the sink at the throughput of a constant order \Theta (1), implying that, our MHL scheme is indeed scalable.
Due to the huge size of patterns to be searched,multiple pattern searching remains a challenge to several newly-arising applications like network intrusion *** this paper,we present an attempt to design efficient mult...
详细信息
Due to the huge size of patterns to be searched,multiple pattern searching remains a challenge to several newly-arising applications like network intrusion *** this paper,we present an attempt to design efficient multiple pattern searching algorithms on multi-core *** observe an important feature which indicates that the multiple pattern matching time mainly depends on the number and minimal length of *** multi-core algorithm proposed in this paper leverages this feature to decompose pattern set so that the parallel execution time is *** formulate the problem as an optimal decomposition and scheduling of a pattern set,then propose a heuristic algorithm,which takes advantage of dynamic programming and greedy algorithmic techniques,to solve the optimization *** results suggest that our decomposition approach can increase the searching speed by more than 200% on a 4-core AMD Barcelona system.
In order to improve the reliability of moving objects detection, this paper presented a moving objects detection algorithm based on improved Gaussian mixture model background modeling. The algorithm introduced blockin...
详细信息
Current shared memory multi-core and multiprocessor systems are nondeterministic. When these systems execute a multithreaded application, even if supplied with the same input, they could produce a different output eac...
详细信息
Current shared memory multi-core and multiprocessor systems are nondeterministic. When these systems execute a multithreaded application, even if supplied with the same input, they could produce a different output each time. It frustrates debugging and limits the ability to properly test multithreaded code, and is becoming a major stumbling block to the much-needed widespread adoption of parallel programming. The support for deterministic replay of multithreaded execution is greatly helpful in finding concurrency bugs. A memory race recording scheme, named Rainbow, is proposed. Its core idea is to make inter-thread communications fully deterministic. The unique feature of Rainbow is that it precisely sets up happens-before relationships between conflicting memory operations among different threads. By using effective, bloom-filter based, coherence history queue, Rainbow removes redundant happens-before relations implied in the already generated log and enables a compact log. Rainbow adds the modest hardware to the base multi-core processors, and the coherence protocol is unmodified. The analysis results show that Rainbow reduces the log size by 17% of a state-of-the-art scheme, and the records execution speed is similar to that of release consistency (RC) execution and replays at about 93% of its speed. The determinism can be provided with little performance cost using our architecture proposals on the state-of-the-art hardware, and the software-only approaches can be utilized on existing systems without problem.
Sparse representation based classification (SRC) has been widely used for face recognition (FR). Although SRC algorithm is also adopted in human action recognition, the evaluations of different regular terms have not ...
详细信息
ISBN:
(纸本)9781467322164
Sparse representation based classification (SRC) has been widely used for face recognition (FR). Although SRC algorithm is also adopted in human action recognition, the evaluations of different regular terms have not been given. In this paper, we will discuss and evaluate the role of different regular terms of SRC in human action recognition, after that, we propose human action recognition algorithm based on sparse representation induced by L 1 and L 2 regulations - called SR-L12. Experiments on well known KTH action dataset show that SR-L12 is much better than that of nearest neighbor (NN), nearest subspace (NS), full-space (NF), SRC and collaborative representation classification (CRC). Moreover, the proposed method is comparable to most of state-of-the-art algorithms for human action recognition.
A terrain data organization method was proposed in this article in order to solve large scale data realtime rendering problem, which combines wavelet transform and quadtree to organize the terrain data, to further bui...
详细信息
Tree pruning can significantly reduce the complexity of sphere decoding (SD). How to determine the pruning rule is an open problem of tree pruning. In this paper, we propose a pruning strategy for SD based on path met...
详细信息
ISBN:
(纸本)9781467309899
Tree pruning can significantly reduce the complexity of sphere decoding (SD). How to determine the pruning rule is an open problem of tree pruning. In this paper, we propose a pruning strategy for SD based on path metric. Because only the nearest lattice point is concerned, if the ratio of the metric to the minimum metric is larger than a threshold, the path whose metric is large enough can be pruned. We analyze the influence of the choice of the thresholds on the performance and the complexity. Through analysis and the simulations, we can show that the complexity reduction is significant while maintaining the negligible performance degradation when proper thresholds are chosen. Besides, tradeoff between complexity and performance can be easily achieved by adjusting the thresholds.
暂无评论