Anomalies are usually regarded as data errors or novel patterns previously unseen, which are quite different from most observed data. Accurate detection of anomalies is crucial in various application scenarios. This p...
详细信息
Existing visual saliency prediction methods mainly focus on single-modal visual saliency prediction, while ignoring the significant impact of text on visual saliency. To more comprehensively explore the influence of t...
详细信息
In this paper, the problem of remote state estimation is investigated for a class of complex networks with noisy wireless communication channels. The employment of the binary encoding scheme allows for the description...
详细信息
Recent years have witnessed rapid progress of convolutional neural networks (CNNs) and their successful application in the task of saliency prediction for omnidirectional images (ODIs). Albeit achieving tremendous per...
详细信息
The rapid development of location-based social networks(LBSNs) provides people with an opportunity of better understanding their mobility behavior which enables them to decide their next *** example,it can help travel...
详细信息
The rapid development of location-based social networks(LBSNs) provides people with an opportunity of better understanding their mobility behavior which enables them to decide their next *** example,it can help travelers to choose where to go next,or recommend salesmen the most potential places to deliver advertisements or sell *** this paper,a method for recommending points of interest(POIs)is proposed based on a collaborative tensor factorization(CTF)***,a generalized objective function is constructed for collaboratively factorizing a tensor with several feature ***,a 3-mode tensor is used to model all users' check-in behaviors,and three feature matrices are extracted to characterize the time distribution,category distribution and POI correlation,***,each user's preference to a POI at a specific time can be estimated by using *** order to further improve the recommendation accuracy,PCTF(Partitionbased CTF) is proposed to fill the missing entries of a tensor after clustering its every *** on a real checkin database show that the proposed method can provide more accurate location recommendation.
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence...
详细信息
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence has become a problem. For this condition, we should analyze unknown correspondence due to the influence of different *** this paper we obtain the relations of transitions based on event relations using branching processes, and build a behavioral matrix of relations. Based on the permutation of behavioral matrix, we express different correspondences, and define a new formula to compute the maximal consistency degree of two workflow nets. Additionally, this paper utilizes an example to show these definitions, computation as well as the advantages.
Many systems have been built to employ the delta-based iterative execution model to support iterative algorithms on distributed platforms by exploiting the sparse computational dependencies between data items of these...
详细信息
Many systems have been built to employ the delta-based iterative execution model to support iterative algorithms on distributed platforms by exploiting the sparse computational dependencies between data items of these iterative algorithms in a synchronous or asynchronous approach. However, for large-scale iterative algorithms, existing synchronous solutions suffer from slow convergence speed and load imbalance, because of the strict barrier between iterations;while existing asynchronous approaches induce excessive redundant communication and computation cost as a result of being barrier-free. In view of the performance trade-off between these two approaches, this paper designs an efficient execution manager, called Aiter-R, which can be integrated into existing delta-based iterative processing systems to efficiently support the execution of delta-based iterative algorithms, by using our proposed group-based iterative execution approach. It can efficiently and correctly explore the middle ground of the two extremes. A heuristic scheduling algorithm is further proposed to allow an iterative algorithm to adaptively choose its trade-off point so as to achieve the maximum efficiency. Experimental results show that Aiter-R strikes a good balance between the synchronous and asynchronous policies and outperforms state-of-the-art solutions. It reduces the execution time by up to 54.1% and 84.6% in comparison with existing asynchronous and the synchronous models, respectively.
Entity linking refers to linking a string in a text to corresponding entities in a knowledge base through candidate entity generation and candidate entity *** is of great significance to some NLP(natural language proc...
详细信息
Entity linking refers to linking a string in a text to corresponding entities in a knowledge base through candidate entity generation and candidate entity *** is of great significance to some NLP(natural language processing)tasks,such as question *** English entity linking,Chinese entity linking requires more consideration due to the lack of spacing and capitalization in text sequences and the ambiguity of characters and words,which is more evident in certain *** Chinese domains,such as industry,the generated candidate entities are usually composed of long strings and are heavily *** addition,the meanings of the words that make up industrial entities are sometimes *** semantic space is a subspace of the general word embedding space,and thus each entity word needs to get its exact ***,we propose two schemes to achieve better Chinese entity ***,we implement an ngram based candidate entity generation method to increase the recall rate and reduce the nesting ***,we enhance the corresponding candidate entity ranking mechanism by introducing sense *** the contradiction between the ambiguity of word vectors and the single sense of the industrial domain,we design a sense embedding model based on graph clustering,which adopts an unsupervised approach for word sense induction and learns sense representation in conjunction with *** test the embedding quality of our approach on classical datasets and demonstrate its disambiguation ability in general *** confirm that our method can better learn candidate entities’fundamental laws in the industrial domain and achieve better performance on entity linking through experiments.
This letter deals with an interesting intersection phenomenon of prescribed-time stability (PTSta) for dynamical systems, and develops a novel switching control scheme to investigate prescribed-time synchronization (P...
This letter deals with an interesting intersection phenomenon of prescribed-time stability (PTSta) for dynamical systems, and develops a novel switching control scheme to investigate prescribed-time synchronization (PTSyn) for multiweighted and directly coupled complex networks. Different from most previous works that scholars only pay attention to designing the regulation function to ensure PTSta, we aim to select various parameters and uncover the mathematical mechanism of intersecting system state curves. We rigorously prove that, if the settling time is larger than 1, then no matter what the initial value is, the intersection exists only once before the settling time; otherwise, there is no intersection. Moreover, an energy consumption evaluation function is also put forward for PTSta, whose exact value is also calculated via exponential integrals. Then, this intersection theory is applied on the PTSyn of multiweighted complex networks, which is beneficial to construct the switching control scheme or choose the optimal parameters to reduce the energy cost. The rearranging variables’ order technique is utilized to conduct the multiweighted complex networks and obtain the synchronization criterion. Finally, four simulations are presented to verify theoretical results.
Real-world networks,such as social networks,cryptocurrency networks,and e-commerce networks,always have occurrence time of interactions between *** networks are typically modeled as temporal *** cohesive subgraphs fro...
详细信息
Real-world networks,such as social networks,cryptocurrency networks,and e-commerce networks,always have occurrence time of interactions between *** networks are typically modeled as temporal *** cohesive subgraphs from temporal graphs is practical and essential in numerous data mining applications,since mining cohesive subgraphs gets insights into the time-varying nature of temporal ***,existing studies on mining cohesive subgraphs,such as Densest-Exact and k-truss,are mainly tailored for static graphs(whose edges have no temporal information).Therefore,those cohesive subgraph models cannot indicate both the temporal and the structural characteristics of *** this end,we explore the model of cohesive temporal subgraphs by incorporating both the evolving and the structural characteristics of temporal ***,the volume of time intervals in a temporal network is *** a result,the time complexity of mining temporal cohesive subgraphs is *** efficiently address the problem,we first mine the temporal density distribution of temporal *** by the distribution,we can safely prune many unqualified time intervals with the linear time ***,the remaining time intervals where cohesive temporal subgraphs fall in are examined using the greedy *** results of the experiments on nine real-world temporal graphs indicate that our model outperforms state-of-the-art solutions in efficiency and ***,our model only takes less than two minutes on a million-vertex DBLP and has the highest overall average ranking in EDB and TC metrics.
暂无评论