With the increasing availab.lity of Web services, how to effictively and accurately discover services according to users' requirements becomes a key issue. In this paper, we propose an on-demand service discovery ...
详细信息
In many data analysis tasks, one is often confronted with very high dimensional data. Feature selection techniques are designed to find the relevant feature subset of the original features which can facilitate cluster...
详细信息
Fast similarity search is one of the key techniques in many large scale learning and data mining applications. Recently, hashing-based methods, which create compact and efficient codes that preserve data distribution,...
详细信息
ISBN:
(纸本)9781450304603
Fast similarity search is one of the key techniques in many large scale learning and data mining applications. Recently, hashing-based methods, which create compact and efficient codes that preserve data distribution, have received considerable attention due to their promising theoretical and empirical results. An ideal hashing method 1) can naturally have out-of-sample extension;2) has very low computational complexity;and 3) has significant improvement over linear search in the original space in terms of accuracy. However, most existing hashing methods failed to satisfy all the above three requirements. In this paper, we propose a new method called Error-correcting Output Hashing (ECOH) which meets all the above three requirements. ECOH first groups all the samples into clusters using a conventional clustering algorithm. Each cluster is assigned an Error-Correcting Output Code (ECOC) and the linear mappings from the sample vectors to the ECOC are then learned using linear regression models. In this way, ECOH learns both the binary code for each sample and the function which links the input vector and the output code. Experimental results on real world data sets demonstrate the effectiveness and efficiency of the proposed approach. Copyright 2010 ACM.
Implicit exceptions in service-oriented applications will result in uncertainty of system, incorrect business data, unexpected error pages, or even uncovered disaster situations. This paper proposes a context-based ap...
详细信息
Spectral clustering is one of the most popular clustering approaches. Despite its good performance, it is limited in its applicability to large-scale problems due to its high computational complexity. Recently, many a...
详细信息
Cryptanalysis of Zhou et al.'s user authentication protocol, we found that it was easily vulnerable to password guessing attack, user impersonation attack, privileged administrator attack and Dos attack if the att...
详细信息
Cryptanalysis of Zhou et al.'s user authentication protocol, we found that it was easily vulnerable to password guessing attack, user impersonation attack, privileged administrator attack and Dos attack if the attacker stole the legitimate user's smart card. Moreover, a key problem to design user authentication protocol for wireless sensor networks is to prolong the lifetime of the WSNs while guaranteeing the security. In this paper, we proposed a strong and efficient user authentication protocol for WSNs using smart card. Performance analysis shows that our proposed protocol is more secure against many popular attacks and achieves high efficiency.
As the semiconductor industry advances to nano-technology points, Network on Chip (NoC) components are becoming vulnerable to errors during the system operation. Consequently, fault-tolerant techniques for NoC are nee...
详细信息
Building a common representation for several related data sets is an important problem in multi-view learning. CCA and its extensions have shown that they are effective in finding the shared variation among all data s...
详细信息
Frequent itemsets, also called frequent patterns, are important information about databases, and mining efficiently frequent itemsets is a core problem in data mining area. Pattern growth approaches, such as the class...
详细信息
As the volumes of web images have grown rapidly in the last decade, Content-Based Image Retrieval (CBIR) has attracted substantial interests as an effective tool to manage the images. Most existing CBIR systems focus ...
详细信息
暂无评论