Due to data imbalance, existing spammer group detection methods often yield suboptimal performance. Moreover, many of these approaches operate as black boxes, offering little to no interpretability for their detection...
详细信息
In this paper, we focus on efficient processing of XML keyword queries based on smallest lowest common ancestor (SLCA) semantics. For a given query Q with m keywords, we propose to use stable matches as the basis fo...
详细信息
In this paper, we focus on efficient processing of XML keyword queries based on smallest lowest common ancestor (SLCA) semantics. For a given query Q with m keywords, we propose to use stable matches as the basis for SLCA computation, where each stable match M consists of m nodes that belong to the m distinct keyword inverted lists of Q. M satisfies that no other lowest common ancestor (LCA) node of Q can be found to be located after the first node of M and be a descendant of the LCA of M, based on which the operation of locating a stable match can skip more useless nodes. We propose two stable match based algorithms for SLCA computation, i.e., BSLCA and HSLCA. BSLCA processes two keyword inverted lists each time from the shortest to the longest, while HSLCA processes all keyword inverted lists in a holistic way to avoid the problem of redundant computation invoked by BSLCA. Our extensive experimental results verify the performance advantages of our methods according to various evaluation metrics.
In this letter, a periodic autocorrelation signal is presented, which is the ternary sequence pair with two-level autocorrelation. The methods of constructing ternary sequence pairs based on binary sequence pairs and ...
详细信息
The existing recommendation algorithms have lower robustness against shilling attacks. With this in mind, in this paper we propose a robust recommendation algorithm based on the identification of suspicious users and ...
详细信息
In the paper, we present a new method for constructing a class of quaternary sequence pairs with even period 2N from the known binary sequence pairs with odd period N by using the reverse Gray mapping and interleaving...
详细信息
In this paper, we try to systematically study how to perform doctor recommendation in medical social net- works (MSNs). Specifically, employing a real-world medical dataset as the source in our work, we propose iBol...
详细信息
In this paper, we try to systematically study how to perform doctor recommendation in medical social net- works (MSNs). Specifically, employing a real-world medical dataset as the source in our work, we propose iBole, a novel hybrid multi-layer architecture, to solve this problem. First, we mine doctor-patient relationships/ties via a time-constraint probability factor graph model (TPFG). Second, we extract network features for ranking nodes. Finally, we propose RWR- Model, a doctor recommendation model via the random walk with restart method. Our real-world experiments validate the effectiveness of the proposed methods. Experimental results show that we obtain good accuracy in mining doctor-patient relationships from the network, and the doctor recommendation performance is better than that of the baseline algorithms: traditional Ranking SVM (RSVM) and the individual doctor recommendation model (IDR-Model). The results of our RWR-Model are more reasonable and satisfactory than those of the baseline approaches.
Multi-access Edge Computing (MEC) has been a promising solution that enables Internet of Things (IoT) devices to support computation-intensive applications by offloading some tasks to the network edge. However, most e...
Multi-access Edge Computing (MEC) has been a promising solution that enables Internet of Things (IoT) devices to support computation-intensive applications by offloading some tasks to the network edge. However, most existing offloading methods in MEC systems are based on the premise of scenarios with either single-type or stable users, which is not aligned with the practical situations of users’ diversity and mobility. In addition, these methods always ignore energy saving strategies in MEC systems, which inevitably degrades Utility Energy Efficiency (UEE). To tackle these issues, considering personalized requirements from diverse users and idle energy consumption in MEC servers, we propose a novel computation offloading architecture with adaptive sleeping mechanism and heterogeneous MEC servers. Based on the architecture, we investigate energy-efficient computation offloading in mobility-aware MEC systems with diverse users. Under the Deep Reinforcement Learning (DRL) framework, we propose a Twin Delayed Deep Deterministic Policy Gradient Algorithm with Bursty Traffic (TD3-BT), in which the inherent correlation of task arrivals is taken into account to capture the behavior of correlated traffic and provide rational metrics estimation within one time slot. A long-term system cost minimization problem is formulated to optimize computation offloading for the trade-off between system delay and UEE. Assisted by TD3-BT, the formulated problem is effectively solved and the decision making in each time slot is provided for diverse users. Experimental results demonstrate that our TD3-BT algorithm achieves superior performance under various offloading scenarios compared to some benchmarks.
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support...
详细信息
Ensuring end-to-end cross-layer communication security in military networks by selecting covert schemes between nodes is a key solution for military communication security. With the development of communication techno...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing sets. By extracting the most representative passing and failing graphs based on these sets, the discriminative sub-graph is mined between the two representative graphs. First, Sig BB searches the max common graph, and then gets the opposite nodes set. The discriminative sub-graph is obtained by organizing and extending the set finally. Since the detected code scale is associated with the sorting of suspicious nodes, a suspicious metric strategy is also designed to sort the nodes in the discriminative sub-graph. Experimental results indicate that our method is both effective and efficient for software fault localization.
暂无评论