The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a result of the importance of academic collaboration at smart conferences, various researchers have utilized recommender systems to generate effective recommendations for participants. Recent research has shown that the personality traits of users can be used as innovative entities for effective recommendations. Nevertheless, subjective perceptions involving the personality of participants at smart...
Massive trust assessment (MTA) in an Online Social Network (OSN), i.e., computing the trustworthiness of all users in the network, is crucial in various OSN-related applications. Existing solutions are either too slow or inaccurate in addressing the MTA problem. We propose the OpinionWalk algorithm that accurately and efficiently conducts MTA in an OSN. OpinionWalk models trust by the Dirichlet distribution...
Memory caches are being aggressively used in today's data-parallel systems such as Spark, Tez, and Piccolo. However, prevalent systems employ rather simple cache management policies — notably the Least Recently Used (LRU) policy — that are oblivious to the application semantics of data dependency, expressed as a directed acyclic graph (DAG). Without this knowledge, memory caching can at best be performed...
Fair and efficient coflow scheduling improves application-level networking performance in today's datacenters. Ideally, a coflow scheduler should provide isolation guarantees on the minimum coflow progress to achieve predictable networking performance. Network operators, on the other hand, strive to decrease the average coflow completion time (CCT). Unfortunately, optimal isolation guarantees and...
With the tremendous volume explosion of big data video contents in future wireless networks, ensuring Quality of Experience (QoE) of the End User (EU) by leveraging communication context becomes an important issue. In this paper, we propose a context-aware wireless multimedia relay solution to incentivize user devices participating in wireless relay services. In this proposed approach, QoE and price...
Large spacecrafts, such as Astronomy Observation Satellite or International Space Station docked with manned or cargo spaceship, are complex ones composed with multiple rigid and multiple flexible bodies. The rotation of the onboard expanded limbs, manipulators or solar panels with respect to the spacecraft platform would change the composite spacecraft's attitude, centroidal coordinate and moment...
Maximal Clique Enumeration (MCE) is a long standing problem in database community. Though it is extensively studied, almost all researches focus on calculating maximal cliques as a one-time effort. MCE on dynamic graph has been rarely discussed so far, the only work on this topic is to maintain maximal cliques with graph evolving. The key within this problem is to find maximal cliques that contains...
Recently, Retrospective Event Detection attracts much attention. Most researches focus on detecting coarse-grained events or frequent events. However, they neglect to discover fine grained events or important rare events which are significant for human decision making. The important rare events are different from the frequent events revealing common patterns, their features are unnoticed and cannot...
Geosynchronous Synthetic Aperture Radar (GEO-SAR) shows great potential in both civil and military applications, but it suffers from high energy requirement and difficult signal processing procedure. For the purpose of reducing energy requirement, this paper firstly analyze the carrier frequency selection problem and the burst mode of GEO-SAR on the basis of which an S band GEO-SAR system operating...
After investigating the data processing characteristics of several scientific applications in various disciplines from bioinformatics to geology, we discover that they share one common feature: raw data is written once onto a storage system and then it is read into memory once for analyzing, after which it will seldom be used in the future. Typically, these scientific applications are running on a...
We present optimization algorithm for relay (RLY) selection and, source (SRC) and RLY power allocations in a cooperative multicast millimeter-wave (mmWave) system with non-line-of-sight (non-LoS) sensing. We show that there is a significant benefit to the system outage performance by allocating powers for the SRC and the RLYs selected from the candidates availing of line-of-sight (LoS) paths. Specifically,...
The rapid development in the field of computer graphics (CG) makes it quite easy to create photo-realistic images and videos. This brings forward an emergent requirement for techniques that can distinguish CG from real contents. In this paper, we propose a method that leverages human pulse signal to distinguish between CG and real videos that include human faces. We use a robust tracking method to...
In this paper, we consider virtual machine (VM) placement problem for cloud data centers. Different from previous works, the VMs considered need to be conducted within a finite duration. However, due to the limited resource at physical machines (PMs), the VM may be unable to place on a single PM within duration. To make sure the successful placement, the VM may undergo several PMs for service, e.g...
Recently, as social networking websites become increasingly ubiquitous, there is also a surge in academia to study their potential impacts on business practice. One strand of literature focuses on the public sentiment expressed through social media and how such sentiment shape business environment. Previous researches have proved that public sentiment on social media does have an impact on movie's...
This paper concentrates on the gait transition of a quadruped robot. Animals move with different gaits to adapt to the change of terrains or just to save energy. A biomimetic robot should achieve this process in a smooth, continuous and energy efficient way. We propose a gait transition controller that can achieve needed phase difference between every two legs based on the Hopf oscillator. The quadruped...
Previous work on 802.1 1x (Wi-Fi) power control have focused almost exclusively on the mitigation of interference from data frames. Since Wi-Fi wireless access points are increasingly ubiquitous, it is now common for an 802.1 1x client to be able to receive signals from more than 10 APs simultaneously in a modern urban operating environment. At such high densities, we found that the interference from...
Big data analytics is the process of examining large amounts of data of a variety of types (big data) to uncover hidden patterns, unknown correlations and other useful information. Its revolutionary potential is now universally recognized. Data complexity, heterogeneity, scale, and timeliness make data analysis a clear bottleneck in many biomedical applications, due to the complexity of the patterns...
With the explosive growth of web-based cameras and mobile devices, billions of photographs are uploaded to the internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data applications. However, this is not an easy task due to the fact the retrieved photos are neither aligned nor calibrated. Furthermore, with the occlusion...
Sensing falsification is a key security problem in cooperative spectrum sensing for cognitive radio networks. Most previous approaches assume that malicious users only cheat in their sensing reports following a predefined rule. However, some malicious users usually act intelligently to strategically adjust their malicious behavior according to their objectives and the network's defense schemes. The...
Current research environments are witnessing high enormities of presentations occurring in different sessions at academic conferences. This situation makes it difficult for researchers (especially juniors) to attend the right presentation session(s) for effective collaboration. In this paper, we propose an innovative venue recommendation algorithm to enhance smart conference participation. Our proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.