The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many companies want to share data for datamining tasks. However, the privacy and security concerns become a bottleneck in the data sharing filed. The secure multiparty computation (SMC)-based privacy-preserving data mining has emerged as a solution to this problem. However, traditional SMC solutions are inefficient. We introduce the method of outsourcing to reduce the computation cost of user’s side...
Delay Tolerant Networks are a special kind of ad hoc networks that consist of a number of mobile devices. In DTNs, network topology frequently changes and source-to-destination communication paths can hardly be sustained. However, some social features have been observed in DTNs by analyzing the real mobile trajectories of DTNs. To utilize these social features to facilitate data routing, we present...
Genome-wide expression data consists of millions of measurements towards large number of genes, and thus it is challenging for human beings to directly analyze such large-scale data. Clustering provides a more convenient way to analyze gene expression data because it can subdivide raw data into comprehensive classes. However, the number of probed genes is rather greater than the number of samples,...
Non-negative matrix factorization (NMF) decomposes a group of non-negative examples into both lower-rank factors including the basis and coefficients. It still suffers from the following deficiencies: 1) it does not always ensure the decomposed factors to be sparse theoretically, and 2) the learned basis often stays away from original examples, and thus lacks enough representative capacity. This paper...
Non-negative matrix factorization (NMF) decomposes any non-negative matrix into the product of two low dimensional non-negative matrices. Since NMF learns effective parts-based representation, it has been widely applied in computer vision and data mining. However, traditional NMF has the risk learning rank-deficient basis on high-dimensional dataset with few examples especially when some examples...
Non-negative matric factorization (NMF) decomposes a given data matrix X into the product of two lower dimensional non-negative matrices U and V. It has been widely applied in pattern recognition and computer vision because of its simplicity and effectiveness. However, existing NMF methods often fail to learn the sparse representation on high-dimensional dataset, especially when some examples are...
In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic services over Open Wireless Network (OWN) downlink is proposed. And the main novelty of this paper is that it solves the resource allocation problem about the users in overlap region of adjacent cells through central controller without the communication between different cells. Also, we have...
Much of today's online social network (OSN) system relies on advertising for financial support. To improve the effectiveness of advertising, online advertisers tend to leverage influential users to deliver ads. Most of existing efforts on online advertising have focused on single-shot scenarios or assume static OSN models, while they overlook the fact that actions of advertising affect users' behaviors...
This chapter reviews the basic physics behind recent attosecond measurements of electronic dynamics in atoms, solid surfaces, and nanoparticles at a level accessible to a beginning physics graduate student. It discusses the time‐resolved “dressed” (or “streaked” photoemission and photoemission delay times based on the comparison of calculated, time‐resolved photoelectron spectra with recent experiments...
With the rapid development of the Internet, SNS services and 3G commercial mobile applications which brings tremendous opportunity, although the time on the development of SNS is very short in China, social web game is in the early stage of development, because of massive user, the potential commercial value of Chinese SNS is still a great mining space. A relatively large defects is the precipitation...
The next generation of wireless networks will integrate multiple radio access technologies, which constitute the heterogeneous network. The performance of the network and user experience will depend on a good use of the radio resource heavily. With the development of mobile Internet, a large amount of intelligent terminal applications emerge. Specifically, the multimedia applications, which will take...
With the increasingly rapid growth of micro-blogging services, influence analysis is becoming a very important topic in this area. Sina Weibo, one of the largest mirco-blogging services in China, has provided a new operation comment-only, which allows users to give feedback on a post without forwarding. However, most of existing works focus on Twitter, which fail to consider this new operation. In...
In recent years, big data processing has been a trend. Hadoop and some other cloud computing technologies make batch processing possible to process big data. Storm is like a real-time Hadoop. Storm model is easy, but it's difficult to deal with complex Topology due to the increasing inter-dependences between components. This paper proposes a novel method which simplifies the Storm Topology programming...
The K-means algorithm is one of the most well-known clustering algorithms that has been frequently used to variety of problems. However, its processing performance has usually encountered a bottleneck if used to deal with massive data. Since MapReduce as the most popular cloud computing parallel framework is effective to handle massive data, the researches of K-means clustering algorithm which is...
Pervasive computing is a computing method which emphasizes people oriented. This method advocates the idea that computing has to meet humans' habits. Context aware is one of core technology of pervasive computing. Association rules mining is a method that mine and detect the relation between event with another event or item from mass datasets. However, traditional association rules mining only takes...
Today, the personalized recommendation is one of the most important technologies in the Internet and e-commerce system, along with the increasing number of users and commodities. Among personalized recommendation algorithms, CF (Collaborate Filtering) has been researched for many years. The similarity computation method, which is the key in personalized recommender, like cosine theorem or pearson...
The increasing number of mobile terminals facilitates the development of context-aware applications. However, developing a context aware application is still a complex work, which involves mechanisms of context acquisition and context processing. In order to release the developer's burden, many context aware frameworks emerged. But none of them yet has sufficient consideration of mobile environment...
This paper provides a technique which is used for design application server/multimedia resource function (AS/MRF) based on IMS for point to points multimedia sharing service. In this paper, mainly illuminates a method which is used to research and design the functions and service of AS/MRF and gives the signaling process of multiplayer sharing service. Finally, builds IMS multimedia sharing service...
This paper researches on IMS multimedia sharing service modes. Multimedia sharing service allows service users to share multimedia in a variety of multimedia sharing modes with one or more IMS multimedia sharing service users through IMS multimedia service system (but not limited to) using an IMS multimedia sharing client. This paper concretely studies and designs the functions and service flows for...
As a classical structed P2P model, Chord offers many salient features. The key issue of strengthening the system is how to deal with the influence from the frequent change of the nodes and promote the query efficiency. To advance the Chord performance, we propose a new model based on group autonomy which is called GA_Chord. A new table is added to differentiate all nodes into many neighbor groups...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.