The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Various types of structured information in Chinese encyclopedia HDWiki like as Wikipedia were divided into three categories: concept, relationship and entity. This paper described a novel symbols guided search that facilitated user to format unambiguous and complex logical queries in the logic of natural language. This facilitation and understanding base on the ternary relationships exist among the...
With the development of mobile technology, Internet and GIS, LBS plays an important role in various applications. As the basis of LBS, the research on acquisition, processing, storage, query of mobile object trajectories has been quite mature, but the analysis and the application of movement patterns contained in mobile object trajectories is relatively lagging behind. The calculation of trajectory...
Recommender system emerges as a technology addressing "information overload" problem. Collaborative Filtering (CF) is successful and widely used in many personalized recommender applications, such as digital library, e-commerce, news sites, and so on. However, most collaborative filtering algorithms suffer from data sparsity problem which leads to inaccuracy of recommendation. This paper...
A new method to compute the similarity of two blog posts is proposed in this paper. This method mainly has two parts including keywords extraction and semantic similarity measurement. During keywords extraction part, the method utilizes particular post features to extract keywords from one blog post with the aim to improve the correlation rate. In order to compute the similarity of any two blog posts...
The openness of Internet leads to security problems of network, among which content security is an important problem. In order to solve the problem effectively, a security scheme of information content which based on content security ontology (CSO) is presented. CSO is extracted from a security kernel (SK) which is a lexicon of information security knowledge drawing out from general thesaurus and...
Blog post summarization using fast features facilitates users' quick browsing through blog search results. Much existing research on blogs ignores blog tags and text structure. In this paper, we re-formalize the blog post summarization problem as a sentence extraction and sentence ranking problem. Three fast features, important sentences, blog tags and blog comments, are proposed to calculate salience...
For security and share of Internet IP addresses, NAT (network address translation) firewalls are widely used to isolate the private networks from Internet in some enterprises/organizations. Unfortunately, NATs block the data transmitted directly between two clients under different private networks in many P2P (peer to peer) applications. A protocol, STUN, has been proposed by IETF to solve the problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.