The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Links between issue reports and corresponding fix commits are widely used in software maintenance. The quality of links directly affects maintenance costs. Currently, such links are mainly maintained by error-prone manual efforts, which may result in missing links. To tackle this problem, automatic link recovery approaches have been proposed by building traditional classifiers with positive and negative...
In modern network devices the query performance for a hashing method degrades sharply due to non-determinism incurred by hash collision. Although previous collision resolution mechanisms have made remarkable progress, there is still much room to improve deterministic performance by resolving hash collisions more effectively. Further, the use of probabilistic, on-chip, summaries such as Bloom filters...
Financial report readability is an important factor influencing the decision usefulness of accounting report, which has become a common concern problem of both accounting theory and practice. For study on financial report readability, it is gradually mature in foreign countries, but in China, due to the limited measurement method of readability and other factors, the study on financial report readability...
The evaluation of the city public emergency capability is an important basis of the development of the city emergency capability. This paper made a evaluation to the eight sample cities based on the Fuzzy Set Theory. And the sample cities are choice by the three criteria such as disaster distribution, city type and geography location and so on. And they are Nanning, Harbin, Yinchuan, Shenyang, Jinan,...
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider...
In this paper, based on the 1961–2010 daily observation data in Jiangsu province and monthly circulation index data reorganized by National Climate Center, we analyzed the rime and glaze days, using fuzzy clustering, wavelet analysis, trend analysis, and relative analysis methods, etc, to investigate the freezing weather characteristics in Jiangsu province. The results are as follows: (1) There are...
A new grey incidence analysis model is presented in this paper based on nearness perspective for risk assessment of engineering project bidding. Compared with the general grey incidence analysis model, base on correlation analysis the new model is proved to be more reliable by a simple risk assessment example. Furthermore, the effectiveness of the new model is also verified through a practical case...
The foundation of resettlement works is that selection of resettlement region. In the procedure of select settlements, it not only needs consider that human factors, like society, economy, culture, etc, but also considers that natural factors, like resource, environment, geology, etc. In this paper, a Multi-Criteria spatial decision model is designed and constructed that considers multitudinous factors...
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and recovers reputation scores from a novel angle: combination of temporal analysis and user correlation analysis. Benefiting from the rich information in the time-domain, TAUCA identifies the products under attack, the time...
This article bases on education evaluating theory and uses computers and multi-level evaluation method. It creates a set of evaluation index system and evaluation of mathematical models which can reflect the characteristics of the physical education teachers work in the universities. It provides a scientific assessment and what it provides is very useful.
The matching of sensor and weapon system is important for the whole combat system. Combat system would have the optimum efficacy only if the indexes of sensor and weapon system attained to the best matching status. A method of optimization matching of sensor and weapon system based on geometric programming was given. This method means to construct a GP model, the target function of which would be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.