The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For single-owner multi-user wireless sensor networks, there is the demand to implement the user privacy-preserving access control protocol in WSNs. Firstly, we propose a new access control protocol based on an efficient attribute-based signature. In the protocol, users need to pay for query, and the protocol achieves fine-grained access control and privacy protection. Then, the protocol is analyzed...
The existing social recommendation models mostly utilize various explicit user-generated information. Although there exist a few studies adopting the implicit relationship between users for social recommendation, however, these studies do not consider the deeper social relationship, nor simultaneously take into account two or more deeper relationships between users from different angles. To this end,...
In terms of the retail commodity sale forecast, people did more in particular aspect with commodity's single sale attribute such as the sale volume, the sale money, the season factor, but all has not considered the most important factor-profit, the profit is the key factor of retail enterprises winning the survival and development. However, such a one-sided analysis is not conducive to assist the...
The important task of correcting label noise is addressed infrequently in literature. The difficulty of developing a robust label correction algorithm leads to this silence concerning label correction. To break the silence, we propose two algorithms to correct label noise. One utilizes self-training to re-label noise, called Self-Training Correction (STC). Another is a clustering-based method, which...
Classification of microarray data has always been a challenging task due to the enormous number of genes. Finding a small, closely related gene set to accurately classify disease cells is an important research problem. Integrating biological knowledge into genomic analysis to help to improve the interpretation of the results is an effective approach. In this paper, affinity propagation (AP) clustering...
Dynamic functional interaction has received much attention recently in the field of neuroimaging. Past studies reveal that the dynamics of functional interactions only exists in part of brain. In this paper, a novel Bayesian inference model is developed to bi-partition the brain regions into dynamic/stable sub networks and to simultaneously segment the temporal sequence of dynamic network into several...
Multiple recent neuroimaging studies have demonstrated that the human brain's function undergoes remarkable temporal dynamics. However, quantitative characterization and modeling of such functional dynamics have been rarely explored. To fill this gap, we presents a novel Bayesian connectivity change point model (BCCPM), to analyze the joint probabilities among the nodes of brain networks between different...
Many SOA applications are now migrating to cloud servers, due to cloud's low cost provision, elasticity for growth, and better availability. Although cloud service providers have implemented reliable management system for their infrastructure, hybrid cloud users often lack easy monitoring and diagnosis facilities to discover the root cause of end-to-end QoS violations. However, the cause must be identified...
The improvement of file access performance is a great challenge in real-time cloud services. In this paper, we analyze preconditions of dealing with this problem considering the aspects of requirements, hardware, software, and network environments in the cloud. Then we describe the design and implementation of a novel distributed layered cache system built on the top of the Hadoop Distributed File...
Many existing implementations of TCP congestion control algorithms are mainly designed for public internet, which are needed to consider RTTs fairness and bandwidth and time-delay of unknown network. But these principles have shortcomings in data transmission in long-distance and high bandwidth-delay private network, which seriously affects the transmission performance and bandwidth utilization. Based...
While the difficulty and complexity of simulation system increasing, the development efficiency and execution performance of the large-scale distributed simulation system (LSDSS) must be improved effectively. Furthermore, while the multi-core has become popular hardware, yet the traditional federate mechanism couldn't utilize and schedule the CPU resource, which would limit the simulation performance...
Data creditability plays a very important role in the complex system simulation creditability. From the point of how to evaluate and improve the complex system simulation data creditability, the concept of the data quality modeling is advanced and the three-dimension data quality modeling space is founded. Based on which, a multiple attributes decision making theory based data creditability evaluating...
Data-parallel programming model (DPPM for short) specialized for data-intensive computing becomes considerable popular because it simplifies the development of distributed parallel programs. DPPMs are classified into two categories: 1) MapReduce, Dryad; and 2) Piccolo, Function Flow, etc. based on their maturity. We analyze and compare these typical models by deployment, application, data partition,...
Software as a Service is becoming a popular research field in software development for its feature of low costing entry, easy implementation and zero infrastructure. SaaS is a multi tenant model which is different from traditional software in user data security, software development and deployment. This paper firstly analyses SaaS architecture, secondly introduces key technology of SaaS system from...
Flood disaster is one of the major natural disasters, the frequency and destructive power of it ranks one of the top disasters in China. In the flood risk assessment, the distribution of drainage network is a very important assessment factor. This study extract the watershed features of Pearl River Basin and Luan River Basin based on the Digital Elevation Model (DEM) and GIS-supported geospatial data...
Spatial database information stores with vector form in Geographic information system based on Web (WebGIS), relational database information stores with two dimension form, they are not to convert for each other directly, and to lead to universal is weak, availability of spatial data is low. In order to solve this problem, this paper proposes a way which uses XML as the middle carrier to achieve data...
Low-rate denial-of-service attack is a novel category of DDoS attacks. The paper defines defense performance as metric to analyze whether the degree of distribution of attack sources impacts the LDoS attack greatly. From the result of simulation on NS2, the deeper degree of distributed, the better defense performance of Droptail (passive queue management), and the worse defense performance of RED...
ArcGIS Geoprocessing is an important part of ArcGIS, which is a large-scale geographic information system software launched by ESRI corporation. The ArcGIS Geoprocessing provides an application-oriented and Process-oriented spatial analysis modeling method, so it's a very useful assistant decision-making and programming tools. Project Site location is a typical multifactor comprehensive evaluation...
A major issue in the resource allocation problem, also known as the data and service allocation problem, in a networked organization is the key problem in Web services distribution. A detailed investigation is carried out of the resource allocation model of allocating data and application services across a distributed networking system. The data and application service allocation problem is modeled...
PRESENT, proposed by A. Bogdanov et al. in CHES 2007, is an ultra-lightweight symmetric cipher for extremely constrained environments such as RFID tags and sensor networks. In this article, a representative platform, 0.25 μm 1.8 V standard cell circuit is proposed to complement the PRESENT, the simulation-based ASIC experimental environment is built to acquire power data. According to the fact that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.