The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new version of the LBRW (Learning based Random Walk), LBRW-Co, for predicting users co-occurrence based on mobility homophily and social links. More precisely, we analyze and mine jointly spatio-temporal and social features with the aim to predict and rank users co-occurrences. Experiments are performed on the Foursquare LBSN with accurate and refined measurements. Experimental...
A huge amount of video content has been generated on the Internet, and user attention among those videos is allocated in an asymmetric way, with the vast majority barely noticed while a few of videos become very popular. Hence, understanding the popularity characteristics of online videos and predicting the future popularity of individual videos are of great importance. They have direct implications...
In this paper, we attempt to predict users' quality of experience (QoE) with the log data collected from the web sites of Internet video service providers. To this end, we first collect service log data in the wild from one of the Top 5 most popular providers in China. Then we do a series of data preprocessing to format the original semi-structured log data to structured. We calculate several key...
Development organizations often do not have time to perform security fortification on every file in a product before release. One way of prioritizing security efforts is to use metrics to identify core business logic that could contain vulnerabilities, such as database interaction code. Database code is a source of SQL injection vulnerabilities, but importantly may be home to unrelated vulnerabilities...
In this paper we propose a quantitative model to study user satisfaction level in online video streaming, which features great variety across video access sessions under the impact of network conditions and user-specific factors. By applying survival analysis to video session duration ratio, which in our study is regarded to be a measure of user satisfaction level, we find user satisfaction is not...
Weblogs (blogs) serve as a gateway to a large blog reader population, so blog authors can potentially influence a large reader population by expressing their thoughts and expertise in their blog posts. An important and complex problem, then, is figuring out why and how influence propagates through the blogosphere. While a number of previous research has looked at the network characteristics of blogs...
As computer systems become increasingly complex, system anomalies have become major concerns in system management. In this paper, we present a comprehensive measurement study to quantify the predictability of different system anomalies. Online anomaly prediction allows the system to foresee impending anomalies so as to take proper actions to mitigate anomaly impact. Our anomaly prediction approach...
A recent trend for data-intensive computations is to use pay-as-you-go execution environments that scale transparently to the user. However, providers of such environments must tackle the challenge of configuring their system to provide maximal performance while minimizing the cost of resources used. In this paper, we use statistical models to predict resource requirements for Cloud computing applications...
With the rapid growth of the Internet and database technologies in recent years, question answering systems (QAS) have emerged as important applications. As most evaluation models focus on system-centered evaluation, user-centered evaluation has attracted little attention. Although many QAS have been implemented, little work has been done on the development of a user-centered evaluation for QAS. User-centered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.