Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities
With the demand of agile development and management, cloud applications today are moving towards a more fine-grained microservice paradigm, where smaller and simpler functioning parts are combined for providing end-to-end services. In recent years,...
ResLNet: deep residual LSTM network with longer input for action recognition
Action recognition is an important research topic in video analysis that remains very challenging. Effective recognition relies on learning a good representation of both spatial information (for appearance) and temporal information (for motion). ...
Graph convolution machine for context-aware recommender system
The latest advance in recommendation shows that better user and item representations can be learned via performing graph convolutions on the user-item interaction graph. However, such finding is mostly restricted to the collaborative filtering (CF)...
Revenue-maximizing online stable task assignment on taxi-dispatching platforms
We identify a problem about dynamic task assignment, called RMOSM Problem, then introduce the concept Substitutable and design a novel algorithm Equation-Substitutable Online Matching (ESOM). Finally we conduct experiments that verify the ...
Exploiting comments information to improve legal public opinion news abstractive summarization
Automatically generating a brief summary for legal-related public opinion news (LPO-news, which contains legal words or phrases) plays an important role in rapid and effective public opinion disposal. For LPO-news, the critical case elements which ...
A survey of music emotion recognition
Music is the language of emotions. In recent years, music emotion recognition has attracted widespread attention in the academic and industrial community since it can be widely used in fields like recommendation systems, automatic music composing, ...
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
- Qingqing Gan,
- Joseph K. Liu,
- Xiaoming Wang,
- Xingliang Yuan,
- Shi-Feng Sun,
- Daxin Huang,
- Cong Zuo,
- Jianfeng Wang
Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining searchable features. Of various SSE schemes, most of them assume the server is honest but curious, while ...
PSLDA: a novel supervised pseudo document-based topic model for short texts
Various kinds of online social media applications such as Twitter and Weibo, have brought a huge volume of short texts. However, mining semantic topics from short texts efficiently is still a challenging problem because of the sparseness of word-...
Effort-aware cross-project just-in-time defect prediction framework for mobile apps
As the boom of mobile devices, Android mobile apps play an irreplaceable roles in people’s daily life, which have the characteristics of frequent updates involving in many code commits to meet new requirements. Just-in-Time (JIT) defect prediction ...
Defense against local model poisoning attacks to byzantine-robust federated learning
The letter gives an effective defense paradigm to defend against local model poisoning attack in FL without auxiliary dataset, which further enhances the robust of Byzantine-robust aggregation rules to local model poisoning attack. The ...
On the hardness of NTRU problems
The hardness of NTRU problem affects heavily on the securities of the cryptosystems based on it. However, we could only estimate the hardness of the specific parameterized NTRU problems from the perspective of actual attacks, and whether there are ...
String kernels construction and fusion: a survey with bioinformatics application
The kernel method, especially the kernel-fusion method, is widely used in social networks, computer vision, bioinformatics, and other applications. It deals effectively with nonlinear classification problems, which can map linearly inseparable ...
A structural variation genotyping algorithm enhanced by CNV quantitative transfer
Genotyping of structural variations considering copy number variations (CNVs) is an infancy and challenging problem. CNVs, a prevalent form of critical genetic variations that cause abnormal copy numbers of large genomic regions in cells, often ...
Data fusing and joint training for learning with noisy labels
It is well known that deep learning depends on a large amount of clean data. Because of high annotation cost, various methods have been devoted to annotating the data automatically. However, a larger number of the noisy labels are generated in the ...
Instance-sequence reasoning for video question answering
Video question answering (Video QA) involves a thorough understanding of video content and question language, as well as the grounding of the textual semantic to the visual content of videos. Thus, to answer the questions more accurately, not only ...
An approach for detecting LDoS attack based on cloud model
Cybersecurity has always been the focus of Internet research. An LDoS attack is an intelligent type of DoS attack, which reduces the quality of network service by periodically sending high-speed but short-pulse attack traffic. Because of its ...
Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand
A novel continuous model for the LCAP with dense demand is proposed in this letter. Various demand densities are employed to adapt the population distribution in the market region, and a set of weighting coefficients are used to characterize the ...
CrowdDesigner: information-rich and personalized product description generation
Experimental results show that the CrowdDesigner outperforms several strong personalized product description generation methods in personal interest coverage, language organization and detailed product information. In addition, the personalized ...
Low-cost client-side encryption and secure Internet of things (IoT) provisioning
Security and ease of provisioning of IoT devices onto cloud infrastructure is instrumental to the deployment of IoT devices. With not much information available on the ease of secure provisioning of IoT devices couple with inherent challenge of ...