Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Table Of Content Section
review-article
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities
Abstract

With the demand of agile development and management, cloud applications today are moving towards a more fine-grained microservice paradigm, where smaller and simpler functioning parts are combined for providing end-to-end services. In recent years,...

research-article
ResLNet: deep residual LSTM network with longer input for action recognition
Abstract

Action recognition is an important research topic in video analysis that remains very challenging. Effective recognition relies on learning a good representation of both spatial information (for appearance) and temporal information (for motion). ...

research-article
Graph convolution machine for context-aware recommender system
Abstract

The latest advance in recommendation shows that better user and item representations can be learned via performing graph convolutions on the user-item interaction graph. However, such finding is mostly restricted to the collaborative filtering (CF)...

letter
Revenue-maximizing online stable task assignment on taxi-dispatching platforms
Conclusion

We identify a problem about dynamic task assignment, called RMOSM Problem, then introduce the concept Substitutable and design a novel algorithm Equation-Substitutable Online Matching (ESOM). Finally we conduct experiments that verify the ...

research-article
Exploiting comments information to improve legal public opinion news abstractive summarization
Abstract

Automatically generating a brief summary for legal-related public opinion news (LPO-news, which contains legal words or phrases) plays an important role in rapid and effective public opinion disposal. For LPO-news, the critical case elements which ...

review-article
A survey of music emotion recognition
Abstract

Music is the language of emotions. In recent years, music emotion recognition has attracted widespread attention in the academic and industrial community since it can be widely used in fields like recommendation systems, automatic music composing, ...

research-article
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
Abstract

Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining searchable features. Of various SSE schemes, most of them assume the server is honest but curious, while ...

research-article
PSLDA: a novel supervised pseudo document-based topic model for short texts
Abstract

Various kinds of online social media applications such as Twitter and Weibo, have brought a huge volume of short texts. However, mining semantic topics from short texts efficiently is still a challenging problem because of the sparseness of word-...

research-article
Effort-aware cross-project just-in-time defect prediction framework for mobile apps
Abstract

As the boom of mobile devices, Android mobile apps play an irreplaceable roles in people’s daily life, which have the characteristics of frequent updates involving in many code commits to meet new requirements. Just-in-Time (JIT) defect prediction ...

letter
Defense against local model poisoning attacks to byzantine-robust federated learning
Conclusion

The letter gives an effective defense paradigm to defend against local model poisoning attack in FL without auxiliary dataset, which further enhances the robust of Byzantine-robust aggregation rules to local model poisoning attack. The ...

research-article
On the hardness of NTRU problems
Abstract

The hardness of NTRU problem affects heavily on the securities of the cryptosystems based on it. However, we could only estimate the hardness of the specific parameterized NTRU problems from the perspective of actual attacks, and whether there are ...

review-article
String kernels construction and fusion: a survey with bioinformatics application
Abstract

The kernel method, especially the kernel-fusion method, is widely used in social networks, computer vision, bioinformatics, and other applications. It deals effectively with nonlinear classification problems, which can map linearly inseparable ...

research-article
A structural variation genotyping algorithm enhanced by CNV quantitative transfer
Abstract

Genotyping of structural variations considering copy number variations (CNVs) is an infancy and challenging problem. CNVs, a prevalent form of critical genetic variations that cause abnormal copy numbers of large genomic regions in cells, often ...

research-article
Data fusing and joint training for learning with noisy labels
Abstract

It is well known that deep learning depends on a large amount of clean data. Because of high annotation cost, various methods have been devoted to annotating the data automatically. However, a larger number of the noisy labels are generated in the ...

research-article
Instance-sequence reasoning for video question answering
Abstract

Video question answering (Video QA) involves a thorough understanding of video content and question language, as well as the grounding of the textual semantic to the visual content of videos. Thus, to answer the questions more accurately, not only ...

research-article
An approach for detecting LDoS attack based on cloud model
Abstract

Cybersecurity has always been the focus of Internet research. An LDoS attack is an intelligent type of DoS attack, which reduces the quality of network service by periodically sending high-speed but short-pulse attack traffic. Because of its ...

letter
Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand
Conclusion

A novel continuous model for the LCAP with dense demand is proposed in this letter. Various demand densities are employed to adapt the population distribution in the market region, and a set of weighting coefficients are used to characterize the ...

letter
CrowdDesigner: information-rich and personalized product description generation
Conclusion

Experimental results show that the CrowdDesigner outperforms several strong personalized product description generation methods in personal interest coverage, language organization and detailed product information. In addition, the personalized ...

letter
Low-cost client-side encryption and secure Internet of things (IoT) provisioning
Conclusion

Security and ease of provisioning of IoT devices onto cloud infrastructure is instrumental to the deployment of IoT devices. With not much information available on the ease of secure provisioning of IoT devices couple with inherent challenge of ...

Comments