![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Multi-cue-based face and facial feature detection on video segments
An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...
-
Article
Integrating mRNA Decay Information into Co-Regulation Study
Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...
-
Article
Mining fuzzy sequential patterns from quantitative transactions
Many researchers in database and machine learning fields are primarily interested in data mining because it offers opportunities to discover useful information and important relevant patterns in large database...
-
Article
Hiding collaborative recommendation association rules
The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, se...
-
Article
A new type of solution method for the generalized linear complementarity problem over a polyhedral cone
This paper addresses the generalized linear complementarity problem (GLCP) over a polyhedral cone. To solve the problem, we first equivalently convert the problem into an affine variational inequalities proble...
-
Article
ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer
High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...
-
Article
Physical Implementation of the Eight-Core Godson-3B Microprocessor
The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...
-
Article
Partitioning the Conventional DBT System for Multiprocessors
Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...
-
Article
Risk-neutral evaluation of information security investment on data centers
Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based model to calculate the probability of insecurity of each protected resource ...
-
Article
Mining Effective Temporal Specifications from Heterogeneous API Data
Temporal specifications for Application Programming Interfaces (APIs) serve as an important basis for many defect detection tools. As these specifications are often not well documented, various approaches have...
-
Article
Satisfiability with Index Dependency
We study the Boolean satisfiability problem (SAT) restricted on input formulas for which there are linear arithmetic constraints imposed on the indices of variables occurring in the same clause. This can be se...
-
Article
Efficient Time Synchronization Approach for Wireless Communication Systems on GPP-Based Software-Defined Radio Platform
General purpose processer (GPP) based software-defined radio (SDR) platforms provide wireless communication system engineers with maximal architecture flexibility and versatility to construct a wideband wirele...
-
Article
Using TF-IDF to hide sensitive itemsets
Data mining technology helps extract usable knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some sensitive or ...
-
Article
Sound Modulation in Singing Katydids Using Ionic Polymer-Metal Composites (IPMCs)
Many insect families have evolved to produce and detect complex singing patterns for the purposes of mating, display of dominance, predator escape, and other needs. While the mechanisms of sound production by ...
-
Article
Open AccessFeature selection and replacement by clustering attributes
Feature selection is to find useful and relevant features from an original feature space to effectively represent and index a given dataset. It is very important for classification and clustering problems, whi...
-
Article
Detecting network communities using regularized spectral clustering algorithm
The progressively scale of online social network leads to the difficulty of traditional algorithms on detecting communities. We introduce an efficient and fast algorithm to detect community structure in social...
-
Article
On anonymizing transactions with sensitive items
K-anonymity (Samarati and Sweeny 1998; Samarati, IEEE Trans Knowl Data Eng, 13(6):1010–1027, 2001; Sweeny, Int J Uncertain, Fuzziness Knowl-Based Syst, 10(5):557–570, 2002) and its variants, l-di...
-
Article
Cooperative Computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall,...
-
Article
Bionic Leaves Imitating the Transpiration and Solar Spectrum Reflection Characteristics of Natural Leaves
A novel thin film organic bionic leaf was prepared by a solution-casting method to simulate the thermal effect of transpiration and solar spectrum reflection characteristics of plant leaves. The main component...
-
Article
The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion
Data mining technology is used to extract useful knowledge from very large datasets, but the process of data collection and data dissemination may result in an inherent threat to privacy. Some sensitive or pri...