194 Result(s)
-
Chapter and Conference Paper
Unsafe Driving Behavior Prediction for Electric Vehicles
There is an increasing availability of electric vehicles in recent years. With the revolutionary motors and electric modules within the electric vehicles, the instant reactions bring up not only improved drivi...
-
Chapter and Conference Paper
Analyze and Evaluate Database-Backed Web Applications with WTool
Web applications demand low latency. In database-backed web applications, the latency is sensitive to the efficiency of database access. Hence, previous works have proposed various techniques to optimize the d...
-
Chapter and Conference Paper
\(\mathbb {PSG}\) : Local Privacy Preserving Synthetic Social Graph Generation
Social graph, as a representation of the network topology, contains users’ social relationship. In order to obtain a social graph, a server requires users to submit their relationships. As we know, using or pu...
-
Chapter and Conference Paper
A Distribution-Aware Training Scheme for Learned Indexes
The recent proposal of the learned index leads us to a new direction to optimize indexes. With the help of learned models, it has demonstrated promising performance improvement compared with traditional indexe...
-
Chapter and Conference Paper
Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks
Mobile Crowdsensing (MCS) platforms often require workers to provide their locations for task allocation, which may cause privacy leakage
-
Chapter and Conference Paper
Loopster++: Termination Analysis for Multi-path Linear Loop
Loop structure is widely adopted in many applications, e.g. collaborative applications, social network applications, and edge computing. And the termination of the loop is of great significance to the correctness...
-
Chapter and Conference Paper
The Attitudes of Chinese Online Users Towards Movie Piracy: A Content Analysis
Movies piracy has raised growing concerns in digital time. However, most studies on movie piracy focused on university students, paying less attention to the exploration of the comprehensive factors among onli...
-
Chapter
A Data Services Composition Approach for Continuous Query on Social Media Streams
We witness a rapid increase in the number of social media streams due to development of Web2.0, IoT and Cloud Computing technology. These sources include both traditional relational databases and streaming dat...
-
Chapter and Conference Paper
An Effective Buffer Management Policy for Opportunistic Networks
Opportunistic networks are wireless networks where disruptions may occur frequently due to the challenging environments. Multiple message replicas have to be propagated to improve delivery probability; combini...
-
Chapter and Conference Paper
Dynamic Load Balancing for Software-Defined Data Center Networks
In recent years, along with the increasing demand for cloud services, the network traffic is increased inside data center networks (DCNs). The inherent defects of TCP/IP network architecture have hindered the ...
-
Chapter and Conference Paper
Detecting False Information of Social Network in Big Data
With the rapid development of social network, the information announced by this platform attracts more and more attention, because of the great harm brought by the false information, researching the false inf...
-
Chapter and Conference Paper
Boost Clickbait Detection Based on User Behavior Analysis
Article in the web is usually titled with a misleading title to attract the users click for gaining click-through rate (CTR). A clickbait title may increase click-through rate, but decrease user experience. Th...
-
Chapter and Conference Paper
Location-Based Top-k Term Querying over Sliding Window
In part due to the proliferation of GPS-equipped mobile devices, massive svolumes of geo-tagged streaming text messages are becoming available on social media. It is of great interest to discover most frequent...
-
Chapter and Conference Paper
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
Power demand forecasting is a critical task to achieve efficiency and reliability in the smart grid in terms of demand response and resource allocation. This paper proposes PowerLSTM, a power demand forecastin...
-
Chapter and Conference Paper
Fault Detection and Localization in Distributed Systems Using Recurrent Convolutional Neural Networks
Early detection of faults is essential to maintaining the reliability of a distributed system. While there are many solutions for detecting faults, handling high dimensionality and uncertainty of system observ...
-
Chapter and Conference Paper
Employing Hierarchical Clustering and Reinforcement Learning for Attribute-Based Zero-Shot Classification
Zero-shot classification (ZSC) is a hot topic of computer vision. Because the training labels are totally different from the testing labels, ZSC cannot be dealt with by classical classifiers. Attribute-based c...
-
Chapter and Conference Paper
Calling for Response: Automatically Distinguishing Situation-Aware Tweets During Crises
Recent years have witnessed the prevalence and use of social media during crises, such as Twitter, which has been becoming a valuable information source for offering better responses to crisis and emergency si...
-
Chapter and Conference Paper
A Kernel-Based Approach to Develo** Adaptable and Reusable Sensor Retrieval Systems for the Web of Things
In the era of the Web of Things, a vast number of sensors and data streams are accessible to client applications as Web resources. Web Sensor Retrieval systems (WSR) help client applications to access Web-enab...
-
Chapter and Conference Paper
A Secure and Robust Covert Channel Based on Secret Sharing Scheme
Network covert channel (referred to as network steganography) is a covert communication technique that uses the redundancies of network protocols to transfer secret information. While encryption only protects ...
-
Chapter and Conference Paper
A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems
Recommender system has become one of the most popular techniques to cope with the information overload problem. In the past years many algorithms have been proposed to obtain accurate recommendations. Such met...