Skip to main content

previous disabled Page of 10
and
  1. No Access

    Chapter and Conference Paper

    Unsafe Driving Behavior Prediction for Electric Vehicles

    There is an increasing availability of electric vehicles in recent years. With the revolutionary motors and electric modules within the electric vehicles, the instant reactions bring up not only improved drivi...

    Jiaxiang Huang, Hao Lin, Junjie Yao in Web and Big Data (2021)

  2. No Access

    Chapter and Conference Paper

    Analyze and Evaluate Database-Backed Web Applications with WTool

    Web applications demand low latency. In database-backed web applications, the latency is sensitive to the efficiency of database access. Hence, previous works have proposed various techniques to optimize the d...

    Zhou Zhou, XuJia Yao in Web and Big Data (2021)

  3. No Access

    Chapter and Conference Paper

    \(\mathbb {PSG}\) : Local Privacy Preserving Synthetic Social Graph Generation

    Social graph, as a representation of the network topology, contains users’ social relationship. In order to obtain a social graph, a server requires users to submit their relationships. As we know, using or pu...

    Hongyu Huang, Yao Yang, Yantao Li in Collaborative Computing: Networking, Appli… (2021)

  4. No Access

    Chapter and Conference Paper

    A Distribution-Aware Training Scheme for Learned Indexes

    The recent proposal of the learned index leads us to a new direction to optimize indexes. With the help of learned models, it has demonstrated promising performance improvement compared with traditional indexe...

    Youyun Wang, Chuzhe Tang, Xujia Yao in Web and Big Data (2021)

  5. No Access

    Chapter and Conference Paper

    Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks

    Mobile Crowdsensing (MCS) platforms often require workers to provide their locations for task allocation, which may cause privacy leakage

    Mohan Fang, Juan Yu, Jianmin Han, **n Yao in Collaborative Computing: Networking, Appli… (2021)

  6. No Access

    Chapter and Conference Paper

    Loopster++: Termination Analysis for Multi-path Linear Loop

    Loop structure is widely adopted in many applications, e.g. collaborative applications, social network applications, and edge computing. And the termination of the loop is of great significance to the correctness...

    Hui **, Weimin Ge, Yao Zhang, **aohong Li in Collaborative Computing: Networking, Appli… (2021)

  7. No Access

    Chapter and Conference Paper

    The Attitudes of Chinese Online Users Towards Movie Piracy: A Content Analysis

    Movies piracy has raised growing concerns in digital time. However, most studies on movie piracy focused on university students, paying less attention to the exploration of the comprehensive factors among onli...

    Yao Lyu, Juan **e, Bingbing **e in Sustainable Digital Communities (2020)

  8. No Access

    Chapter

    A Data Services Composition Approach for Continuous Query on Social Media Streams

    We witness a rapid increase in the number of social media streams due to development of Web2.0, IoT and Cloud Computing technology. These sources include both traditional relational databases and streaming dat...

    Guiling Wang, **aojiang Zuo, Marc Hesenius in Transactions on Large-Scale Data- and Know… (2019)

  9. No Access

    Chapter and Conference Paper

    An Effective Buffer Management Policy for Opportunistic Networks

    Opportunistic networks are wireless networks where disruptions may occur frequently due to the challenging environments. Multiple message replicas have to be propagated to improve delivery probability; combini...

    Yin Chen, Wenbin Yao, Ming Zong in Collaborate Computing: Networking, Applica… (2017)

  10. No Access

    Chapter and Conference Paper

    Dynamic Load Balancing for Software-Defined Data Center Networks

    In recent years, along with the increasing demand for cloud services, the network traffic is increased inside data center networks (DCNs). The inherent defects of TCP/IP network architecture have hindered the ...

    Yun Chen, Weihong Chen, Yao Hu in Collaborate Computing: Networking, Applica… (2017)

  11. No Access

    Chapter and Conference Paper

    Detecting False Information of Social Network in Big Data

    With the rapid development of social network, the information announced by this platform attracts more and more attention, because of the great harm brought by the false information, researching the false inf...

    Yi Xu, Furong Li, Jianyi Liu, Ru Zhang in Collaborate Computing: Networking, Applica… (2017)

  12. No Access

    Chapter and Conference Paper

    Boost Clickbait Detection Based on User Behavior Analysis

    Article in the web is usually titled with a misleading title to attract the users click for gaining click-through rate (CTR). A clickbait title may increase click-through rate, but decrease user experience. Th...

    Hai-Tao Zheng, **n Yao, Yong Jiang, Shu-Tao **a, ** **ao in Web and Big Data (2017)

  13. No Access

    Chapter and Conference Paper

    Location-Based Top-k Term Querying over Sliding Window

    In part due to the proliferation of GPS-equipped mobile devices, massive svolumes of geo-tagged streaming text messages are becoming available on social media. It is of great interest to discover most frequent...

    Ying Xu, Lisi Chen, Bin Yao, Shuo Shang in Web Information Systems Engineering – WISE… (2017)

  14. No Access

    Chapter and Conference Paper

    PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network

    Power demand forecasting is a critical task to achieve efficiency and reliability in the smart grid in terms of demand response and resource allocation. This paper proposes PowerLSTM, a power demand forecastin...

    Yao Cheng, Chang Xu, Daisuke Mashima in Advanced Data Mining and Applications (2017)

  15. No Access

    Chapter and Conference Paper

    Fault Detection and Localization in Distributed Systems Using Recurrent Convolutional Neural Networks

    Early detection of faults is essential to maintaining the reliability of a distributed system. While there are many solutions for detecting faults, handling high dimensionality and uncertainty of system observ...

    Guangyang Qi, Lina Yao, Anton V. Uzunov in Advanced Data Mining and Applications (2017)

  16. No Access

    Chapter and Conference Paper

    Employing Hierarchical Clustering and Reinforcement Learning for Attribute-Based Zero-Shot Classification

    Zero-shot classification (ZSC) is a hot topic of computer vision. Because the training labels are totally different from the testing labels, ZSC cannot be dealt with by classical classifiers. Attribute-based c...

    Bin Liu, Li Yao, Junfeng Wu, **aosheng Feng in Advanced Data Mining and Applications (2017)

  17. No Access

    Chapter and Conference Paper

    Calling for Response: Automatically Distinguishing Situation-Aware Tweets During Crises

    Recent years have witnessed the prevalence and use of social media during crises, such as Twitter, which has been becoming a valuable information source for offering better responses to crisis and emergency si...

    **aodong Ning, Lina Yao, **anzhi Wang in Advanced Data Mining and Applications (2017)

  18. No Access

    Chapter and Conference Paper

    A Kernel-Based Approach to Develo** Adaptable and Reusable Sensor Retrieval Systems for the Web of Things

    In the era of the Web of Things, a vast number of sensors and data streams are accessible to client applications as Web resources. Web Sensor Retrieval systems (WSR) help client applications to access Web-enab...

    Nguyen Khoi Tran, Quan Z. Sheng in Web Information Systems Engineering – WISE… (2017)

  19. No Access

    Chapter and Conference Paper

    A Secure and Robust Covert Channel Based on Secret Sharing Scheme

    Network covert channel (referred to as network steganography) is a covert communication technique that uses the redundancies of network protocols to transfer secret information. While encryption only protects ...

    **aorong Lu, Yang Wang, Liusheng Huang, Wei Yang in Web Technologies and Applications (2016)

  20. No Access

    Chapter and Conference Paper

    A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems

    Recommender system has become one of the most popular techniques to cope with the information overload problem. In the past years many algorithms have been proposed to obtain accurate recommendations. Such met...

    Penghua Yu, Lanfen Lin, Yuangang Yao in Web-Age Information Management (2016)

previous disabled Page of 10