![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Crowdturfing Detection in Online Review System: A Graph-Based Modeling
With the widespread popularity of online reviews and crowdsourcing, people may publish fake comments on online review system and get paid for crowdsourcing tasks. In order to identify these reviewers, machine ...
-
Chapter and Conference Paper
Domain Adaptive Neural Sentence Compression by Tree Cutting
Sentence compression has traditionally been tackled as syntactic tree pruning, where rules and statistical features are defined for pruning less relevant words. Recent years have witnessed the rise of neural m...
-
Chapter and Conference Paper
Overview of the NLPCC 2019 Shared Task: Cross-Domain Dependency Parsing
This paper presents an overview of the NLPCC 2019 shared task on cross-domain dependency parsing, including (1) the data annotation process, (2) task settings, (3) methods, results, and analysis of submitted ...
-
Chapter and Conference Paper
Shared-Private LSTM for Multi-domain Text Classification
Shared-private models can significantly improve the performance of cross-domain learning. These methods use a shared encoder for all domains and a private encoder for each domain. One issue is that domain-spec...
-
Chapter and Conference Paper
Fuzzy Maximal Frequent Itemset Mining Over Quantitative Databases
Fuzzy frequent itemset mining is an important problem in quantitative data mining. In this paper, we define the problem of fuzzy maximal frequent itemset mining, which, to the best of our knowledge, has never ...
-
Chapter and Conference Paper
Sketch-Based Image Retrieval with a Novel BoVW Representation
A novel Bag-of-Visual-Word (BoVW) based approach is developed in this paper to facilitate more effective Sketch-based Image Retrieval (SBIR). We focus on constructing the visual vocabulary based on the BoVW re...
-
Chapter and Conference Paper
Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency
Secure scalar product protocol has wide applications for privacy-preservation in collaborative computation. In this paper, we propose a new secure scalar product protocol, which does not employ any public-key ...
-
Chapter and Conference Paper
Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner
Recently, many schemes have been proposed to support k-nearest neighbors (k-NN) query on encrypted cloud data. However, existing approaches either assume query users are fully-trusted, or require data owner to be...
-
Chapter and Conference Paper
Threshold Determination and Engaging Materials Scientists in Ontology Design
This paper reports on research exploring a threshold for engaging scientists in semantic ontology development. The domain application, nanocrystalline metals, was pursued using a multi-method approach involving a...
-
Chapter and Conference Paper
A Semantics Oriented Grammar for Chinese Treebanking
Chinese grammar engineering has been a much debated task. Whilst semantic information has been reconed crucial for Chinese syntactic analysis and downstream applications, existing Chinese treebanks lack a cons...
-
Chapter and Conference Paper
Caption Detection and Positioning in Digital Video
Captions in digital video are of great importance for video semantic understanding. In order to realize the function of caption detection and positioning, this paper first selects the frames that contain capti...
-
Chapter and Conference Paper
CIE: Learner Behavior Modeling Oriented Component Model for Edutainment Game
Edutainment games with the feature of learner behavior modeling may differ from many aspects, which made it crucial to define all related information according to a unified model. In this paper, we proposed a ...
-
Chapter and Conference Paper
An e-Learning System for Piano Instruction
This paper exhibits an e-learning system that combines hardware and software in order to build a platform for piano instruction. Firstly, we set the e-learning system in contrast with traditional teaching. The...
-
Chapter and Conference Paper
A Secure Mix Network with an Efficient Validity Verification Mechanism
A new mix network scheme is proposed in this paper. It adopts the so-called general verification mechanism to improve efficiency of validity verification and avoids the drawbacks of the existing general verifi...
-
Chapter and Conference Paper
Certificate-Based Key-Insulated Signature
To reduce the influence of key exposure, we introduce key-insulated into certificate-based cryptography and formalize the notion and security model of the certificate-based key-insulated signature scheme. We t...
-
Chapter and Conference Paper
Composition and Extended Method of Information Grid
This content provides an overarching introduction to the field of information grid (IG). It examines the emerging context and rationale for IG, the implications and benefits of IG for compositions, and the cur...
-
Chapter and Conference Paper
Research on Lesk-C-Based WSD and Its Application in English-Chinese Bi-directional CLIR
Cross-Language Information Retrieval (CLIR) combines the traditional Information Retrieval technique and Machine Translation technique. There are many aspects related to the problem of polysemy, which are good...
-
Chapter and Conference Paper
The LLAMA Middleware Support for Accountable Service-Oriented Architecture
Enterprises are turning to SOA for the flexible deployment of business processes. While current monitoring tools can detect service execution problems in an enterprise’s servers and report such problems to hum...