2,196 Result(s)
-
Article
Indexing spatiotemporal trajectory data streams on key-value storage
In a trajectory management system, moving objects are typically equipped with GPS devices to report their locations to a data store. Given the potentially high frequency of location updates by multiple moving ...
-
Article
Community anomaly detection in attribute networks based on refining context
With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing communities as reference contexts for local anomaly node detection,...
-
Article
An improved indicator-based two-archive algorithm for many-objective optimization problems
The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and...
-
Article
Computational Approaches for Traditional Chinese Painting: From the “Six Principles of Painting” Perspective
Traditional Chinese painting (TCP) is an invaluable cultural heritage resource and a unique visual art style. In recent years, there has been a growing emphasis on the digitalization of TCP for cultural preser...
-
Article
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tamper...
-
Article
Identity-Preserving Adversarial Training for Robust Network Embedding
Network embedding, as an approach to learning low-dimensional representations of nodes, has been proved extremely useful in many applications, e.g., node classification and link prediction. Unfortunately, exis...
-
Article
An Online Algorithm Based on Replication for Using Spot Instances in IaaS Clouds
Infrastructure-as-a-Service (IaaS) cloud platforms offer resources with diverse buying options. Users can run an instance on the on-demand market which is stable but expensive or on the spot market with a sign...
-
Article
SMEC: Scene Mining for E-Commerce
Scene-based recommendation has proven its usefulness in E-commerce, by recommending commodities based on a given scene. However, scenes are typically unknown in advance, which necessitates scene discovery for ...
-
Article
Community-Preserving Social Graph Release with Node Differential Privacy
The goal of privacy-preserving social graph release is to protect individual privacy while preserving data utility. Community structure, which is an important global pattern of nodes, is a crucial data utility...
-
Article
Shapelet Based Two-Step Time Series Positive and Unlabeled Learning
In the last decade, there has been significant progress in time series classification. However, in real-world industrial settings, it is expensive and difficult to obtain high-quality labeled data. Therefore, ...
-
Article
Motion-Inspired Real-Time Garment Synthesis with Temporal-Consistency
Synthesizing garment dynamics according to body motions is a vital technique in computer graphics. Physics-based simulation depends on an accurate model of the law of kinetics of cloth, which is time-consuming...
-
Article
A fast and accurate coupled meshless algorithm for the 2D/3D Gross–Pitaevskii equations on two GPUs
This paper first presents a high-efficient and accurate coupled meshless algorithm for solving the multi-dimensional Gross–Pitaevskii equation (GPE) in unbounded domain, which is implemented on CUDA-program-ba...
-
Article
A framework for data anomaly detection based on iterative optimization in IoT systems
With the advent of 5 G, the Internet of Things (IoT) makes many basic applications possible. In IoT applications, sensors are widely deployed to collect various data. Due to the dynamic nature of the wireless ...
-
Article
Path-Based Multicast Routing for Network-on-Chip of the Neuromorphic Processor
Network-on-Chip (NoC) is widely adopted in neuromorphic processors to support communication between neurons in spiking neural networks (SNNs). However, SNNs generate enormous spiking packets due to the one-to-...
-
Article
Disaggregated Datacenters for Future Cloud Computing
-
Article
Dalea: A Persistent Multi-Level Extendible Hashing with Improved Tail Performance
Persistent memory (PM) promises byte-addressability, large capacity, and durability. Main memory systems, such as key-value stores and in-memory databases, benefit from such features of PM. Due to the great po...
-
Article
Signed directed attention network
Network embedding has facilitated lots of network analytical tasks by representing nodes as low-dimensional vectors. As an extension of convolutional neural networks from Euclidean data to irregular data, Grap...
-
Article
Combining unsupervised and supervised classification for customer value discovery in the telecom industry: a deep learning approach
Customer behaviour analysis in a telecom market is a challenging task in the customer relationship management area. In this paper, we propose a customer behaviour recognition model that combines unsupervised c...
-
Article
Joint Participant Selection and Learning Optimization for Federated Learning of Multiple Models in Edge Cloud
To overcome the limitations of long latency and privacy concerns from cloud computing, edge computing along with distributed machine learning such as federated learning (FL), has gained much attention and popu...
-
Article
Context-Aware Semantic Type Identification for Relational Attributes
Identifying semantic types for attributes in relations, known as attribute semantic type (AST) identification, plays an important role in many data analysis tasks, such as data cleaning, schema matching, and k...