2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)最新文献

筛选
英文 中文
Study on optimization selection model of Web service discovery based on genetic algorithm 基于遗传算法的Web服务发现优化选择模型研究
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579698
Xiao Jun
{"title":"Study on optimization selection model of Web service discovery based on genetic algorithm","authors":"Xiao Jun","doi":"10.1109/ICACTE.2010.5579698","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579698","url":null,"abstract":"Traditional Web services, which are mainly technical specifications based on UDDI, provide service discovery by simple classification and key word matching, resulting in low precision ratio and recall ratio as well as low compatibility of service multiplexing and service composition. This paper, basing on Web service models and in combination with genetic algorithm, brings forward a multi-target optimization selection model based on similarity, QoS, matching degree, rating and feasibility of Web services, and provides an effective method for Web service discovery.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inferential language modeling for selective Web search personalization and contextualization 选择性Web搜索个性化和上下文化的推理语言建模
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5578957
Raymond Y. K. Lau
{"title":"Inferential language modeling for selective Web search personalization and contextualization","authors":"Raymond Y. K. Lau","doi":"10.1109/ICACTE.2010.5578957","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5578957","url":null,"abstract":"Personalized Web search systems have been explored to alleviate the problem of information overload by keeping track of a user's specific information retrieval (IR) preferences, and then pushing information to the user according to their preferences maintained in a user profile. Nevertheless, personalization and contextualization is always associated with a computational cost. Therefore, it is more advantageous for a personalized Web search system to evaluate the necessity of personalization for a query before invoking the personalization mechanism. Unfortunately, most of the existing personalized Web search approaches only blindly personalize users' queries without considering the characteristic of the queries or the searchers who issue those queries. The main contributions of our research work presented in this paper are two fold. First, a novel selective Web search personalization and contextualization method is developed to enhance the effectiveness of personalized Web search. Second, an inferential language model which can take into account the semantic and contextual information associated with a Web search scenario is developed to enhance the selective personalization and contextualization process. The results of our initial experiment show that the proposed selective personalization and contextualization method underpinned by inferential language modeling significantly outperforms a baseline method developed based on syntactic click entropy. To the best of our knowledge, this is the first inferential language modeling approach that has been successfully applied to Web search personalization and contextualization.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114963279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The integration of processes within IT resources control IT资源控制中的流程集成
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579645
M. Zobok, P. Tanuška, P. Važan
{"title":"The integration of processes within IT resources control","authors":"M. Zobok, P. Tanuška, P. Važan","doi":"10.1109/ICACTE.2010.5579645","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579645","url":null,"abstract":"The article provides the general overview and base proposal of solution in the area of controlling the IT resources within the company. It points out some common deficits of integrating systems and running data transfers. Lack of functionality in some large systems is supplemented by using interim database and proposed SQL processing prior to data loads. Interim database is also used for storing the import result status and log functionality.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115183770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed intrusion detection technology's research in electronic commerce 电子商务中的分布式入侵检测技术研究
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579674
Weijian Huang, Yan An, Wei Du
{"title":"Distributed intrusion detection technology's research in electronic commerce","authors":"Weijian Huang, Yan An, Wei Du","doi":"10.1109/ICACTE.2010.5579674","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579674","url":null,"abstract":"In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce. Distributed intrusion detection technology as the supplement of firewall has become an indispensable and important component of electronic commerce security.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Based on the agent of elliptic curve Diffie-Hellman Key Establishment Protocol 基于椭圆曲线代理的Diffie-Hellman密钥建立协议
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579679
Fei Sun, Shi-ping Yang
{"title":"Based on the agent of elliptic curve Diffie-Hellman Key Establishment Protocol","authors":"Fei Sun, Shi-ping Yang","doi":"10.1109/ICACTE.2010.5579679","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579679","url":null,"abstract":"Key Establishment protocol based on passwords or pre-shared security keys was difficulty to share the password or security keys in Coordinated-Control Framework Based on Agent. Through analyzing the working mechanism of CCFBA, one novel session Key Establishment Protocol with sharing no secret was proposed, based on the elliptic curve Diffie-Hellman algorithm. This protocol can provide identity authentication, forward secrecy, foil man-in-the-middle attacks.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116017154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved AODV routing protocol for vehicular Ad hoc networks 改进的车载自组织网络AODV路由协议
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579491
Baozhu Li, Yue Liu, Guoxin Chu
{"title":"Improved AODV routing protocol for vehicular Ad hoc networks","authors":"Baozhu Li, Yue Liu, Guoxin Chu","doi":"10.1109/ICACTE.2010.5579491","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579491","url":null,"abstract":"Vehicular Ad hoc networks are one of the most advanced technologies for intelligent transportation system that allow vehicle-vehicle to form multi-hop ad hoc networks. Routing is one of the challenges in vehicular ad hoc networks because of the frequent change of its topology structure. In this paper, we propose a routing protocol (AODV_BD) for vehicular ad hoc networks that improves the Ad hoc On-Demand Distance Vector (AODV) routing protocol by making it reduce the packet delay. The simulating experiments provide an efficient approach to estimate the routing protocol performance of a VANET.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116037976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Multi-relational factorizations for cancer subclassification 癌症亚分类的多关系因子分解
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579024
Liviu Badea
{"title":"Multi-relational factorizations for cancer subclassification","authors":"Liviu Badea","doi":"10.1109/ICACTE.2010.5579024","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579024","url":null,"abstract":"We introduce a novel multi-relational learning algorithm based on simultaneous nonnegative matrix factorizations, able to distinguish between “target” and “background” relations, deal with incomplete data and so-called “link” functions. The ability to handle incomplete data allows us to tackle both relation prediction and clustering. Moreover, the nonnegativity constraints are essential for the interpretability of the resulting clusters. We apply our approach to a large breast cancer dataset for which we find 5 subclasses that agree very well with the known subclassification of this disease, while emphasizing the main biological processes and genes involved in the corresponding subtypes.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Auto-focusing evaluation functions in digital image system 数字图像系统中的自动对焦评价功能
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579520
D. Cao, Yunguo Gao, Huanli Li
{"title":"Auto-focusing evaluation functions in digital image system","authors":"D. Cao, Yunguo Gao, Huanli Li","doi":"10.1109/ICACTE.2010.5579520","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579520","url":null,"abstract":"Evaluation function is an important item to measure the quality of images in auto-focusing systems. This paper introduces four categories of evaluation functions which are respectively based on gradient, correlation, statistics and transform. These functions formally differ from each other and their performances are not consistent when dealing with different images. The same function also performs different when the processed images have different characteristics. Five commonly used functions from the four categories are verified and compared under different circumstances in order to validate their performances. The result provides references for variety of selections in the practical application.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Non intrusive physiological measurement for driver cognitive distraction detection: Eye and mouth movements 驾驶员认知分心检测的非侵入性生理测量:眼和嘴的运动
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579547
A. Azman, Qinggang Meng, E. Edirisinghe
{"title":"Non intrusive physiological measurement for driver cognitive distraction detection: Eye and mouth movements","authors":"A. Azman, Qinggang Meng, E. Edirisinghe","doi":"10.1109/ICACTE.2010.5579547","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579547","url":null,"abstract":"Driver distractions can be categorized into 3 major parts:-visual, cognitive and manual. Visual and manual distraction on a driver can be physically detected. However, assessing cognitive distraction is difficult since it is more of an “internal” distraction rather than any easily measured “external” distraction. There are several methods available that can be used to detect cognitive driver distraction. Physiological measurements, performance measures (primary and secondary tasks) and rating scales are some of the well-known measures to detect cognitive distraction. This study focused on physiological measurements, specifically on a driver's eye and mouth movements. Six different participants were involved in our experiment. The duration of the experiment was 8 minutes and 49 seconds for each participant. Eye and mouth movements were obtained using the FaceLab Seeing Machine cameras and their magnitude of the r-values were found more than 60% thus proving that they are strongly correlated to each other.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Research on resources integration of regional logistics 区域物流资源整合研究
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579662
D. Chang, Bo Zhang
{"title":"Research on resources integration of regional logistics","authors":"D. Chang, Bo Zhang","doi":"10.1109/ICACTE.2010.5579662","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579662","url":null,"abstract":"As the logistics development trends towards regional integration, many scholars begin to pay attentions to the rationalization of regional logistics [1]. The concept of synergy is frequently proposed in the operation [2], however, the research on resources integration of regional logistics in order to share resource and collaborate is still in its infancy stage, and there is no systematic theoretical support. The paper constructs the resources integration system of regional logistics based on griddization management, analyzes the quantitative comparison of griddization and non-griddization resources integration of regional logistics, and sets up a service quality evaluation system. Comprehensive simulations and comparisons show that the griddization model is practically optimal and theoretically promising.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信