2006 IEEE International Conference on Granular Computing最新文献

筛选
英文 中文
Privacy homomorphisms for e-gambling and mental poker 电子赌博和心理扑克的隐私同态
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635918
Jordi Castellà-Roca, Vanesa Daza, J. Domingo-Ferrer, F. Sebé
{"title":"Privacy homomorphisms for e-gambling and mental poker","authors":"Jordi Castellà-Roca, Vanesa Daza, J. Domingo-Ferrer, F. Sebé","doi":"10.1109/GRC.2006.1635918","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635918","url":null,"abstract":"Abstract —With the development of computer networks, situ-ations where a set of players remotely play a game ( e-gaming )have become usual. Often players play for money ( e-gambling ),which requires standards of security similar to those in physicalgambling. Cryptographic tools have been commonly used so farto provide security to e-gambling. Homomorphic encryption isan example of such tools.In this paper we review the mental poker protocols, whereplayers are assumed to remotely play poker. We focus on the keyadvantage of using cryptosystems with homomorphic properties( privacy homomorphisms ) because they offer the possibility ofmanipulating cards in encrypted form. Index Terms —Cryptography, privacy homomorphism, mentalpoker I. I NTRODUCTION The growth of computer networks has allowed many activ-ities that used to require physical presence to become doableover the network. One example is e-gambling. In this paper wefocus on mental poker, i.e. a poker game played among playersthat are not physically together but communicate throughcomputer networks.A mental poker system needs to provide protocols togenerate a deck of cards, shuffle it and confidentially dealthe cards to players. Naive approaches assume the existenceof a trusted third party (TTP), who performs some or all ofthe aforementioned operations [1].Since the assumption on all players trusting this central nodeis not always realistic, research on solutions not requiringa trusted party has become a hot topic [2]–[5]. To ensurethe players a fair play, standards of security similar to thosein physical gambling must be guaranteed. For instance, it isgood for trust generation that all players participate in thecomputation of the shuffled deck of cards. Current proposalsin the literature are based on a paradigm consisting of thefollowing steps:1) The players generate the deck of 52 face-up cards","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new method for classifying and searching software components by using a self-organizing neural network architecture 提出了一种基于自组织神经网络的软件构件分类搜索新方法
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635772
Claudia A. S. Mello, R. Mello, M. T. P. Santos, Luciano José Senger, L. Yang
{"title":"A new method for classifying and searching software components by using a self-organizing neural network architecture","authors":"Claudia A. S. Mello, R. Mello, M. T. P. Santos, Luciano José Senger, L. Yang","doi":"10.1109/GRC.2006.1635772","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635772","url":null,"abstract":"The method presented in this paper aims to simplify the construction of software component repositories. The repository makes possible the reuse of components, reducing the software implementation costs. The proposed method extracts informations from component documentation, or either, terms which compound the metadata to represent components. The components are automatically grouped, using the terms, in the repository by means of the ART-2A self- organizing artificial neural network architecture. The vectorial search strategy is used to retrieve software components which are grouped by the neural network. Experiments showed that this strategy improved the ordinary vectorial search by an average of 9.55% in precision, maintaining a similar quality in recall. This method also presented an relevant increase in the search performance.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126757562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stochastic processes and temporal rules 随机过程和时间规则
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635834
Paul Cotofrei, K. Stoffel
{"title":"Stochastic processes and temporal rules","authors":"Paul Cotofrei, K. Stoffel","doi":"10.1109/GRC.2006.1635834","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635834","url":null,"abstract":"This article tries to give an answer to a fundamental question in temporal data mining: \"Under what conditions a temporal rule extracted from an up-to-date temporal data keeps its cofidence/support on future data\". A possible solution is given by using, on the one hand, a temporal logic formalism which allows the definition of the main notions (event, temporal rule, confidence) in a formal way and, on the other hand, the stochastic limit theory. Under this probabilistic temporal framework, the equivalence between the existence of the support of a temporal rule and the law of large numbers is systematically analyzed.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On discovering "potentially useful" patterns from databases 从数据库中发现“潜在有用的”模式
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635848
Ying Xie, T. Johnsten, Vijay V. Raghavan, Karthik Ramachandran
{"title":"On discovering \"potentially useful\" patterns from databases","authors":"Ying Xie, T. Johnsten, Vijay V. Raghavan, Karthik Ramachandran","doi":"10.1109/GRC.2006.1635848","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635848","url":null,"abstract":"As is generally accepted, the most important feature that a KDD system must possess is the ability to discover patterns that are \"potentially useful\". In order to allow KDD systems to make potentially useful judgments, we give formal definitions of \"potential usefulness\" by completely staying within the realms of the expressiveness provided by Bacchus' Probabilistic Logic Language. Furthermore, a tractable algorithm is proposed that is capable of discovering all potentially useful patterns from databases, given limited accessible information.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127621814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modeling hierarchical and modular complex networks based on FCM 基于FCM的分层模块化复杂网络建模
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635776
Jianyu Li, Rui Lv, Shuzhong Yang, Xianglin Huang, Zhanxin Yang, Yingjian Qi
{"title":"Modeling hierarchical and modular complex networks based on FCM","authors":"Jianyu Li, Rui Lv, Shuzhong Yang, Xianglin Huang, Zhanxin Yang, Yingjian Qi","doi":"10.1109/GRC.2006.1635776","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635776","url":null,"abstract":"In this paper, we investigate the construction of complex networks based on clustering idea. Firstly, the resulting networks are woven by the clustering paths which follow their cluster's \"centroids\". Secondly, when the number of the data is huge, the data will be divided into subsets at different levels according to their similarity. The presented algorithm will be carried out in, between, and among these subsets at different levels. The resulting networks display small world feature and community structure, characterized by the hierarchical clustering function of a vertex with degree k, c(k) like some real-world networks. We also study the evolution behaviors and formation mechanism of the resulting networks. Index Terms—complex networks, scale-free, small world, fuzzy c-means .","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126480862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new aggregation operator of linguistic information and its properties 一种新的语言信息聚合算子及其性质
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635846
Zheng Pei, Liangzhong Yi
{"title":"A new aggregation operator of linguistic information and its properties","authors":"Zheng Pei, Liangzhong Yi","doi":"10.1109/GRC.2006.1635846","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635846","url":null,"abstract":"Much information is expressed by natural lan- guages. The management of linguistic information implies the use of operators of comparison and aggregation. In this paper, based on the Ordered Weighted Averaging (OWA) operator which is proposed by Yager and modifying indexes of linguistic terms (their indexes are fuzzy numbers on (0,T) ⊆ R + ), a new linguistic weighted averaging operator (Flwa) is presented, and the conclusion directly used in computing with words.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using 2-additive measures in nonlinear multiregressions 非线性多元回归中2加性测度的应用
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635883
L. Bock, Zhenyuan Wang
{"title":"Using 2-additive measures in nonlinear multiregressions","authors":"L. Bock, Zhenyuan Wang","doi":"10.1109/GRC.2006.1635883","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635883","url":null,"abstract":"When a nonlinear integral with respect to a signed fuzzy measure is used in multiregression, people face a serious problem that, comparing to the number of variables (attributes), there are exponentially many unknown parameters in the model. However, in many real-world problems, the higher-order interactions among the variables can be omitted, and then only consider the second-order one with an acceptable small error in the result. Thus, a 2-additive measure based on the Mőbius transformation and its inverse can be used to replace the signed fuzzy measure. In such a way, the complexity of the computation will be significantly reduced.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"23 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using UMLS-based Re-Weighting Terms as a Query Expansion Strategy 使用基于uml的重加权词作为查询扩展策略
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635786
Weizhong Zhu, X. Xu, Xiaohua Hu, I. Song, R. Allen
{"title":"Using UMLS-based Re-Weighting Terms as a Query Expansion Strategy","authors":"Weizhong Zhu, X. Xu, Xiaohua Hu, I. Song, R. Allen","doi":"10.1109/GRC.2006.1635786","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635786","url":null,"abstract":"Search engines have significantly improved the efficiency of bio-medical literature searching. These search engines, however, still return many results that are irrelevant to the intention of a user's query. To improve precision and recall, various query expansion strategies are widely used. In this paper, we explore the three widely used query expansion strategies - local analysis, global analysis, and ontology-based term re- weighting across various search engines. Through experiments, we show that ontology-based term re-weighting works best. Term re-weighting reformulates queries with selection of key original query terms and re-weights these key terms and their associated synonyms from UMLS. The results of experiments show that with LUCENE and LEMUR, the average precision is enhanced by up to 20.3% and 12.1%, respectively, compared to baseline runs. We believe the principles of this term re-weighting strategy may be extended and utilized in other bio-medical domains. users and suggest the user to refine the original query. In this research, three query expansion strategies - local analysis, global analysis, and ontology-based term re-weighting - integrated with the UMLS (Unified Medical Language System) are compared. These methods are applied to the Ad Hoc Retrieval task of the TREC 2004 Genomics task.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Inducing decision rules: a granular computing approach 诱导决策规则:一种颗粒计算方法
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635843
Xiaosheng Wang
{"title":"Inducing decision rules: a granular computing approach","authors":"Xiaosheng Wang","doi":"10.1109/GRC.2006.1635843","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635843","url":null,"abstract":"Inducing rules is one of the key methods of discovering information hidden in data. In this paper, a method is proposed for inducing decision rules and decision algorithms by a granular computing approach, based on a decision logic language in information tables. And we prove that in consistent information tables, the induced decision algorithms are consistent and complete, and the decision algorithms induced by different partitions are equivalent. Secondly, this paper studies two specific kinds of partitions: partitions inducing atomic decision algorithms and partitions inducing the most general decision algorithms. An algorithm is given for finding the partitions inducing atomic decision algorithms which are also very close to the partitions inducing the most general decision algorithms. The partitions obtained using this algorithm can induce the decision rules which are all atomic, and whose number will be close to the lowest possible. This is then a solution to the problem of finding the simplest decision rules and algorithms.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transductive Support Vector Classification for RNA Related Biological Abstracts RNA相关生物学摘要的转导支持载体分类
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635836
B. Adams, Muhammad Asadur Rahman
{"title":"Transductive Support Vector Classification for RNA Related Biological Abstracts","authors":"B. Adams, Muhammad Asadur Rahman","doi":"10.1109/GRC.2006.1635836","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635836","url":null,"abstract":"Support Vector Machines use a set of related supervised learning methods for classification and regression. When used for classification, the SVM algorithm creates a hyper plane that separates the data into two classes with the maximum- margin. Given positive and negative training examples a maximum-margin hyper plane is identified where it splits the positive from the negative examples, while maximizing the margin. Transductive Inference enhances the learning process by attempting to achieve the lowest error rate possible given a small sample of training examples. In this research we developed a set of software tools to convert scientific abstracts into support vectors that could be used with an implementation of Support Vector Machine called SVM-Light to classify the abstracts. Three distinct classification experiments were conducted: First, to classify abstracts about RNA research out of a set of randomly selected Abstracts. Second, to classify abstracts about specific types of RNA research out of a set of abstracts that all contain the expression \"RNA.\" Third, to classify tRNA, mRNA, snRNA, and rRNA abstracts individually out of a set of abstracts pertaining to the four categories of RNA.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信