混合,搀杂 发表于 2025-3-23 13:33:10
LRD: Latent Relation Discovery for Vector Space Expansion and Information Retrievalpresentation in order to improve information retrieval (IR) on documents and document clustering. Our LRD method extracts terms and entities, such as person, organization, or project names, and discovers relationships between them by taking into account their co-occurrence in textual corpora. Givencogitate 发表于 2025-3-23 16:23:45
Web Image Retrieval Refinement by Visual Contentsges; and the other utilizes visual features of images, such as color, texture, shape, as the descriptions of Web images. However, those two methods are often applied independently in practice. In fact, both have their limitations to support Web image retrieval. This paper proposes a novel model call可商量 发表于 2025-3-23 20:15:25
An Effective Approach for Hiding Sensitive Knowledge in Data Publishing. In this paper, we address another aspect of privacy preservation in data publishing, where some of the knowledge implied by a dataset are regarded as private or sensitive information. In particular, we consider that the data are stored in a transaction database, and the knowledge is represented in下垂 发表于 2025-3-24 00:04:04
Tracking Network-Constrained Moving Objects with Group Updatesositions of moving objects. The key issue in tracking techniques is how to minimize the number of updates, while providing accurate locations for query results. In this paper, for tracking network-constrained moving objects, we first propose a simulation-based prediction model with more accurate locFlu表流动 发表于 2025-3-24 04:46:59
http://reply.papertrans.cn/16/1502/150180/150180_15.png半身雕像 发表于 2025-3-24 09:48:38
http://reply.papertrans.cn/16/1502/150180/150180_16.png未完成 发表于 2025-3-24 14:05:33
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protectionesource dissemination over the network. To solve these challenges, we propose the Role-Based P2P model, in which the . notion is functioned as the bridge component between users and resources to enforce secure resource dissemination together with relative constraints. The property rights attached toHdl348 发表于 2025-3-24 15:42:21
A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communitiesisk involved with the transactions without prior knowledge about each other’s reputation. ., a reputation management scheme, is proposed for P2P virtual communities. A unique global trust value, computed by aggregating similarity-weighted recommendations of the peers who have interacted with him andnominal 发表于 2025-3-24 19:03:37
QoS-Aware Web Services Composition Using Transactional Composition Operatorred. Most of the work has so far focused on relaxing some ACID properties of the traditional transaction model, with little being done on investigating how the transaction can influence the quality of service (QoS) of a composite web service. In this paper, a composition model is proposed to evaluat追踪 发表于 2025-3-25 01:27:21
KCAM: Concentrating on Structural Similarity for XML FragmentsAMs, denoted as .(.,.), can be used as the approximate structural similarity. KCAM is independent of label information in fragments. It is powerful to distinguish the structural difference between XML fragments.