Experiences with complex user profiles for approximate P2P community matching
|
|
- Louisa Tyler
- 5 years ago
- Views:
Transcription
1 Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy Matteo Mordacchini IIT-CNR Pisa, Fabio Baglini University of Pisa Pisa, Italy Abstract The proble of defining PP overlays where peers characterized by siilar interests are directly connected is currently an iportant research issue. We have recently proposed a two layer PP architecture where the first layer exploits a gossip algorith for the detection of counities of peers characterized by siilar interests, while the second layer defines a DHT storing the profiles of the counities detected in the first layer. The DHT is exploited by peers joining the syste to find out a counity atching its interests. This paper investigates a DHT based approach supporting a siilarity based search of user profiles. Our approach exploits Locality Sensitive Hashing to support the siilarity indexing. The paper investigates several types of profiles to odel user interests and evaluates the indexing echaniss of the DHT with respect to the different types. Experiental evaluation has been conducted by considering a real data set. Keywords-distributed clustering; peer-to-peer; user profiles; I. INTRODUCTION The first recoender syste, dealing with artists and albus, based on the collaborative filtering technique has been proposed in [11]. After this contribution several tools have been proposed and realized, both fro acadeic counities and copanies. These solutions achieve a rearkable success for their ability to odel the behavior of huan exchange inforation by word-of-outh, which is a typical behavior of people sharing one or ore interests. Most of these systes are based on centralized architectures, an approach that on one hand siplifies the overall design, but on the other one presents a set of liitations. These liitations include the reduced scalability, the existence of single-point-of-failure and the concentration of data published by the users at a single authority which is potentially able to access to the whole set of data. The ost proising alternatives to current centralized systes are based on peer-to-peer (PP) architectures. PP architectures allow the ipleentation of systes able to dynaically scale and to be resilient to failures of groups of nodes, even significant ones. Moreover, their exploitation avoid the concentration of inforation in a single entity. Most of recoender systes, both centralized and PP, group hoogeneous users in counities. This siplify the exchange of pertinent recoendations aong users sharing coon interests. The creation of a PP syste able to support the aggregation of users in counities, identified on the basis of coon interests, has been the subject of a nuber of recent research works carried out by different research groups. These groups belong to different scientific counities and the proposed works start fro different points of view. However, the coon idea of all the proposed works is to associate with each user a profile, odeling user s interests, to exploit in order to aggregate the in counities. In a precedent position paper of ours [6], we proposed a syste structured according to two layers. The first one supports the creation and the aintenance of self-eerging user counities, by perforing a continuous exchange of inforation aong users. The other layer is devoted to the aintenance of a distributed index of existing counities. It should allow users to cheaply (in ters of transferred data) discover counities pertinent to their interests, even when does not exist any counity that exactly atches its profile. In this paper we ai at realizing such a distributed index. To allow it to support the entioned features, the index we propose is PP, supports siilarity searches and supports different ways to represent the user profile. We started fro a Distributed Hash Table (DHT). This kind of network provide the functionalities of a distributed data index, with an effective load balancing strategy, a careful anageent of the disconnection of the nodes and a logarithic coplexity routing both in the nuber of hops required to resolve a query and in the size of the routing tables. However, DHTs are not designed to support siilarity searches. Indeed, as with non-distributed hash tables, each value is calculated using an identifier associated with the application of a function designed to distribute the results, avoiding to preserve the locality of the original data. Therefore, in order to achieve the functionalities required by our envisioned distributed index, DHTs have to be extended with echaniss that allow to perfor not-exact searches. To do this, we exploit a probabilistic approach based on the use of Locality Sensitive Hash Functions (LSH), proposed in [13] to index the user profiles on a DHT. This leads to a drastically reduced resources usage. LSH approxiates the exact solution of the proble, issuing a very reduced aount
2 of queries while aintaining very high quality results. Beside supporting siilarity searches on DHTs, our distributed index is able to represent the interests of users in different ways. In particular, in this paper we present a study on three different characterizations of the user interests. The study is aied at finding a good trade-off between the accuracy and the network overhead. The three different types of profiles are based on sets of attributes defined in spaces ade of an arbitrary nuber of diensions and coparable by using siple siilarity etrics. This allows to build profiles fro objects of any kind (e.g. text stored by users, log browsing web, etadata about the edia, sets of coordinates about places visited, etc.). The three types of profiles are, respectively, a vector of ites, an adjacency atrix of ites occurrences and a set of connected coponents extracted profile by profile fro the adjacency atrixes. The index we propose has been studied fro the point of view of coplexity and evaluated experientally using a real dataset, consisting of a list of articles of edical literature consulted by users of PubMed [1], where each publication is identified by title, keywords and abstracts. Fro this dataset were extracted profiles fro over 700 users. The results obtained by searching for siilarities on our proposed DHT index has been copared against the ones obtained for the sae queries, indexing the profiles of individual attributes. This evaluation was carried out using various configurations of LSH indexing functions, for all types of profiles. The reaining of this paper is organized as follows: Section II reviews the state of the art in the field, Section III present the overall architecture of the syste describing the two layers it is ade of, with a particular focus on the indexing layer. Section IV describes both the three kind of profiles we propose in this paper. Section Vpresent the coplexity, both in ters of network usage and storage space required. Section VI shows the experiental results we obtained. Finally, in Section VII we derive our conclusions. A. P-RING II. RELATED WORK P-Ring [5] is a PP index structure that supports range queries. P-Ring is designed to support fault-tolerance and provides logarithic search perforance even for highly skewed data distributions. It supports large sets of data ites for each peer. The authors experientally tested P-Ring by using siulations as well as by using a real case of study they deployed on PlanetLab. According to theauthors achieveents, P-ring provide perforance coparable with Skip Graphs, Online Balancing and Chord. B. MAAN The Multi-Attribute Addressable Network, MAAN [4] is a structured PP syste targeted to the definition of a support for resource discovery in a large distributed systes that provides support for ulti-attribute range queries. It odifies the Chord hashing function by a locality preserving hashing function. In MAAN resources are identified by a set of attribute-value pairs, and each attribute is apped on a Chord ring through the locality preserving function. The node target of the hashing function stores the full resource description so that a resource is stored as any ties as its nuber of attributes. The resolution of a ulti-attribute range query consists in executing a single 1-diensional query on the doinant (i.e. ost selective) attribute, while the other attributes are checked using the replicated data. One of the ain drawbacks of MAAN is related to the large aount of eory required to store resource indices, and the cost to update the. C. Web Retrieval PP with high selective keys In this contribution [9] the authors foralize an indexing and retrieval odel designed to achieve high perforance, cost-efficient retrieval by exploiting highly discriinative keys (HDKs) stored in a distributed global index aintained in a structured PP network. HDKs are carefully selected ters that appear only in a sall set of collected docuents. The authors present both a theoretical analysis of the scalability of the odel and experiental results achieved by using the HDK-based PP retrieval engine. These results deonstrated that the total traffic generated exploiting the HDK approach is saller than the one obtained with distributed single-ter indexing strategies. The authors also perfored a deep scalability analysis that deonstrated that the HDK approach is able to scale to large networks of peers indexing very large docuent collections. D. Efficient seantic search on DHT overlays This paper [13] starts stating that distributed hash tables (DHTs) excel at exact-atch lookups, but they do not directly support coplex queries such as seantic search that is based on content. In this paper, the authors propose an approach to support seantic search on DHT overlays. Their idea is to place, with high probability, indexes of seantically close files into sae peer nodes by exploiting inforation retrieval algoriths and locality sensitive hashing. This approach adds only index inforation to peer nodes, causing an acceptable storage overhead. Via network siulations, the authors show that their approach is viable because the nuber of nodes visited for a query is about 100, independently fro the overlay size.
3 III. THE OVERALL ARCHITECTURE As in [6] the syste we propose (depicted in Figure 1) consists in a two-layered peer-to-peer (PP), fully decentralized architecture. This choice is due to a series of considerations about the syste goals. First of all, such systes allow to propose a service without any centralized authority (e.g., a single server that would store all user profiles), with the service ipleented through the collaboration of the peers. Figure 1. Overall Syste Architecture Moreover, PP systes allow to address the iportant issue of scalability, as they do not require the over- and proportional-provisioning of resources that would be required with a centralized approach. The ore peers participate, the ore power is added to the syste. If carefully designed, a PP approach scales up to hundred of thousands peers. Finally, PP systes are known to deal gracefully with syste dynais at no or very reduced additional cost, whereas centralized systes need expensive and coplex techniques to ensure continuous operation under node and link failures. Starting fro the peer-to-peer approach, we envision a two-layered solution. This solution ai is two-fold. Indeed, it is designed to support both a highly dynaic participation, aggregations of users and a stable and scalable aintenance of the description of the counities the users belong to. The lower layer is in charge for the foration processes of the user counities. It has to support the construction of a interest-based network, so that peers are effectively grouped with other peers that share siilar interest in their various interest doains. This requires to construct and aintain a representation of these interests (user profiling), to copare these profiles to deterine their siilarity (siilarity etrics), to propose distributed algoriths that cluster peers in interest-based groups based on this etric (clustering algorith) and to give a representation to the counities. Possible solutions for the constructions of this layer are beyond the scope of this paper, actually we are investigating possible solutions like [10] or []. The upper layer is a distributed index structure (we also refer as backbone layer). It has the responsibility to store the signature of each counity as well as the contact points needed to establish a connection with that counity. This allow new peers to rapidly find, aong the registered counities, the best ones that atch their interests. However, an index able to find only perfect atches between users and their interests could not be as effective as needed in a very dynaic and potentially heterogeneous environent. As an exaple consider a peer that has in coon with a certain counity the 90% of its characterizing ites. Even if they do not share all the interests, they are probably enough siilar to benefit fro inforation exchange flows. Hence, in order to provide a effective solution, the distributed structure ust be able to support the detection of the counities sharing a certain nuber of ites with the new joining peer. To this end the index structure have to provide a proper support for siilarity based searches. IV. THE PROPOSED SOLUTION As we introduced before (see Section I), a viable solution for obtaining a support to siilarity searches on DHTs has been proposed in [13]. In that paper the authors applied the in-wise independent perutations approach to user profiles built according the Vector Space Model (VSM). The VSM odel (also known as ter vector odel) is an algebraic odel for representing text docuents as vectors of identifiers. Docuents and queries are represented as vectors of ters. Each diension corresponds to a separate ter. If a ter occurs in the docuent, its value in the vector is nonzero. This ethod is widely used due to its effectiveness in situations where a query should be copared against a given docuent to easure its relevance. The ain drawback of this approach is its need to have a coplete knowledge on the existing ters in the considered set of docuents. This is not a big proble in centralized systes that can access to the whole set of docuents and, consequently, can built the whole dictionary of existing ters but is unfeasible in peer-to-peer systes where there is not a global knowledge on existing docuents and ters. In order to address this proble, soe coplex solutions have been presented in literature [1]. However, even sipler solutions, both fro the ipleentation and coputational coplexity point of view, deonstrated to achieve pretty good results [7]. One of the is the application of the
4 Jaccard siilarity coefficient to the ter vectors, that also the authors of [13] exploited in their work. Despite of its siplicity, the Jaccard Index is a very flexible easure and can be exploited to copare set of eleents without specific knowledge about spatial structure of data. In order to exploit this indexing echanis in the envisioned scenario, and pursuing the ai of finding an effective and efficient way to handle interest inforation, in this paper we propose three different types of profiles to odel user interests. All of the are build starting fro the collections of attributes that characterize a user. The three profile types are: Weighted attribute vector: this profile consists of collections of attributes properly weighted according to a certain nuerical weight indicating the attribute relevance with respect to the user profile. Attribute Adjacency Matrix: in this case the user profile is represented with a weighted attribute vector enriched with values estiating the correlation between attributes. The adjacency atrixes are squared and syetrical. Set of connected coponents extracted fro Attribute Adjacency Matrix: the profile is represented with a set of connected coponent obtained by applying to the Attribute Adjacency Matrix an algorith that extract a set of connected coponents. Each coponent describes a specific user interest. In order to analyze the advantages deriving fro the usage of all types of profiles, we perfored both a theoretical and experiental coparison between two different syste configurations. In the first one, we use the profiles in a DHT exploiting LSH based on the in-wise independent perutations. The second configuration consists a naive solution. As a naive solution we ean one like [4] or [3]. In those approaches, profiles are stored attribute per attribute and the query resolution process is perfored by finding all the atches for every attribute and by intersecting the. Obviously, this probabilistic ethod can lead to inexact query resolution but the network traffic is bounded and the storage space required is only a fraction with respect to the per attribute indexing. V. THEORETICAL ANALYSIS Tables I, II and III show the coparison between the two indexing approaches when applied to index the user profiles respectively in the for of Weighted attribute vector, Attribute Adjacency Matrix and Set of connected coponents extracted fro Attribute Adjacency Matrix. In this Analysis U and C indicate respectively the nuber of attributes coposing the profile of each user and each counity. A represents the nuber of access points for each counity. X indicates the nuber of nodes of the DHT, Co the nuber of existing counities. k is the axiu nuber of profiles requested to each node when it resolves a query. s indicates the axiu nuber of counity profiles following fro a store request for a new profile. R corresponds to the nuber of reoved attributes following to a profile update. When exploiting LSH indexing, n represents the nuber of identifiers associated with each profile. When the profiles are structured as Set of connected coponents I indicates the nuber of attributes describing the l -th user interest with P I apple U, whereas Int indicates the nuber of interests of a user. VI. EVALUATION The validation of the proposed solution was conducted using a real dataset of users sharing a subset of the PubMed [1] scientific publications. The dataset is part of a dataset released by the Mendeley group [8]. It contains inforation about 5,177 users and 11,878 docuents, with an average of 48.8 docuents consulted by each user. The profile of each user is characterized by the ters occurring in the title, keywords and abstracts of the papers she has accessed. In order to have a ore precise characterization of the users, the whole set of docuents contain 17,49 distinct ters have been filtered to eliinate the stop-words, getting 17,075 real ters. Finally, through a process of steing, 107,57 roots were extracted. The final set of,754 users exploited for the following evaluation was obtained by selecting the users with at least 150 root ters in their profiles. Vector-based user profiles are obtained directly by these ters. Adjacency atrixes are obtained by using the cooccurrences frequencies of ters within each user collection. Finally, the profiles built according the connected coponents odel have been extracted staring fro the adjacency atrices by identifying the connected coponents, obtained through the application of a pruning technique on the relationships occurring with a frequency less than a certain threshold infreq and selecting, aong the obtained coponents, those with a size greater than or equal to a certain, fixed value insize. The following tests ai to stress the ability of the proposed syste in finding a right counity for a user that is joining the network. We used a network of,000 nodes, each denoting a different counity representative. Users coing for the dataset are grouped in 300 different counities, obtained by using K-Means. The centroids obtained so far are used as counity representatives. Moreover, the syste is perturbed by the insertion of 1,700 other profiles, generated randoly in the sae vector space of the user profiles. These counities, identified using K-Means, have been used as references to copare against the ones we identified by exploiting the peer-to-peer approach. This has been perfored for all three kinds of profiles.
5 We perfored a series of tests by injecting,500 queries to the syste. Each query is coposed of a user profile. For each query, the syste returns as an answer, the ost siilar counity descriptor registered. In order to evaluate the perforances of our solution, we evaluated both its efficacy and efficiency. Efficacy is easured using both network requireents for query resolution and network and storage consuption for aintaining the distributed index structure. and network bandwidth, respectively, to create and to aintain the distributed index. Figure 4 depicts the global aount of network bandwidth consuption both to issue queries to the distributed index and to retrieve the results. In both the figures the results are related, respectively, to profiles built according to a vector of ters, an adjacency atrix and a set of connected coponents. 1e e Ter Vectors Adj. Matrixes Coponents LSH N=15 M=1 LSH N=15 M= LSH N=15 M=3 LSH N=0 M=1 LSH N=0 M= LSH N=0 M=3 Figure. Average difference between the ost siilar counity and the actual one Figure shows the average difference (Jaccard distance) between the ost siilar counity found by each query and the counity identified by the centralized ethod. As can be observed, the usage of co-occurrences data highly enhance the perforance of the syste. In particular, the connected coponents ethod achieves the best results. In this case, ethods with ore than one hashing function sees to perfor better than the others. On the other hand, such achieveents should be copared with the bandwidth and storage needs required to aintain indexes based on ore coplex profiles, like atrixes and connected coponents. 1e Figure 4. Ter Vector - Naive Ter Vector - LSH 0 ID Ter Vector - LSH 15 ID Query routing Adj. Matrixes - Naive Adj. Matrixes - LSH 0 ID Adj. Matrixes - LSH 15 ID Query resolution Coponents - Naive Coponents - LSH 0 ID Coponents - LSH 15 ID Network Bandwidth consuption for Query anageent It can be noticed that, even in this case, the connected coponents ethod is the ost perforing one, in every kind of etrics we considered. Moreover, we copared those results with the ones obtained by a naive approach. It can be observed that every profile approach obtains a considerable gain using the LSH indexing ethod with respect to the pure naive solution. VII. CONCLUSIONS This paper has presented a DHT based approach for storing the profiles of counities of users characterized by siilar interests. The siilarity search over the DHT exploits the Min Wise Independent Perutation approach. We have proposed several types of user s profiles and evaluated the indexing echaniss with respect to the different kind of profiles. Experiental results conducted by considering a real data set have shown the effectiveness of our approach ACKNOWLEDGEMENT We acknowledge the support of the S-CUBE (EU-FP ), CONTRAIL (EU-FP ) and RECOGNI- TION (EU-FP ) EU projects. 10 Ter Vector - Naive Ter Vector - LSH 0 ID Ter Vector - LSH 15 ID Index Maintenance Adj. Matrixes - Naive Adj. Matrixes - LSH 0 ID Adj. Matrixes - LSH 15 ID Overall Index Size Coponents - Naive Coponents - LSH 0 ID Coponents - LSH 15 ID Figure 3. Network Bandwidth and Storage Space required by the distributed index Figure 3 shows the global size in ters of storage space REFERENCES [1] Pubed central. [] Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini, Laura Ricci, and Luca Alessi. Group: A gossip based building counity protocol. In Proc. of the 11th International Conference on Next Generation Wired/Wireless Networking, to appear.
6 [3] A.R. Bharabe, M. Agrawal, and S. Seshan. Mercury: supporting scalable ulti-attribute range queries. In ACM SIGCOMM Coputer Counication Review, volue 34, pages ACM, 004. [4] Min Cai, Martin Frank, Jinbo Chen, and Pedro Szekely. Maan: A ulti-attribute addressable network for grid inforation services. In Journal of Grid Coputing, page 184. IEEE Coputer Society, 003. [5] Adina Crainiceanu, Prakash Linga, Ashwin Machanavajjhala, Johannes Gehrke, and Jayavel Shanugasundara. P-ring: an efficient and robust pp range index structure. In Proceedings of the 007 ACM SIGMOD international conference on Manageent of data, SIGMOD 07, pages 3 34, New York, NY, USA, 007. ACM. [6] P. Dazzi, P. Felber, L.B. Anh, L. Leonini, M. Mordacchini, R. Perego, M. Rajan, and E. Riviere. Peer-to-peer clustering of web-browsing users. In C. Lucchese, G. Skobeltsyn, and W. G. Yee, editors, Proceedings of the 7th Workshop on Large-Scale Distributed Systes for Inforation Retrieval, co-located with ACM SIGIR 009, pages 71 78, 009. [7] Wa el Musa Hadi, Fadi A. Thabtah, and Hussein Abdel-jaber. A coparative study using vector space odel with k-nearest neighbor on text categorization data. In World Congress on Engineering, pages , 007. [8] Kris Jack, Jaes Haerton, Dan Harvey, Jason J Hoyt, Jan Reichelt, and Victor Henning. Mendeleys reply to the datatel challenge. Procedia Coputer Science, 1():1 3, 010. [9] Ivana Podnar, Martin Rajan, Toan Luu, Fabius Kle, and Karl Aberer. Scalable peer-to-peer web retrieval with highly discriinative keys. In ICDE, pages , 007. [10] Lakshish Raasway, Bugra Gedik, and Ling Liu. A distributed approach to node clustering in decentralized peer-topeer networks. IEEE Transactions on Parallel and Distributed Systes, 16:814 89, 005. [11] Upendra Shardanand and Pattie Maes. Social inforation filtering: algoriths for autoating word of outh. In Proc. of the SIGCHI conference on Huan factors in coputing systes, pages 10 17, New York, NY, USA, ACM, Addison-Wesley. [1] Chengxiang Zhai and John Lafferty. A study of soothing ethods for language odels applied to inforation retrieval. ACM Trans. Inf. Syst., :179 14, April 004. [13] Yingwu Zhu and Yiing Hu. Efficient seantic search on dht overlays. J. Parallel Distrib. Coput., 67(5): , 007. Type Cost Query Naive O( U log(x)) LSH O(n U log(x)) Query resolution Naive O(k C U ) LSH O(k C n) Counity insertion Naive O( C log(x)) LSH O(n C log(x)) Profile update Naive O( C log(x)+r log(x)) LSH O(n C log(x)+r log(x)) Descriptor reoval Naive O( C log(x)) LSH O(n log(x)) Index size Naive O( C Co) LSH O(n C Co) Table I COMPLEXITY ANALYSIS FOR INDEXING PROFILES STRUCTURED AS TERM VECTORS. Type Cost Query Naive O( U 3 log(x)) LSH O(n U log(x)) Query resolution Naive O(k C U ) LSH O(k C n) Counity insertion Naive O( C 3 log(x)) LSH O(n C log(x)) Profile update Naive O( C 3 log(x)+r log(x)) LSH O(n C log(x)+r log(x)) Descriptor reoval Naive O( C log(x)) LSH O(n log(x)) Index size Naive O( C 3 Co) LSH O(n C Co) Table II COMPLEXITY ANALYSIS FOR INDEXING PROFILES STRUCTURED AS ADJACENCY MATRIXES. Query Type Cost Naive O(( P I ) log(x)) LSH O(n Int P I log(x)) Query resolution Naive O(k C ( P I ) LSH O(k n Int C ) Counity insertion Naive O( C log(x)) LSH O(n C log(x)) Profile update Naive O( C log(x)+r log(x)) LSH O(n C log(x)+r log(x)) Descriptor reoval Naive O( C log(x)) LSH O(n log(x)) Index size Naive O( C Co) LSH O(n C Co) Table III COMPLEXITY ANALYSIS FOR INDEXING PROFILES STRUCTURED AS CONNECTED COMPONENTS.
Geo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationMULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationGenerating Mechanisms for Evolving Software Mirror Graph
Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationRule Extraction using Artificial Neural Networks
Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationFeature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH
ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationLOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE
1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications
ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationLeveraging Relevance Cues for Improved Spoken Document Retrieval
Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationAffine Invariant Texture Analysis Based on Structural Properties 1
ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationMassive amounts of high-dimensional data are pervasive in multiple domains,
Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,
More informationComparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types
Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationA Novel 2D Texture Classifier For Gray Level Images
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More information3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search
436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationData Caching for Enhancing Anonymity
Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu
More informationA Novel Fuzzy Chinese Address Matching Engine Based on Full-text Search Technology
Based on Full-text Search Technology 12 Institute of Reote Sensing and Digital Earth National Engineering Research Center for Reote Sensing Applications,Beijing,100101, China E-ail: yaoxj@radi.ac.cn Xiang
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationResearch on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm
INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation
More information6.1 Topological relations between two simple geometric objects
Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying
More informationOn the Computation and Application of Prototype Point Patterns
On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation
More informationA wireless sensor network for visual detection and classification of intrusions
A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang
More informationCollection Selection Based on Historical Performance for Efficient Processing
Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationA Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation
28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation
More informationVerifying the structure and behavior in UML/OCL models using satisfiability solvers
IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on
More informationAN APPROACH ON BIMODAL BIOMETRIC SYSTEMS
AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro
More informationVerdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data
Verdict Accuracy of Quick Reduct Algorith using Clustering, Classification Techniques for Gene Expression Data T.Chandrasekhar 1, K.Thangavel 2 and E.N.Sathishkuar 3 1 Departent of Coputer Science, eriyar
More informationThreshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding
1 Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding Lai Wei, Toshiaki Koike-Akino, David G. M. Mitchell, Thoas E. Fuja, and Daniel J. Costello, Jr. Departent of Electrical
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationSet Theoretic Estimation for Problems in Subtractive Color
Set Theoretic Estiation for Probles in Subtractive Color Gaurav Shara Digital Iaging Technology Center, Xerox Corporation, MS0128-27E, 800 Phillips Rd, Webster, NY 14580 Received 25 March 1999; accepted
More informationAuthor. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter
Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationOn computing global similarity in images
On coputing global siilarity in iages S Ravela and R Manatha Coputer Science Departent University of Massachusetts, Aherst, MA 01003 Eail: ravela,anatha @csuassedu Abstract The retrieval of iages based
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationGalois Homomorphic Fractal Approach for the Recognition of Emotion
Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,
More informationGrid Density Based Clustering Algorithm
Grid Density Based Clustering Algorith Aandeep Kaur Mann, Navneet Kaur Abstract Clustering is the one of the ost iportant task of the data ining. Clustering is the unsupervised ethod to find the relations
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationA New Generic Model for Vision Based Tracking in Robotics Systems
A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More information3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric
More informationA P2P REcommender system based on Gossip Overlays (PREGO)
10 th IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY Bradford,UK, 29 June - 1 July, 2010 Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini ISTI,CNR, Pisa,Italy Laura Ricci University
More informationAn Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints
519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka
More information