Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 954 papers published in subject: since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Multivariate Classification of Deep Web Sources Based on Maximum Entropy Model | |||
Huang Li ,Zhao Pengpeng ,Cui Zhiming | |||
Computer Science and Technology 12 December 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With the fast development of World Wide Web, the quantity of web information is increasing in an unprecedented pace, a great many of which are generated dynamically from background databases, and can’t be indexed by traditional search engine, so we call them Deep Web. For the heterogeneous and dynamic features of Deep Web sources, classifying the Deep Web source by domain effectively is a significant precondition of Deep Web sources integration. In this paper, we consider the visible features of Deep Web and Maximum Entropy approach, and then on the basis of binary classification, we propose a new multivariate classification approach based on Maximum Entropy towards Deep Web sources. In addition, we propose a Feedback algorithm to improve the accuracy of classification. An experimental evaluation over real Web data shows that, our approach could provide an effective and general solution to the multivariate classification of Deep Web sources. | |||
TO cite this article:Huang Li ,Zhao Pengpeng ,Cui Zhiming . Multivariate Classification of Deep Web Sources Based on Maximum Entropy Model[OL].[12 December 2007] http://en.paper.edu.cn/en_releasepaper/content/16873 |
2. Problems with Queuing Arrangement When Boarding | |||
Bi Qiang,He Tao,Liang Xiaogang | |||
Computer Science and Technology 07 December 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract: | |||
TO cite this article:Bi Qiang,He Tao,Liang Xiaogang. Problems with Queuing Arrangement When Boarding[OL].[ 7 December 2007] http://en.paper.edu.cn/en_releasepaper/content/16775 |
3. Implicit Surface Fitting by Regularized Regression and Compactly Supported Radial Basis Functions | |||
Pan Rongjiang | |||
Computer Science and Technology 27 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:We describe a direct way of making use of surface normal vectors at sample points in the problem of implicit surface fitting with compactly supported radial basis functions. The normal vectors are incorporated in a regularized regression problem that leads to a n by n positive definite linear system given n surface point/normal pairs. Compared with the widely used heuristic methods, our method avoids of introducing manufactured off-surface points and can fit much larger datasets effectively. We demonstrate its robust performance on several datasets. | |||
TO cite this article:Pan Rongjiang . Implicit Surface Fitting by Regularized Regression and Compactly Supported Radial Basis Functions[J]. |
4. A SOA-based General Multimedia Resource Management System | |||
Wang JiaYu | |||
Computer Science and Technology 16 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In the current computer application, building a general multimedia resources management system to develop the potential of existent similar management system is a hotspot. This paper will first analyze the development of the current multimedia resources management system. Then relying on SOA and middleware framework, we improve the current multimedia management model to achieve the goals of management optimization and system integration: openness, flexibility, simplicity, scalability. Secondly, we design a system based of the model. Finally, we develop an example to prove that the model is a good evidence of the multimedia information management with high practical value. | |||
TO cite this article:Wang JiaYu. A SOA-based General Multimedia Resource Management System[OL].[16 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16395 |
5. A proof of the conjecture that the class P is a proper subset of the class NP | |||
Xu Wandong | |||
Computer Science and Technology 15 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The planar graph 3-colorability (P3C) is one of {bf NP}-complete problem. Duo to probably appearing the second type of mistake in setting colors, a computational algorithm might repeat many times to decide whether it can correct wrong coloring in many examined subgraphs. Then one can turn P3C by means of analyzing some actual graphs (not with theoretically transformation in polynomial time) into the problem of determining whether there is a planar in infinitely many of arbitrary subgraphs. The problem of determining whether an arbitrary graph is a planar is in the class {bf P} and it can be solved with a polynomial time algorithm. But the problem of determining whether there is a planar in arbitrary subgraphs, which have identical order, of $sumlimits_{nu=1}^{L}dbinom{L}{nu}nu!$, or of $sumlimits_{k=1}^{L}sum limits_{nu=1}^{k}dbinom{k}{nu}nu!$, where $L=lceil n/3 rceil-2$ and $n$ is the order of these graphs, isn\ | |||
TO cite this article:Xu Wandong . A proof of the conjecture that the class P is a proper subset of the class NP[OL].[15 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16366 |
6. Advanced Framework for Iterative Hash Functions---C-hash | |||
Zhimin Li,Bo Yang,Lin Li,Shihui Zheng,Yixian Yang,Zhang Zhihui | |||
Computer Science and Technology 14 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, we study the cryptanalytical techniques to perform Joux multi-collision, Kelsey and Schneier generic long message second preimage attack and Kelsey and Kohno herding attack on the Merkle-Damgard construction as well as its variants with XOR-linear/additive checksums and propose an advanced Merkle-Damgard construction, C-hash, by changing the feedback addition value, which can add the computation complexity of the generic attacks, compared with Merkle-Damgard construction and its variants. | |||
TO cite this article:Zhimin Li,Bo Yang,Lin Li, et al. Advanced Framework for Iterative Hash Functions---C-hash[OL].[14 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16347 |
7. The Method of Analyzing Affective Tendency in Text | |||
Song Guangpeng | |||
Computer Science and Technology 12 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper introduces a method targeted at analyzing affective tendency of Chinese texts. First of all, Chinese texts are processed, and then affective words in texts are tagged with the affective words dictionary, and then sentence structure are analyzed. Affective values of the various elements of the sentences have different affective effect to the affective values of sentences; hence all affective elements for the affective values of sentences should be analyzed and weighted. The affective dictionary is based on psychology model, each word has two affective dimensions: activation value, pleasure value. Each word in every dimension has a corresponding value. The affective value of the text is two-dimensional. An affective tendency analyze system targeted at Chinese texts is realized, which consists of a Chinese processing engine and an affective analyzing engine. The affective tendency engine includes affective words identification function, and a rule set of sentences structure. Tests were carried out by using the affective texts. | |||
TO cite this article:Song Guangpeng. The Method of Analyzing Affective Tendency in Text[OL].[12 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16297 |
8. NAT/Firewall Traversal in NSIS | |||
Li Xin | |||
Computer Science and Technology 09 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, at first, we analyze the necessity of NAT and firewall. Meanwhile we should notice that NAT and firewall are some impeditive to an end-to-end session, in other words, we need to traverse them under some circumstances. In the following sections, we enumerate several kinds of solutions for NAT and firewall traversal. Unfortunately, all of current solutions have respective defects, so that we could not traverse NAT and firewall thoroughly. To resolve these problems, we introduce Next Steps in Signaling (NSIS) in this paper. NSIS can not be only applied in traditional network, but also can be used for mobile scenarios. It can deal with problems caused by the mobility. | |||
TO cite this article:Li Xin. NAT/Firewall Traversal in NSIS[OL].[ 9 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16263 |
9. Automatic Video Summarization Based Chinese Caption | |||
Wang Si | |||
Computer Science and Technology 09 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Domestic video clips usually contain Chinese captions. The captions include rich semantic information and they are valuable descriptions of the video content. Extracting the high-level semantic of caption can help people to understand the content of the video easily and it also can make the video retrieval more efficiently. In this paper, an approach, which is based on semantic correlation between sentences in a caption text, is proposed to generate the summarization of the caption. Firstly we get the caption text of the video and segment the caption text into words and sentences to complete information segmentation. Secondly using the clustering algorithm, sentences are clustered to implement information combination. Finally representative sentences are extracted from each class to generate the summarization of caption, which can be considered to be video summarization Experimental results indicate that the method is feasible and useful. | |||
TO cite this article:Wang Si. Automatic Video Summarization Based Chinese Caption[OL].[ 9 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16251 |
10. Web Services Globalization Models | |||
Chen Yong | |||
Computer Science and Technology 05 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Web services do not provide Globalization capabilities in the base standards, each of the operating environment and technologies have developed proprietary. This paper describes Web services globalization Architecture models and solutions … | |||
TO cite this article:Chen Yong. Web Services Globalization Models[OL].[ 5 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16141 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated