工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 人工智能 计算机系统结构 计算机软件 计算机工程 计算机应用 计算机科学技术其他学科
搜索结果: 1-15 共查到知识库 计算机科学技术 Web 2.0相关记录689条 . 查询时间(0.196 秒)
基于Web服务发现方法通常是将Web服务聚在某一个固定的功能类中,导致该Web服务的其余功能特性被忽略,Web服务的资源利用率降低的问题,提出一种基于LDA和模糊C均值的Web服务多功能聚类方法。首先,从ProgrammableWeb.com网站上爬取Web服务数据,并抽取Web服务描述文档;其次,使用LDA主题模型对Web服务描述文档进行建模,获得包含不同功能信息的文档主题矩阵;最后,在文档主题...
为高效地发现满足用户需求的Web服务,针对Web服务的描述文本较短、缺乏足够有效信息的问题,提出一种基于Word2Vec和LDA主题模型的Web服务聚类方法。该方法首先将Wikipedia语料库作为扩充源,使用word2vec对Web服务描述文档内容进行扩充,再将扩充后的描述文档利用主题模型进行特征建模,将短文本主题建模转化为长文本主题建模,更准确地实现服务内容主题表达,最后根据文档的主题分布矩阵...
针对协同过滤算法无法有效处理数据稀疏的问题,提出1种基于受限玻尔兹曼机的Web服务质量(QoS)预测方法;第1阶段使用受限玻尔兹曼机模型对所有缺失的QoS值进行预测,并对原始的QoS矩阵进行填充;在第2阶段基于该QoS矩阵进行全局邻居筛选,同时将受限玻尔兹曼机引入到用户近邻的协同过滤模型中,以预测目标QoS值。研究结果表明:该方法能提高QoS预测精确度,在一定程度上降低数据稀疏对预测的影响。
Recent years have seen a noticeable growth in migration flows from Africa and Middle East to Southern Europe, thus generating a remarkable increase of attention on media and public opinion, sometimes ...
Tabular data on the Web has become a rich source of struc-tured data that is useful for ordinary users to explore. Due to its potential, tables on the Web have recently attracted a number of studies w...
The platform now called “VOLUMEZERO” (http://www.volumezero.jp) was introduced by a team led by Prof. Junko IWABUCHI of Research Institute for Digital Media and Content, Keio University, Tokyo, Japan ...
Web 2.0时代的各类信息技术给隐私与监控这两个互相竞争与依存的概念带来了挑战。了解这些挑战必须首先从历史的角度理解这两个概念在东西方的不同解读。其次,随着各类信息技术的发展,现代组织对其成员的监控行为渗透到各个方面,从而导致在工作场所中这两个概念的矛盾日益加深,这一现象值得深入研究。已有相关理论文献及数据报告显示:在数字时代,组织监控的概念需要被重新审视,因为传统意义上的垂直监视呈逐渐扁平化的...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
Private Web Search     Private Web Search  response       2015/8/5
Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users� activity online and therefore one through which a significant amou...
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing directly measures response times from a we...
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
The amount of information available on the Web grows at an incredible high rate. Systems and procedures devised to extract these data from Web sources already exist, and different approaches and techn...
A web smart space is an intelligent environment which has additional capability of searching the information smartly and efficiently. New advancements like dynamic web contents generation has increase...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...