首页 > 最新文献

2009 IEEE International Conference on Network Infrastructure and Digital Content最新文献

英文 中文
An improved iris recognition system based on Gabor filters 基于Gabor滤波器的改进虹膜识别系统
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360867
Hui Zheng, Fei Su
An improved iris recognition system based on even symmetry Gabor wavelet is proposed in this paper. In iris image preprocess, an effective segmentation and eyelids occlusion detection approach are introduced. During recognition, only the imaginary part of complex 2-D Gabor filter is used in coding for shorter code length but without affecting the recognition performance. A simple effective filter parameters selection scheme is proposed at the same time. Experimental results on CASIA1.0 and ICE 2005 databases clearly demonstrate that our improved methods can achieve highly accurate iris recognition with a short code length.
提出了一种基于偶对称Gabor小波的改进虹膜识别系统。在虹膜图像预处理中,提出了一种有效的分割和眼睑遮挡检测方法。在识别过程中,仅使用复二维Gabor滤波器的虚部进行编码,编码长度较短,但不影响识别性能。同时提出了一种简单有效的滤波器参数选择方案。在CASIA1.0和ICE 2005数据库上的实验结果清楚地表明,我们改进的方法可以在短码长的情况下实现高精度的虹膜识别。
{"title":"An improved iris recognition system based on Gabor filters","authors":"Hui Zheng, Fei Su","doi":"10.1109/ICNIDC.2009.5360867","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360867","url":null,"abstract":"An improved iris recognition system based on even symmetry Gabor wavelet is proposed in this paper. In iris image preprocess, an effective segmentation and eyelids occlusion detection approach are introduced. During recognition, only the imaginary part of complex 2-D Gabor filter is used in coding for shorter code length but without affecting the recognition performance. A simple effective filter parameters selection scheme is proposed at the same time. Experimental results on CASIA1.0 and ICE 2005 databases clearly demonstrate that our improved methods can achieve highly accurate iris recognition with a short code length.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125310337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dual-band automatic gain control algorithm for chirp spread spectrum over indoor fading channels 室内衰落信道中啁啾扩频的双频自动增益控制算法
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360914
Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, J. Chong
In this paper, we propose a novel automatic gain control (AGC) algorithm as a solution to improve the signal reception performance based on the IEEE 802.15.4a chirp spread spectrum (CSS) over indoor fading channels. The CSS signals are composed of low-band and high-band signals whose frequency characteristics are different because of multipath fading in indoor environment. It is not appropriate to apply only one conventional AGC which regardless of the different bands, where the received signals are contaminated by quantization noise or clipped. The proposed AGC algorithm is based on two AGCs which are designed to be matched well with low-band and high-band signals separately.
本文提出了一种基于IEEE 802.15.a啁啾扩频(CSS)的自动增益控制(AGC)算法,以改善室内衰落信道下的信号接收性能。CSS信号由低频段和高频段信号组成,在室内环境下,由于多径衰落,其频率特性不同。当接收到的信号被量化噪声污染或被截断时,不考虑不同的频带,只采用一种传统的AGC是不合适的。本文提出的AGC算法是基于两个AGC设计的,分别可以很好地匹配低频段和高频段信号。
{"title":"Dual-band automatic gain control algorithm for chirp spread spectrum over indoor fading channels","authors":"Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, J. Chong","doi":"10.1109/ICNIDC.2009.5360914","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360914","url":null,"abstract":"In this paper, we propose a novel automatic gain control (AGC) algorithm as a solution to improve the signal reception performance based on the IEEE 802.15.4a chirp spread spectrum (CSS) over indoor fading channels. The CSS signals are composed of low-band and high-band signals whose frequency characteristics are different because of multipath fading in indoor environment. It is not appropriate to apply only one conventional AGC which regardless of the different bands, where the received signals are contaminated by quantization noise or clipped. The proposed AGC algorithm is based on two AGCs which are designed to be matched well with low-band and high-band signals separately.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Probability-based trust management model for distributed e-commerce 基于概率的分布式电子商务信任管理模型
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360968
Ping Dong, Hongchao Wang, Hongke Zhang
The trust issue in distributed e-commerce systems has attracted much research attention in recent years. Existing e-commerce systems have presented trust management models which provide reputation information to buyers. However, more comprehensive models should be proposed to more precisely predict the trust level of sellers on potential transactions, and to defeat several kinds of possible attacks. This paper makes an effort to design PTME, a probability-based trust management model for distributed e-commerce, which is an attack-resistant trust model for evaluating and propagating reputation in distributed e-commerce systems. In this paper we describe the possible attacks on existing systems. Our model is then proposed to overcome these attacks. We provide a probability-based framework and detail approaches for this model. The performance evaluation and security analysis of PTME are provided to show its effectiveness.
分布式电子商务系统中的信任问题是近年来备受关注的研究课题。现有的电子商务系统已经提出了向购买者提供信誉信息的信任管理模型。然而,应该提出更全面的模型,以更准确地预测卖家对潜在交易的信任程度,并击败几种可能的攻击。本文设计了一种基于概率的分布式电子商务信任管理模型PTME,它是分布式电子商务系统中信誉评估和传播的一种抗攻击信任模型。在本文中,我们描述了对现有系统的可能攻击。然后提出我们的模型来克服这些攻击。我们为这个模型提供了一个基于概率的框架和详细的方法。最后对该方法进行了性能评价和安全性分析。
{"title":"Probability-based trust management model for distributed e-commerce","authors":"Ping Dong, Hongchao Wang, Hongke Zhang","doi":"10.1109/ICNIDC.2009.5360968","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360968","url":null,"abstract":"The trust issue in distributed e-commerce systems has attracted much research attention in recent years. Existing e-commerce systems have presented trust management models which provide reputation information to buyers. However, more comprehensive models should be proposed to more precisely predict the trust level of sellers on potential transactions, and to defeat several kinds of possible attacks. This paper makes an effort to design PTME, a probability-based trust management model for distributed e-commerce, which is an attack-resistant trust model for evaluating and propagating reputation in distributed e-commerce systems. In this paper we describe the possible attacks on existing systems. Our model is then proposed to overcome these attacks. We provide a probability-based framework and detail approaches for this model. The performance evaluation and security analysis of PTME are provided to show its effectiveness.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Chinese query expansion based on user log clustering 基于用户日志聚类的中文查询扩展
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360836
Shufang Jia, Lei Li
Most previous query expansion researches are based on pseudo relevant documents. In this study, we present a novel expansion method by clustering the real user log. Because not all of the clicked pages are suitable for query expansion, we de-noised the clicked results by reliability to enhance the performance. After HTML labels removing, the page body contents are clustered and the cluster centers cover various aspects of the original query. The terms used in log queries can provide a better choice of features, from the user's point of view, for summarizing the web pages that were clicked from these queries. Therefore, the associated queries, reverse queries, webpage title and keyword phrases are combined with the cluster centers to attain high-quality expansion terms for new queries. We also propose a new terminology extraction method through Baidu Baike. It can identify and extract the terminology phrase based on the manual edited dictionary online.
以往的查询扩展研究大多是基于伪相关文档的。在这项研究中,我们提出了一种新的扩展方法,即对真实用户日志进行聚类。由于并非所有被点击的页面都适合进行查询扩展,我们通过可靠性对点击结果进行降噪,以提高性能。在删除HTML标签之后,页面主体内容被聚类,聚类中心覆盖了原始查询的各个方面。从用户的角度来看,日志查询中使用的术语可以提供更好的特性选择,用于总结从这些查询中单击的网页。因此,将关联查询、反向查询、网页标题和关键字短语与聚类中心相结合,以获得新查询的高质量扩展词。我们还提出了一种新的基于百度百科的术语提取方法。它可以基于人工编辑的在线词典对术语短语进行识别和提取。
{"title":"Chinese query expansion based on user log clustering","authors":"Shufang Jia, Lei Li","doi":"10.1109/ICNIDC.2009.5360836","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360836","url":null,"abstract":"Most previous query expansion researches are based on pseudo relevant documents. In this study, we present a novel expansion method by clustering the real user log. Because not all of the clicked pages are suitable for query expansion, we de-noised the clicked results by reliability to enhance the performance. After HTML labels removing, the page body contents are clustered and the cluster centers cover various aspects of the original query. The terms used in log queries can provide a better choice of features, from the user's point of view, for summarizing the web pages that were clicked from these queries. Therefore, the associated queries, reverse queries, webpage title and keyword phrases are combined with the cluster centers to attain high-quality expansion terms for new queries. We also propose a new terminology extraction method through Baidu Baike. It can identify and extract the terminology phrase based on the manual edited dictionary online.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"35 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125725194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An identity authentication system based on mobile phone token 基于手机令牌的身份认证系统
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360974
Peng Kunyu, Jiande Zheng, Yang Jing
Anthentication is a mechanism to establish proof of identities. Traditional password authentication could not provide enough security for the information system when it faces the most modern means of attack. The problem could be solved by taking token authentication, but as a new authentication system, it is difficult connecting with existed authentication systems, especially in the authorized access control system. In this paper, we propose a new token authentication scheme, which can closely integrate with the traditional authentication system to form a seamless interface and directly use the corresponding authorization and the access control service, and realize a prototype system finally. In our model of authentication, we transform the challenge-response token authentication to password authentication, which solves the secure problem of the password authentication; develope a mobile phone token software based on the lightweight crypt package from Bouncy Castle and the J2ME platform, which solves scheme's feasible problem; design a bluetooth communication model between the mobile phone token and the PC; complete the development of mobile phone token authentication prototype system finally.
认证是一种建立身份证明的机制。当信息系统面临最现代化的攻击手段时,传统的密码认证已经不能为信息系统提供足够的安全性。采用令牌认证可以解决这一问题,但作为一种新型的认证系统,它与现有的认证系统相连接比较困难,特别是在授权访问控制系统中。本文提出了一种新的令牌认证方案,该方案可以与传统的认证系统紧密集成,形成无缝接口,并直接使用相应的授权和访问控制服务,最终实现了一个原型系统。在我们的认证模型中,我们将质询-响应令牌认证转换为密码认证,解决了密码认证的安全性问题;基于Bouncy Castle轻量级加密包和J2ME平台开发了手机令牌软件,解决了方案的可行性问题;设计了手机令牌与PC机之间的蓝牙通信模型;最后完成了手机令牌认证原型系统的开发。
{"title":"An identity authentication system based on mobile phone token","authors":"Peng Kunyu, Jiande Zheng, Yang Jing","doi":"10.1109/ICNIDC.2009.5360974","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360974","url":null,"abstract":"Anthentication is a mechanism to establish proof of identities. Traditional password authentication could not provide enough security for the information system when it faces the most modern means of attack. The problem could be solved by taking token authentication, but as a new authentication system, it is difficult connecting with existed authentication systems, especially in the authorized access control system. In this paper, we propose a new token authentication scheme, which can closely integrate with the traditional authentication system to form a seamless interface and directly use the corresponding authorization and the access control service, and realize a prototype system finally. In our model of authentication, we transform the challenge-response token authentication to password authentication, which solves the secure problem of the password authentication; develope a mobile phone token software based on the lightweight crypt package from Bouncy Castle and the J2ME platform, which solves scheme's feasible problem; design a bluetooth communication model between the mobile phone token and the PC; complete the development of mobile phone token authentication prototype system finally.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126927948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The study on video information leakage of computer 计算机视频信息泄露的研究
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360845
Jinhong Fan, Li He
The computer may cause information leakage when working. It has become an extremely urgent question studied now. The electromagnetic leakage principle of the computer video signal was analyzed in this paper because the video cable that connects a host to a monitor is thought as a main electromagnetic radiation part on the base of the working principle of a VDU. The information leakage approach, the red and black signals and the character analysis are presented. The paper studies the electromagnetic radiation of the red signals transmitting through the video cable and analyzes their waveform characteristic. Thus the radiation characteristic of the video signal is mastered, which can provide a theoretical basis for the recovery of the video information, protection method and technique measure.
电脑在工作时可能会造成信息泄露。这已成为一个迫切需要研究的问题。本文从VDU的工作原理出发,将连接主机和显示器的视频线作为主要的电磁辐射部件,分析了计算机视频信号的电磁泄漏原理。介绍了信息泄漏方法、红、黑信号及其特征分析。本文研究了通过视频电缆传输的红色信号的电磁辐射,分析了其波形特征。从而掌握视频信号的辐射特性,为视频信息的恢复、保护方法和技术措施提供理论依据。
{"title":"The study on video information leakage of computer","authors":"Jinhong Fan, Li He","doi":"10.1109/ICNIDC.2009.5360845","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360845","url":null,"abstract":"The computer may cause information leakage when working. It has become an extremely urgent question studied now. The electromagnetic leakage principle of the computer video signal was analyzed in this paper because the video cable that connects a host to a monitor is thought as a main electromagnetic radiation part on the base of the working principle of a VDU. The information leakage approach, the red and black signals and the character analysis are presented. The paper studies the electromagnetic radiation of the red signals transmitting through the video cable and analyzes their waveform characteristic. Thus the radiation characteristic of the video signal is mastered, which can provide a theoretical basis for the recovery of the video information, protection method and technique measure.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121937142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The methods of personal features selection using ACOGA and geometric extrema characteristics for Chinese online signature verification 基于ACOGA和几何极值特征的中文在线签名个人特征选择方法
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360930
Guozhong Cheng, Feng Wei
This paper presents a new method to select a segment-to-segment matching by analysing signature verification, accordingly curve segments used in signature verification and the regional feature contained in the curve segment are picked-up and the regional features are selected by ant colony optimization (ACO) algorithm and genetic algorithms(GAs). Namely, features selected are first encoded into chromosome, and descendible types are founded by ACOGA improved locally. The essential advantages of ACO including cooperativity, obustness, positive feedback and distributed nature were discuss and also the disadvantages of low convergence speed while the high adaptability of GAs were discussed too. Meanwhile, cross operation and mutation of genetic algorithms were introduced into the ACO. A new crossover method is also proposed to determine the number of curve segments. The experiment shows that the algorithms proposed can accurately find optimal features for signature verification and bring the lower FRR and FAR, thereby the veracity in online signature verification is enhanced.
本文提出了一种通过分析签名验证来选择段间匹配的新方法,据此提取用于签名验证的曲线段和曲线段中包含的区域特征,并采用蚁群优化算法和遗传算法对区域特征进行选择。即首先将选择的特征编码到染色体中,并通过局部改进的ACOGA来建立后代类型。讨论了蚁群算法的协同性、业务性、正反馈性和分布式等本质优点,同时也讨论了蚁群算法收敛速度慢而适应性强的缺点。同时,在蚁群算法中引入了遗传算法的交叉操作和变异。提出了一种确定曲线段数的交叉方法。实验表明,所提出的算法能够准确地找到签名验证的最优特征,具有较低的FRR和FAR,从而提高了在线签名验证的准确性。
{"title":"The methods of personal features selection using ACOGA and geometric extrema characteristics for Chinese online signature verification","authors":"Guozhong Cheng, Feng Wei","doi":"10.1109/ICNIDC.2009.5360930","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360930","url":null,"abstract":"This paper presents a new method to select a segment-to-segment matching by analysing signature verification, accordingly curve segments used in signature verification and the regional feature contained in the curve segment are picked-up and the regional features are selected by ant colony optimization (ACO) algorithm and genetic algorithms(GAs). Namely, features selected are first encoded into chromosome, and descendible types are founded by ACOGA improved locally. The essential advantages of ACO including cooperativity, obustness, positive feedback and distributed nature were discuss and also the disadvantages of low convergence speed while the high adaptability of GAs were discussed too. Meanwhile, cross operation and mutation of genetic algorithms were introduced into the ACO. A new crossover method is also proposed to determine the number of curve segments. The experiment shows that the algorithms proposed can accurately find optimal features for signature verification and bring the lower FRR and FAR, thereby the veracity in online signature verification is enhanced.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Data Flow Graph-based software watermarking 基于动态数据流图的软件水印
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360804
Bo Feng, Miao Zhang, Guoai Xu, Xinxin Niu, Zhengming Hu
In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
基于软件运行过程中的动态数据依赖关系,提出了动态数据流图的概念。在此基础上,提出了一种动态软件水印算法,将水印信息嵌入到软件的DDFG中,并讨论了水印嵌入和提取的实现。最后对该算法的性能进行了分析。
{"title":"Dynamic Data Flow Graph-based software watermarking","authors":"Bo Feng, Miao Zhang, Guoai Xu, Xinxin Niu, Zhengming Hu","doi":"10.1109/ICNIDC.2009.5360804","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360804","url":null,"abstract":"In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123372272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey of user generated service 用户生成服务的调查
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360953
Zhenzhen Zhao, N. Laga, N. Crespi
The success of the user generated content raises the new idea of enabling end-users to create their own services. User generated service will become the next big user-driven hype in the technology arena. This paper presents an overall view of the user generated service, from both technical and business perspective. We clarify the concept of user generated service, analysis the challenges, and illustrate the current platforms/tools in the classification of tech-inclined users and non-tech users. The underlying key technologies, incoming trends, as well as the future research topics, are also detailed.
用户生成内容的成功引发了让终端用户创建自己的服务的新想法。用户生成服务将成为技术领域下一个由用户驱动的大热门。本文从技术和业务两个角度对用户生成的服务进行了全面的介绍。我们澄清了用户生成服务的概念,分析了挑战,并说明了当前的平台/工具在技术倾向用户和非技术用户的分类。本文还详细介绍了潜在的关键技术、未来的发展趋势以及未来的研究课题。
{"title":"A survey of user generated service","authors":"Zhenzhen Zhao, N. Laga, N. Crespi","doi":"10.1109/ICNIDC.2009.5360953","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360953","url":null,"abstract":"The success of the user generated content raises the new idea of enabling end-users to create their own services. User generated service will become the next big user-driven hype in the technology arena. This paper presents an overall view of the user generated service, from both technical and business perspective. We clarify the concept of user generated service, analysis the challenges, and illustrate the current platforms/tools in the classification of tech-inclined users and non-tech users. The underlying key technologies, incoming trends, as well as the future research topics, are also detailed.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The parallel algorithm of Clique and it's application on Data Mining Grid system Clique并行算法及其在数据挖掘网格系统中的应用
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5361004
Ping Chen, Zhen Liu, Xiuquan Qiao, Xiaoping Tian
Computing of some parameters using great amount of data is a great challenge in data mining fields so far. DMG (Data Mining Grid) is designed to solve the computing problem. The design of the workflow service in DMG and the distributed data mining algorithm, are investigated. A sample application in telecom field Customer Value Analysis is and illustrated. In the sample application, Clique, which is computed by parallel algorithm on data mining grid system, is an important measure in Telecom Social Network, which benefits to enhance the precise of context-based prediction of the customer value in telecom social network and work out information in expected duration. Telecom operators can take measures to gain more profit.
使用大量数据计算某些参数是目前数据挖掘领域的一大难题。DMG (Data Mining Grid)是为了解决计算问题而设计的。研究了DMG中工作流服务的设计和分布式数据挖掘算法。并举例说明了在电信领域客户价值分析中的应用实例。在示例应用中,在数据挖掘网格系统上采用并行算法计算的Clique是电信社交网络中的一项重要度量,它有利于提高基于上下文的电信社交网络客户价值预测的精度,并计算出预期持续时间内的信息。电信运营商可以采取措施获得更多的利润。
{"title":"The parallel algorithm of Clique and it's application on Data Mining Grid system","authors":"Ping Chen, Zhen Liu, Xiuquan Qiao, Xiaoping Tian","doi":"10.1109/ICNIDC.2009.5361004","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5361004","url":null,"abstract":"Computing of some parameters using great amount of data is a great challenge in data mining fields so far. DMG (Data Mining Grid) is designed to solve the computing problem. The design of the workflow service in DMG and the distributed data mining algorithm, are investigated. A sample application in telecom field Customer Value Analysis is and illustrated. In the sample application, Clique, which is computed by parallel algorithm on data mining grid system, is an important measure in Telecom Social Network, which benefits to enhance the precise of context-based prediction of the customer value in telecom social network and work out information in expected duration. Telecom operators can take measures to gain more profit.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE International Conference on Network Infrastructure and Digital Content
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1