首页 > 最新文献

2013 International Conference on Information Science and Cloud Computing Companion最新文献

英文 中文
Mining Spam Accounts with User Influence 挖掘具有用户影响力的垃圾账户
Kan Chen, Peidong Zhu, Yueshan Xiong
As the increasing development of online social networks (OSNs), spammers' attentions have been attracted from the traditional email field. Nowadays, advertisements, deception messages, illegal contents are prevalent in all kinds of ONSs. They're propagated from one to another arbitrarily, polluting the Internet environment, and what's more, resulting in a great many of security problems. Some previous works have been proposed to detect spammers according to user properties. The problem is that in order to prevent from being detected, spammers are likely to pretend to be normal, and what's more, some normal users also engage into spam spreading for financial benefits, making detection more difficult. In this paper, we solve the detection problem from the view of user influence. The basic of our work is that since spammers pretend to be normal, their influences should keep step with their normal behaviors. But when a spam campaign is launched, usually in order to influent others, a great many of spammers engaged into propagation, the original poster's influence would get a sudden increase, making him outstanding from the others. In this way, we can distinguish the original spammers and supervise from the root of the propagation tree. Our work is experimented on real data gathered from Weibo and shows inspiring results.
随着在线社交网络的日益发展,垃圾邮件发送者的注意力已经从传统的电子邮件领域吸引过来。如今,各种网络服务中充斥着广告、欺骗信息、非法内容。它们被任意地从一个传播到另一个,污染了互联网环境,更严重的是,造成了许多安全问题。以前的一些工作已经提出了根据用户属性来检测垃圾邮件发送者。问题是,为了不被发现,垃圾邮件发送者可能会假装正常,而且一些正常用户也会为了经济利益而参与垃圾邮件的传播,这使得检测更加困难。本文从用户影响的角度来解决检测问题。我们工作的基础是,既然垃圾邮件发送者假装正常,他们的影响应该与他们的正常行为保持同步。但是当一个垃圾邮件活动启动后,通常是为了影响他人,大量的垃圾邮件发送者参与传播,原发帖者的影响力会突然增加,使他从其他人中脱颖而出。通过这种方法,我们可以从传播树的根上区分原始垃圾邮件发送者并进行监督。我们的工作是在微博上收集的真实数据上进行实验的,结果令人鼓舞。
{"title":"Mining Spam Accounts with User Influence","authors":"Kan Chen, Peidong Zhu, Yueshan Xiong","doi":"10.1109/ISCC-C.2013.85","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.85","url":null,"abstract":"As the increasing development of online social networks (OSNs), spammers' attentions have been attracted from the traditional email field. Nowadays, advertisements, deception messages, illegal contents are prevalent in all kinds of ONSs. They're propagated from one to another arbitrarily, polluting the Internet environment, and what's more, resulting in a great many of security problems. Some previous works have been proposed to detect spammers according to user properties. The problem is that in order to prevent from being detected, spammers are likely to pretend to be normal, and what's more, some normal users also engage into spam spreading for financial benefits, making detection more difficult. In this paper, we solve the detection problem from the view of user influence. The basic of our work is that since spammers pretend to be normal, their influences should keep step with their normal behaviors. But when a spam campaign is launched, usually in order to influent others, a great many of spammers engaged into propagation, the original poster's influence would get a sudden increase, making him outstanding from the others. In this way, we can distinguish the original spammers and supervise from the root of the propagation tree. Our work is experimented on real data gathered from Weibo and shows inspiring results.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132424113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New Features Acquisition of Text with Cloud-LDA Model 基于Cloud-LDA模型的文本新特征获取
Maoyuan Zhang, Fanli He, Shui-Chin Chen
This paper probes into how to improve Information Retrieval by changing the feature distribution of the text. It introduces Cloud Model theory into Latent Dirichlet Allocation(LDA) Model and build a new feature selection system. LDA Model is used to mine the underlying topical structure. Each topic is associated with a multinomial distribution over words which are semantic related. But there is doubt that themes are relevant with each other in the light of semantics. Based on LDA model presented probability distribution of vocabulary in text, the new system with Cloud Model theory can automatically simulate feature set whose contribution degree is high in the text. Results show this feature set has less features but higher classification accuracy, thus obviously better than currently popular feature selection methods. If the query is matched to words with high contribution degree, the more these words are, the more relevant the article searched out is with the query. NTCIR-5 (the 5th NII Test Collection for IR Systems) collections of Experiment on SLIR (Single Language IR) show that this method achieves an obvious improvement compared with some other methods in IR.
本文探讨了如何通过改变文本的特征分布来改进信息检索。将云模型理论引入到潜在狄利克雷分配(LDA)模型中,构建了新的特征选择系统。LDA模型用于挖掘潜在的主题结构。每个主题都与语义相关的词的多项分布相关联。但是,从语义学的角度来看,主位之间的相关性存在疑问。该系统基于LDA模型给出的词汇在文本中的概率分布,利用云模型理论自动模拟文本中贡献程度高的特征集。结果表明,该特征集具有较少的特征,但分类精度较高,明显优于目前流行的特征选择方法。如果查询匹配到贡献度高的单词,那么这些单词越多,搜索出的文章与该查询的相关性越高。单语言红外(slr)实验集表明,该方法与其他一些红外方法相比,取得了明显的改进。
{"title":"New Features Acquisition of Text with Cloud-LDA Model","authors":"Maoyuan Zhang, Fanli He, Shui-Chin Chen","doi":"10.1109/ISCC-C.2013.94","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.94","url":null,"abstract":"This paper probes into how to improve Information Retrieval by changing the feature distribution of the text. It introduces Cloud Model theory into Latent Dirichlet Allocation(LDA) Model and build a new feature selection system. LDA Model is used to mine the underlying topical structure. Each topic is associated with a multinomial distribution over words which are semantic related. But there is doubt that themes are relevant with each other in the light of semantics. Based on LDA model presented probability distribution of vocabulary in text, the new system with Cloud Model theory can automatically simulate feature set whose contribution degree is high in the text. Results show this feature set has less features but higher classification accuracy, thus obviously better than currently popular feature selection methods. If the query is matched to words with high contribution degree, the more these words are, the more relevant the article searched out is with the query. NTCIR-5 (the 5th NII Test Collection for IR Systems) collections of Experiment on SLIR (Single Language IR) show that this method achieves an obvious improvement compared with some other methods in IR.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hadoop Cellular Automata for Identifying Rumor in Social Networks 用于识别社交网络谣言的Hadoop元胞自动机
Hui Zhang, Ji Li, Yueliang Xiao
Rumors are unavoidable in social networks and spreading through social networks. In this paper, we introduce three roles, which are rumor maker, accomplice and innocent, into social networks. Rumor makers are people who distribute rumors in social networks. In order to propagate rumor as more people as possible, rumor maker cannot achieve this goal without others' help. So that accomplices are people who help rumor maker spread rumors. Innocent are people who do not share help for rumors spreading. We introduce an extended cellular automata algorithm, i.e. Hadoop Cellular Automata (HCA), to simulate people's tweeting activity in social networks. We deploy our experiments on an open source platform, Hadoop. Our result shows that Hadoop Cellular Automata is a liner algorithm. Also HCA can simulate people's tweeting activity very well and can pick out rumors easily in social networks.
谣言在社交网络中不可避免,并通过社交网络传播。本文将谣言制造者、共犯和无辜者三种角色引入到社交网络中。谣言制造者是指在社交网络上散布谣言的人。为了尽可能多地传播谣言,造谣者离不开他人的帮助。帮凶就是帮助造谣者传播谣言的人。无辜的人是那些不帮助谣言传播的人。我们引入了一种扩展的元胞自动机算法,即Hadoop元胞自动机(HCA)来模拟人们在社交网络中的推文活动。我们将实验部署在开源平台Hadoop上。结果表明,Hadoop元胞自动机是一种线性算法。此外,HCA可以很好地模拟人们的推特活动,可以很容易地在社交网络中挑选谣言。
{"title":"Hadoop Cellular Automata for Identifying Rumor in Social Networks","authors":"Hui Zhang, Ji Li, Yueliang Xiao","doi":"10.1109/ISCC-C.2013.76","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.76","url":null,"abstract":"Rumors are unavoidable in social networks and spreading through social networks. In this paper, we introduce three roles, which are rumor maker, accomplice and innocent, into social networks. Rumor makers are people who distribute rumors in social networks. In order to propagate rumor as more people as possible, rumor maker cannot achieve this goal without others' help. So that accomplices are people who help rumor maker spread rumors. Innocent are people who do not share help for rumors spreading. We introduce an extended cellular automata algorithm, i.e. Hadoop Cellular Automata (HCA), to simulate people's tweeting activity in social networks. We deploy our experiments on an open source platform, Hadoop. Our result shows that Hadoop Cellular Automata is a liner algorithm. Also HCA can simulate people's tweeting activity very well and can pick out rumors easily in social networks.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis on the Impact of Cloud Computing for Management Information System 云计算对管理信息系统的影响分析
Xiaojing Wang, Conglin Ran
First of all, the concept of cloud computing and the present situation of management information system are to be introduced. This is followed by an analysis of the impact of cloud computing on MIS from the MIS development, operation and maintenance, as well as data security aspects. The conclusion is that the MIS development mode comprised of mash up, development methodology oriented workflow, operation and maintenance is simple and service-oriented with on-demand billing, minimalized resource cost, and constrained data security. This paper can guide enterprises to carry out MIS strategy planning and construction in the cloud, improving the efficiency of MIS development and the probability of success, so as to enhance the core competitiveness of enterprises.
首先,介绍了云计算的概念和管理信息系统的现状。然后从管理信息系统的开发、运维以及数据安全等方面分析了云计算对管理信息系统的影响。结论是MIS开发模式由mashup、面向工作流的开发方法、运维组成,具有简单、面向服务、按需计费、最小化资源成本、约束数据安全性等特点。本文可以指导企业在云中进行MIS战略规划和建设,提高MIS开发的效率和成功的概率,从而增强企业的核心竞争力。
{"title":"Analysis on the Impact of Cloud Computing for Management Information System","authors":"Xiaojing Wang, Conglin Ran","doi":"10.1109/ISCC-C.2013.46","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.46","url":null,"abstract":"First of all, the concept of cloud computing and the present situation of management information system are to be introduced. This is followed by an analysis of the impact of cloud computing on MIS from the MIS development, operation and maintenance, as well as data security aspects. The conclusion is that the MIS development mode comprised of mash up, development methodology oriented workflow, operation and maintenance is simple and service-oriented with on-demand billing, minimalized resource cost, and constrained data security. This paper can guide enterprises to carry out MIS strategy planning and construction in the cloud, improving the efficiency of MIS development and the probability of success, so as to enhance the core competitiveness of enterprises.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Use Conditional Proxy Re-encryption 多用途条件代理重加密
L. Mo, Guoxiang Yao
In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can delegate the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, as an important part for fulfilling our main goal, a new method to generate the partial re-encryption keys is proposed, and the security of our scheme is proven secure against chosen cipher text attacks based on the random oracle model.
本文方案命名多用代理re-encryption条件提出了基于ECC第一,可在以下电子邮件服务场景:爱丽丝可以委托她解密权利鲍勃的加密邮件发送给她,其中包含一个特定的词和满足条件设置代理的爱丽丝,和鲍勃也可以委托其他人的权利就像爱丽丝通过代理,为他设定的条件满意,如果需要的话。在此基础上,提出了一种生成部分重加密密钥的新方法,并证明了该方案的安全性,可以抵抗基于随机oracle模型的选择密文攻击。
{"title":"Multi-Use Conditional Proxy Re-encryption","authors":"L. Mo, Guoxiang Yao","doi":"10.1109/ISCC-C.2013.90","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.90","url":null,"abstract":"In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can delegate the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, as an important part for fulfilling our main goal, a new method to generate the partial re-encryption keys is proposed, and the security of our scheme is proven secure against chosen cipher text attacks based on the random oracle model.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of SOA and Web Service in Implementing Heterogeneous System Integration SOA和Web服务在异构系统集成中的应用
Yilan Yang
Large enterprises tend to have heterogeneous systems, namely the formation of "islands of information", that makes information interaction and interoperability very difficult. Application of integrated development based on service-oriented architecture, which does not change the underlying architecture of enterprise applications, is a good solution to the aforementioned problems. This paper proposes a scheme to integrate heterogeneous resources based on SOA and Web Service, and builds inter-departmental business systems to conduct feasibility analysis and to verity theoretical basis with interoperability, cross-industry interconnection and data sharing as benchmarks.
大型企业往往具有异构系统,即形成“信息孤岛”,这使得信息交互和互操作性非常困难。基于面向服务的体系结构的集成开发应用程序,不改变企业应用程序的底层体系结构,是解决上述问题的良好方案。本文提出了基于SOA和Web Service的异构资源整合方案,并构建跨部门业务系统,以互操作性、跨行业互联互通、数据共享为基准进行可行性分析和理论基础验证。
{"title":"Application of SOA and Web Service in Implementing Heterogeneous System Integration","authors":"Yilan Yang","doi":"10.1109/ISCC-C.2013.50","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.50","url":null,"abstract":"Large enterprises tend to have heterogeneous systems, namely the formation of \"islands of information\", that makes information interaction and interoperability very difficult. Application of integrated development based on service-oriented architecture, which does not change the underlying architecture of enterprise applications, is a good solution to the aforementioned problems. This paper proposes a scheme to integrate heterogeneous resources based on SOA and Web Service, and builds inter-departmental business systems to conduct feasibility analysis and to verity theoretical basis with interoperability, cross-industry interconnection and data sharing as benchmarks.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Super-Resolution Employing an Efficient Nonlocal Prior 利用高效非局部先验的超分辨率
Shuai Chen, Bin Chen, Yi-bao He
In this paper, we propose a novel approach for multiframe super-resolution reconstruction by incorporating non-local prior in the maximum a posteriori (MAP) formulation. This prior expresses that recovered images tend to exhibit repetitive structures. A great deal of computation is required in the original non-local prior algorithm dealing with the huge amount of weight calculations. Techniques of weight symmetry, moving averaging filter, limited search window are adopted to speed up non-local filter. Meanwhile, Non-Linear Conjugated Gradient (NLCG) method is introduced to solve simultaneously the high-resolution (HR) image of optimization process and non-local prior adapted to the HR image. Experimental results on extensive synthetic and realistic images demonstrate the superiority of the proposed algorithm to representative algorithms both quantitatively and qualitatively.
在本文中,我们提出了一种新的多帧超分辨率重建方法,即在最大后验(MAP)公式中加入非局部先验。这一先验表明,恢复的图像往往表现出重复的结构。原有的非局部先验算法在处理大量的权重计算时,需要进行大量的计算。采用权对称、移动平均滤波、有限搜索窗口等技术提高非局部滤波的速度。同时,引入非线性共轭梯度(NLCG)方法,同时求解高分辨率(HR)图像的优化过程和适应于HR图像的非局部先验。在大量合成和真实图像上的实验结果表明,该算法在定量和定性上都优于代表性算法。
{"title":"Super-Resolution Employing an Efficient Nonlocal Prior","authors":"Shuai Chen, Bin Chen, Yi-bao He","doi":"10.1109/ISCC-C.2013.131","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.131","url":null,"abstract":"In this paper, we propose a novel approach for multiframe super-resolution reconstruction by incorporating non-local prior in the maximum a posteriori (MAP) formulation. This prior expresses that recovered images tend to exhibit repetitive structures. A great deal of computation is required in the original non-local prior algorithm dealing with the huge amount of weight calculations. Techniques of weight symmetry, moving averaging filter, limited search window are adopted to speed up non-local filter. Meanwhile, Non-Linear Conjugated Gradient (NLCG) method is introduced to solve simultaneously the high-resolution (HR) image of optimization process and non-local prior adapted to the HR image. Experimental results on extensive synthetic and realistic images demonstrate the superiority of the proposed algorithm to representative algorithms both quantitatively and qualitatively.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Evolution with Clustering Cooperative Coevolution for High-Dimensional Problems 基于聚类协同进化的高维问题差分进化
Shuzhen Wan
Recently, evolutionary algorithms have been successful to solve many optimization problems. However, their performance will deteriorate when applied to complex high-dimensional problems. A clustering-cooperative coevolution scheme was introduced into DE algorithm to tackle the high-dimensional problems. In the scheme, the clustering method has been employed to decompose the problem, which works well with the cooperative coevolution. The proposed algorithm is evaluated by MPB and CEC09 benchmark functions with expanded dimension. The results are very promising, which show clearly that our proposed algorithm is effective for dynamic high-dimensional optimization problems.
近年来,进化算法已经成功地解决了许多优化问题。然而,当应用于复杂的高维问题时,它们的性能会下降。为解决高维问题,在DE算法中引入了聚类-协作协同进化方案。该方案采用聚类方法对问题进行分解,很好地配合了协同进化。采用扩展维数的MPB和CEC09基准函数对算法进行了评价。结果表明,本文提出的算法对动态高维优化问题是有效的。
{"title":"Differential Evolution with Clustering Cooperative Coevolution for High-Dimensional Problems","authors":"Shuzhen Wan","doi":"10.1109/ISCC-C.2013.64","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.64","url":null,"abstract":"Recently, evolutionary algorithms have been successful to solve many optimization problems. However, their performance will deteriorate when applied to complex high-dimensional problems. A clustering-cooperative coevolution scheme was introduced into DE algorithm to tackle the high-dimensional problems. In the scheme, the clustering method has been employed to decompose the problem, which works well with the cooperative coevolution. The proposed algorithm is evaluated by MPB and CEC09 benchmark functions with expanded dimension. The results are very promising, which show clearly that our proposed algorithm is effective for dynamic high-dimensional optimization problems.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ASCMS: An Accurate Self-Modifying Code Cache Management Strategy in Binary Translation 一种精确的二进制翻译自修改代码缓存管理策略
Anzhan Liu, Wenqi Wang
Self-modifying code poses potential problems in binary translation. When the original source code had written by itself, the translated code block from source code must be retranslated. Self-modifying code must be accurately emulated by the runtime. To improve translation efficiency of self-modifying code, this paper design and realize a new policy named ASCMS for self-modifying code cache management. The ASCMS provides a precise positioning to a translated block, not to a trace or the whole code cache. Through the simulation experiments, The ASCMS has 3.95 times increase to self-modifying code in binary translation.
自修改代码在二进制翻译中存在潜在的问题。当原始源代码自己编写时,来自源代码的翻译代码块必须重新翻译。运行时必须精确地模拟自修改代码。为了提高自修改代码的翻译效率,本文设计并实现了一种新的自修改代码缓存管理策略ASCMS。ASCMS提供了对已翻译块的精确定位,而不是跟踪或整个代码缓存。通过仿真实验,ASCMS在二进制翻译中自修改码的能力提高了3.95倍。
{"title":"ASCMS: An Accurate Self-Modifying Code Cache Management Strategy in Binary Translation","authors":"Anzhan Liu, Wenqi Wang","doi":"10.1109/ISCC-C.2013.52","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.52","url":null,"abstract":"Self-modifying code poses potential problems in binary translation. When the original source code had written by itself, the translated code block from source code must be retranslated. Self-modifying code must be accurately emulated by the runtime. To improve translation efficiency of self-modifying code, this paper design and realize a new policy named ASCMS for self-modifying code cache management. The ASCMS provides a precise positioning to a translated block, not to a trace or the whole code cache. Through the simulation experiments, The ASCMS has 3.95 times increase to self-modifying code in binary translation.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127126513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Super-Resolution Reconstruction Algorithm Based on Regularization 基于正则化的改进超分辨率重建算法
Shuang Wang, Bing-liang Hu, Xiaokun Dong, Xing Yan
The traditional regularized super-resolution (SR) algorithms can reconstruct the high-resolution (HR) image to some extent. But the high frequency information of the image will lose seriously and the edges and details will become blurred. This paper presents an improved regularized SR algorithm. Firstly, a new interpolation algorithm is used to obtain the initial value of the HR image. Secondly, the trilateral filter is adopted as the regularization term to preserve the edge and details. Finally, the steepest descent method is taken as the iterative algorithm to gain the optimum solution. Simulated experiments are presented including the comparison with some existing reconstruction algorithms. Those results show that the proposed algorithm performs better than others. Furthermore, the edges and details of the image are well preserved.
传统的正则化超分辨率算法可以在一定程度上重建高分辨率图像。但图像的高频信息会严重丢失,边缘和细节会变得模糊。本文提出了一种改进的正则化SR算法。首先,采用一种新的插值算法获得HR图像的初始值;其次,采用三边滤波器作为正则化项,保留边缘和细节;最后,采用最陡下降法作为迭代算法,得到最优解。进行了仿真实验,并与现有的重构算法进行了比较。结果表明,该算法的性能优于其他算法。此外,图像的边缘和细节得到了很好的保留。
{"title":"An Improved Super-Resolution Reconstruction Algorithm Based on Regularization","authors":"Shuang Wang, Bing-liang Hu, Xiaokun Dong, Xing Yan","doi":"10.1109/ISCC-C.2013.44","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.44","url":null,"abstract":"The traditional regularized super-resolution (SR) algorithms can reconstruct the high-resolution (HR) image to some extent. But the high frequency information of the image will lose seriously and the edges and details will become blurred. This paper presents an improved regularized SR algorithm. Firstly, a new interpolation algorithm is used to obtain the initial value of the HR image. Secondly, the trilateral filter is adopted as the regularization term to preserve the edge and details. Finally, the steepest descent method is taken as the iterative algorithm to gain the optimum solution. Simulated experiments are presented including the comparison with some existing reconstruction algorithms. Those results show that the proposed algorithm performs better than others. Furthermore, the edges and details of the image are well preserved.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 International Conference on Information Science and Cloud Computing Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1