期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
An Incremental Algorithm of Text Clustering Based on Semantic Sequences 被引量:1
1
作者 FENG Zhonghui SHEN Junyi BAO Junpeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1340-1344,共5页
This paper proposed an incremental textclustering algorithm based on semantic sequence. Using similarity relation of semantic sequences and calculating the cover of similarity semantic sequences set, the candidate clu... This paper proposed an incremental textclustering algorithm based on semantic sequence. Using similarity relation of semantic sequences and calculating the cover of similarity semantic sequences set, the candidate cluster with minimum entropy overlap value was selected as a result cluster every time in this algorithm. The comparison of experimental results shows that the precision of the algorithm is higher than other algorithms under same conditions and this is obvious especially on long documents set. 展开更多
关键词 text clustering semantic sequence ENTROPY
在线阅读 下载PDF
On environment-driven software model for Internetware 被引量:17
2
作者 Lǔ Jian MA XiaoXing TAO XianPing CAO Chun HUANG Yu YU Ping 《Science in China(Series F)》 2008年第6期683-721,共39页
Internetware is envisioned as a general software paradigm for the application style of resources integration and sharing in the open, dynamic and uncertain platforms such as the Internet. Continuing the agent-based In... Internetware is envisioned as a general software paradigm for the application style of resources integration and sharing in the open, dynamic and uncertain platforms such as the Internet. Continuing the agent-based Internetware model presented in a previous paper, in this paper, after an analysis of the behavioral patterns and the technical challenges of environment-driven applications, a software-structuring model is proposed for environment-driven Internetware applications. A series of explorations on the enabling techniques for the model, especially the modeling, management and utilization of context information are presented. Several proto-typical systems have also been built to prove the concepts and evaluate the techniques. These research efforts make a further step toward the Internetware paradigm by providing an initial framework for the construction of context-aware and self-adaptive software application systems in the open network environment. 展开更多
关键词 software engineering INTERNETWARE CONTEXT-AWARENESS SELF-ADAPTATION
原文传递
Semi-supervised learning based probabilistic latent semantic analysis for automatic image annotation 被引量:1
3
作者 Tian Dongping 《High Technology Letters》 EI CAS 2017年第4期367-374,共8页
In recent years,multimedia annotation problem has been attracting significant research attention in multimedia and computer vision areas,especially for automatic image annotation,whose purpose is to provide an efficie... In recent years,multimedia annotation problem has been attracting significant research attention in multimedia and computer vision areas,especially for automatic image annotation,whose purpose is to provide an efficient and effective searching environment for users to query their images more easily. In this paper,a semi-supervised learning based probabilistic latent semantic analysis( PLSA) model for automatic image annotation is presenred. Since it's often hard to obtain or create labeled images in large quantities while unlabeled ones are easier to collect,a transductive support vector machine( TSVM) is exploited to enhance the quality of the training image data. Then,different image features with different magnitudes will result in different performance for automatic image annotation. To this end,a Gaussian normalization method is utilized to normalize different features extracted from effective image regions segmented by the normalized cuts algorithm so as to reserve the intrinsic content of images as complete as possible. Finally,a PLSA model with asymmetric modalities is constructed based on the expectation maximization( EM) algorithm to predict a candidate set of annotations with confidence scores. Extensive experiments on the general-purpose Corel5k dataset demonstrate that the proposed model can significantly improve performance of traditional PLSA for the task of automatic image annotation. 展开更多
关键词 automatic image annotation semi-supervised learning probabilistic latent semantic analysis(PLSA) transductive support vector machine(TSVM) image segmentation image retrieval
在线阅读 下载PDF
Exploiting PLSA model and conditional random field for refining image annotation 被引量:1
4
作者 田东平 《High Technology Letters》 EI CAS 2015年第1期78-84,共7页
This paper presents a new method for refining image annotation by integrating probabilistic la- tent semantic analysis (PLSA) with conditional random field (CRF). First a PLSA model with asymmetric modalities is c... This paper presents a new method for refining image annotation by integrating probabilistic la- tent semantic analysis (PLSA) with conditional random field (CRF). First a PLSA model with asymmetric modalities is constructed to predict a candidate set of annotations with confidence scores, and then model semantic relationship among the candidate annotations by leveraging conditional ran- dom field. In CRF, the confidence scores generated lay the PLSA model and the Fliekr distance be- tween pairwise candidate annotations are considered as local evidences and contextual potentials re- spectively. The novelty of our method mainly lies in two aspects : exploiting PLSA to predict a candi- date set of annotations with confidence scores as well as CRF to further explore the semantic context among candidate annotations for precise image annotation. To demonstrate the effectiveness of the method proposed in this paper, an experiment is conducted on the standard Corel dataset and its re- sults are 'compared favorably with several state-of-the-art approaches. 展开更多
关键词 automatic image annotation probabilistie latent semantic analysis (PLSA) ex- pectation-maximization conditional random field(CRF) Fliekr distance image retrieval
在线阅读 下载PDF
Semantic image annotation based on GMM and random walk model 被引量:1
5
作者 田东平 《High Technology Letters》 EI CAS 2017年第2期221-228,共8页
Automatic image annotation has been an active topic of research in computer vision and pattern recognition for decades.A two stage automatic image annotation method based on Gaussian mixture model(GMM) and random walk... Automatic image annotation has been an active topic of research in computer vision and pattern recognition for decades.A two stage automatic image annotation method based on Gaussian mixture model(GMM) and random walk model(abbreviated as GMM-RW) is presented.To start with,GMM fitted by the rival penalized expectation maximization(RPEM) algorithm is employed to estimate the posterior probabilities of each annotation keyword.Subsequently,a random walk process over the constructed label similarity graph is implemented to further mine the potential correlations of the candidate annotations so as to capture the refining results,which plays a crucial role in semantic based image retrieval.The contributions exhibited in this work are multifold.First,GMM is exploited to capture the initial semantic annotations,especially the RPEM algorithm is utilized to train the model that can determine the number of components in GMM automatically.Second,a label similarity graph is constructed by a weighted linear combination of label similarity and visual similarity of images associated with the corresponding labels,which is able to avoid the phenomena of polysemy and synonym efficiently during the image annotation process.Third,the random walk is implemented over the constructed label graph to further refine the candidate set of annotations generated by GMM.Conducted experiments on the standard Corel5 k demonstrate that GMM-RW is significantly more effective than several state-of-the-arts regarding their effectiveness and efficiency in the task of automatic image annotation. 展开更多
关键词 semantic image annotation Gaussian mixture model GMM) random walk rival penalized expectation maximization (RPEM) image retrieval
在线阅读 下载PDF
Fusing PLSA model and Markov random fields for automatic image annotation 被引量:1
6
作者 田东平 Zhao Xiaofei Shi Zhongzhi 《High Technology Letters》 EI CAS 2014年第4期409-414,共6页
A novel image auto-annotation method is presented based on probabilistic latent semantic analysis(PLSA) model and multiple Markov random fields(MRF).A PLSA model with asymmetric modalities is first constructed to esti... A novel image auto-annotation method is presented based on probabilistic latent semantic analysis(PLSA) model and multiple Markov random fields(MRF).A PLSA model with asymmetric modalities is first constructed to estimate the joint probability between images and semantic concepts,then a subgraph is extracted served as the corresponding structure of Markov random fields and inference over it is performed by the iterative conditional modes so as to capture the final annotation for the image.The novelty of our method mainly lies in two aspects:exploiting PLSA to estimate the joint probability between images and semantic concepts as well as multiple MRF to further explore the semantic context among keywords for accurate image annotation.To demonstrate the effectiveness of this approach,an experiment on the Corel5 k dataset is conducted and its results are compared favorably with the current state-of-the-art approaches. 展开更多
关键词 automatic image annotation probabilistic latent semantic analysis (PLSA) expectation maximization Markov random fields (MRF) image retrieval
在线阅读 下载PDF
A scheme on automated test data generation and its evaluation 被引量:1
7
作者 陈继锋 朱利 +1 位作者 沈钧毅 王志海 《Journal of Central South University of Technology》 EI 2006年第1期87-92,共6页
By analyzing some existing test data generation methods, a new automated test data generation approach was presented. The linear predicate functions on a given path was directly used to construct a linear constrain sy... By analyzing some existing test data generation methods, a new automated test data generation approach was presented. The linear predicate functions on a given path was directly used to construct a linear constrain system for input variables. Only when the predicate function is nonlinear, does the linear arithmetic representation need to be computed. If the entire predicate functions on the given path are linear, either the desired test data or the guarantee that the path is infeasible can be gotten from the solution of the constrain system. Otherwise, the iterative refining for the input is required to obtain the desired test data. Theoretical analysis and test results show that the approach is simple and effective, and takes less computation. The scheme can also be used to generate path-based test data for the programs with arrays and loops. 展开更多
关键词 test data generation linear constrain linear arithmetic representation
在线阅读 下载PDF
GSPEC: A GRAPHICAL SPECIFICATION LANGUAGE FOR SOFTWARE
8
作者 戴敏 徐家福 《Science China Mathematics》 SCIE 1989年第10期1260-1269,共10页
This paper summarizes the principles and ideas in the design of a graphical specification language, called GSPEC. Based on the requirement analysis of specification languages, a new software decomposition model is pro... This paper summarizes the principles and ideas in the design of a graphical specification language, called GSPEC. Based on the requirement analysis of specification languages, a new software decomposition model is proposed, and an abstract data type definition method combining both the algebraic and the flrst-order logic descriptions is adopted in GSPEC. With its graphical representation, the correctness of its specifications can be guaranteed or verified to some extent. The language is powerful and easy to understand. It has been implemented on IBM PC/AT computers and SUN-3/160 C work stations. 展开更多
关键词 GSPEC REQUIREMENT ANALYSIS GRAPHICAL SPECIFICATION language.
原文传递
Multi-mode interaction middleware for software services
9
作者 TAO XianPing MA XiaoXing LU Jian YU Ping ZHOU Yu 《Science in China(Series F)》 2008年第8期985-999,共15页
Due to the independency, variability, and tailorability of software service in the open environment, the research of middleware which supports software services multi-mode interaction is thus of great importance. In t... Due to the independency, variability, and tailorability of software service in the open environment, the research of middleware which supports software services multi-mode interaction is thus of great importance. In this paper, an agent-based multi-mode interaction middleware model and its supporting system for software services were proposed. This model includes an interaction feature decomposition and configuration model to enable interaction programming, an agent-based middleware model, and a programmable coordination media based on reflection technology. The decomposition and configuration model for interaction features can assist programmers in interaction programming by analyzing and synthesizing interaction features. The agent-based middleware model provides a runtime framework for service multi-mode interaction. The programmable coordination media is able to effectively support software service coordination based on multimode interaction. To verify feasibility and efficiency of the above method, the design, implementation and performance analysis of Artemis-M3C, a multi-mode interaction middleware for software services, were introduced. The result shows that the above method is feasible and that the Artemis-M3C system is practical and effective in multi-mode interaction. 展开更多
关键词 open environment multi-mode interaction Mobile Agent interaction mode programming programmable coordination media
原文传递
FRAMEWORK OF ALGORITHM CORRECTNESS IN NDADAS 被引量:2
10
作者 吕建 《Science China Mathematics》 SCIE 1991年第7期875-884,共10页
A functional specification decomposition tree model of an algorithm design process ispresented, and the properties of functional specification and the correctness criteria of thealgorithm design are discussed. The cor... A functional specification decomposition tree model of an algorithm design process ispresented, and the properties of functional specification and the correctness criteria of thealgorithm design are discussed. The correctness of some major rules used in NDADAS isverified. 展开更多
关键词 SOFTWARE ENGINEERING NDADAS SYSTEM algorithm.
原文传递
A mathematical model of inheritance
11
作者 瞿裕忠 王志坚 徐家福 《Science China(Technological Sciences)》 SCIE EI CAS 1996年第1期17-26,共10页
Inheritance is regarded as the hallmark of object-oriented programming languages.A mathematical model of inheritance is presented.In this model,the graph-sorted signature is introduced to represent the algebraic struc... Inheritance is regarded as the hallmark of object-oriented programming languages.A mathematical model of inheritance is presented.In this model,the graph-sorted signature is introduced to represent the algebraic structure of the program,and an extension function on the graph-sorted signatures is used to formally describe the semantics of inheritance.The program’s algebraic structure reflects the syntactic constraints of the language and the corresponding extension function exposes the character of the language’s inheritance. 展开更多
关键词 OBJECT-ORIENTED INHERITANCE ALGEBRAIC structure graph-sorted SIGNATURE extension.
原文传递
Design Rationale for a Wide Spectrum Specification Language FGSPEC
12
作者 吕建 徐家福 《Journal of Computer Science & Technology》 SCIE EI CSCD 1993年第2期138-146,共9页
FGSPEC is a wide spectrum specification language intended to facilitate the software specification and the expression of transformation process from the functional specification which describes“what to do”to the cor... FGSPEC is a wide spectrum specification language intended to facilitate the software specification and the expression of transformation process from the functional specification which describes“what to do”to the corresponding design(operational)specification which describes“how to do”.The design emphasizes the coherence of multi-level specification mechanisms and a tree structure model is provided which unifies the wide spectrum specification styles from“what”to“how”. 展开更多
关键词 Specification language software development automation TRANSFORMATION HOS-methodology algorithm design automation
原文传递
ANALOGY MODEL AND ANALOGY CORRESPONDENCE
13
作者 伊波 徐家福 《Science China Mathematics》 SCIE 1992年第3期374-384,共11页
This paper proposes two definitions of analogy from the aspects of epistemology andmethodology respectively, i. e. ?-analogy based on a common model and A_c-analogy basedon analogy correspondence. Their relations are ... This paper proposes two definitions of analogy from the aspects of epistemology andmethodology respectively, i. e. ?-analogy based on a common model and A_c-analogy basedon analogy correspondence. Their relations are discussed. An analysis method for findinganalogy correspondence has been derived from the definition of A_c-analogy. 展开更多
关键词 ANALOGY COMMON MODEL ANALOGY CALCULUS ANALOGY analysis.
原文传递
Complete Bipartite Anonymity for Location Privacy
14
作者 董恺 顾涛 +1 位作者 陶先平 吕建 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第6期1094-1110,共17页
Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring u... Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users' paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of "end points connecting to a specific start point in a graph" is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby nsers to discover and authenticate each other without knowing their real identities or accurate locations, predict tile encounter location using users' moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack. 展开更多
关键词 location privacy K-ANONYMITY path confusion query obfuscation complete bipartite anonymity
原文传递
Sound and complete rules for data reification
15
作者 吕建 《Science China(Technological Sciences)》 SCIE EI CAS 1997年第4期379-386,共8页
The sound and complete rules for data reification in the algebraic framework are discussed. Based on these rules, the retrieve function approach in VDM is extended and the biased model and non-determinacy can be treat... The sound and complete rules for data reification in the algebraic framework are discussed. Based on these rules, the retrieve function approach in VDM is extended and the biased model and non-determinacy can be treated in some sense 展开更多
关键词 DATA REIFICATION VDM simulation.
原文传递
Preface
16
作者 Tao Xie He Jiang +4 位作者 Ge Li Tianyu Wo Rahul Pandita Chang Xu Lihua Xu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第5期873-875,共3页
As a continuation of last three years' special section on software systems, this special section encourages and promotes research to address challenges from the perspective of software systems. The goal of this speci... As a continuation of last three years' special section on software systems, this special section encourages and promotes research to address challenges from the perspective of software systems. The goal of this special section is to present state-of-the-art and high-quality original research in the area of software systems. Similar to last three years' special section, this special section includes two major themes: data-driven software engineering, and software testing and analvsis. 展开更多
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部