In this abstract propose a product aspect ranking framework to automatically identify the important aspects of products from numerous consumer reviews. It develop a probabilistic aspect ranking algorithm to infer the importance of various aspects by simultaneously exploiting aspect frequency and the influence of consumers’ opinions given to each aspect over their overall opinions on […]
Archives for March 2015
WORKFLOWS IN THE CLOUD USING TRANSFORMATION-BASED MONETARY COST OPTIMIZATIONS
This abstract proposes ToF, a general transformation-based optimization framework for workflows in the cloud. Specifically, ToF formulates six basic workflow transformation operations. An arbitrary performance and cost optimization process can be represented as a transformation plan (i.e., a sequence of basic transformation operations). All transformations form a huge optimization space. We further develop a cost […]
PROBABILISTIC ASPECT RANKING ALGORITHM FOR PRODUCT ASPECT RANKING AND ITS APPLICATIONS
Product aspect ranking is beneficial to a wide range of real-world applications. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given […]
LEVERAGING THE TAIL TIME FOR BATCHING AND PREFETCHING TO REDUCE ENERGY CONSUMPTION IN CELLULAR NETWORKS
In cellular networks, inactivity timers are used to control the release of radio resources. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre fetching. Our work is the first to consider using rather than eliminating the […]
LOCX: A NOVEL APPROACH FOR PRESERVING LOCATION PRIVACY IN GEOSOCIAL APPLICATIONS
In this abstract, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on-ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in […]
LOCATION PRIVACY PRESERVING IN GEOSOCIAL APPLICATIONS
In this abstract, we introduce LocX, a novel alternative that provides significantly improved location privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user share this […]
LOCX: A NOVEL APPROACH FOR PRESERVING LOCATION PRIVACY IN GEOSOCIAL APPLICATIONS
In this abstract, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on-ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in […]
TAILTHEFT SCHEME FOR REDUCE ENERGY CONSUMPTION IN CELLULAR NETWORKS
Inactivity timers in cellular networks are used to balance the trade-offs between resource efficiency for enhanced user experience and low management overhead. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre fetching. Our work is the […]
PUBLIC SENTIMENT VARIATIONS ANALYZING ON TWITTER
Twitter has become a social site where millions of users can exchange their opinion. Sentiment analysis on Twitter data has provided an economical and effective way to expose public opinion timely, which is critical for decision making in various domains. In this work, we move one step further to interpret sentiment variations. We observed that […]
HARD AI PROBLEMS BASED CAPTCHA AS GRAPHICAL PASSWORDS SECURITY PRIMITIVE
In this abstract, we introduce a new security primitive based on hard AI problems, namely, a novel family of graphical pass-word systems integrating Captcha technology, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-based graphical passwords, where a sequence of clicks on an image is used to derive a password. Unlike other click-based […]