Designing well-structured websites to facilitate effective user navigation has long been a challenge. A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the […]
Query Recommendation Using Query Logs in Search Engines
For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this paper, we propose a novel approach to infer user search goals by […]
Mining Distance-Based Outliers from Categorical Data
Outlier detection can usually be considered as a pre-processing step for locating, in a data set, those objects that do not conform to well-defined notions of expected behavior. It is very important in data mining for discovering novel or rare events, anomalies, vicious actions, exceptional phenomena, etc. We are investigating outlier detection for categorical data […]
MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching
We propose an NFA-based algorithm called MIN-MAX to support matching of regular expressions (regexp) composed of Character Classes with Constraint Repetitions (CCR). MIN-MAX is well suited for massive parallel processing architectures, such as FPGAs, yet it is effective on any other computing platform. In MIN-MAX, each active CCR engine (to implement one CCR term) evaluates […]
Tractable Reasoning and Efficient Query Answering in Description Logics
The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system). The method amounts to extracting from the reference DMS a piece of schema relevant to the new application needs—a module—, possibly personalizing it with extra constraints w.r.t. the application […]
Medical image enhancement using resolution synthesis
We introduce the bilateral filter BF is the same bilateral filter we use in the HSF for improved resolution synthesis For picture blocks, BR(Bayesian reconstruction) simply uses the conventional JPEG decoder to decode the blocks. RS is a classification based image interpolation scheme which achieves optimal interpolation by training from image pairs at low resolution […]
Improved binary partition tree construction for hyperspectral images
The optimal exploitation of the information provided by hyperspectral images requires the development of advanced image-processing tools. Hyperspectral imaging enables the characterization of regions based on their spectral properties which provides a rich amount of information. This paper proposes the construction and the processing of a new region-based hierarchical hyperspectral image representation relying on the […]
Learning Horizontal Connections In A Sparse Coding Model Of Natural Images
Image prior models based on sparse and redundant representations are attracting more and more attention in the field of image restoration. The conventional sparsity-based methods enforce sparsity prior on small image patches independently. Unfortunately, these works neglected the contextual information between sparse representations of neighboring image patches . Sparse coding of image patches extracted from […]
Content Delivery Networks In Load Balancing For A Distributed Control Law
we face the challenging issue of defining and implementing an effective law for load balancing in Content Delivery Networks (CDNs). We base our proposal on a formal study of a CDN system, carried out through the exploitation of a fluid flow model characterization of the network of servers. Starting from such characterization, we derive and […]
Attribute-Based Encryption Using Cloud Computing In Scalable and Secure Sharing of Personal Health Records
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ […]