In this abstract propose a product aspect ranking framework to automatically identify the important aspects of products from numerous consumer reviews. It develop a probabilistic aspect ranking algorithm to infer the importance of various aspects by simultaneously exploiting aspect frequency and the influence of consumers’ opinions given to each aspect over their overall opinions on […]
WORKFLOWS IN THE CLOUD USING TRANSFORMATION-BASED MONETARY COST OPTIMIZATIONS
This abstract proposes ToF, a general transformation-based optimization framework for workflows in the cloud. Specifically, ToF formulates six basic workflow transformation operations. An arbitrary performance and cost optimization process can be represented as a transformation plan (i.e., a sequence of basic transformation operations). All transformations form a huge optimization space. We further develop a cost […]
PROBABILISTIC ASPECT RANKING ALGORITHM FOR PRODUCT ASPECT RANKING AND ITS APPLICATIONS
Product aspect ranking is beneficial to a wide range of real-world applications. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given […]
LEVERAGING THE TAIL TIME FOR BATCHING AND PREFETCHING TO REDUCE ENERGY CONSUMPTION IN CELLULAR NETWORKS
In cellular networks, inactivity timers are used to control the release of radio resources. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre fetching. Our work is the first to consider using rather than eliminating the […]
LOCX: A NOVEL APPROACH FOR PRESERVING LOCATION PRIVACY IN GEOSOCIAL APPLICATIONS
In this abstract, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on-ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in […]
LOCX: A NOVEL APPROACH FOR PRESERVING LOCATION PRIVACY IN GEOSOCIAL APPLICATIONS
In this abstract, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on-ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in […]
TAILTHEFT SCHEME FOR REDUCE ENERGY CONSUMPTION IN CELLULAR NETWORKS
Inactivity timers in cellular networks are used to balance the trade-offs between resource efficiency for enhanced user experience and low management overhead. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre fetching. Our work is the […]
HARD AI PROBLEMS BASED CAPTCHA AS GRAPHICAL PASSWORDS SECURITY PRIMITIVE
In this abstract, we introduce a new security primitive based on hard AI problems, namely, a novel family of graphical pass-word systems integrating Captcha technology, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-based graphical passwords, where a sequence of clicks on an image is used to derive a password. Unlike other click-based […]
TRACKING AND ANALYZING THE PUBLIC SENTIMENT VARIATIONS ON TWITTER
In this abstract, we analyze public sentiment variations on Twitter and mine possible reasons behind such variations. To track public sentiment, we combine two state-of-the-art sentiment analysis tools to obtain sentiment information towards interested targets (e.g., “Obama”) in each tweet. Based on the sentiment label obtained for each tweet, we can track the public sentiment […]
CARP SCHEME FOR SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS
Using hard AI (Artificial Intelligence) problems for security is an exciting new paradigm. Under this paradigm, the most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle, beyond the capability of computers but easy for humans. Captcha is now a standard Internet security technique to protect […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- Next Page »