您的位置: 专家智库 > >

国家自然科学基金(60873225)

作品数:7 被引量:17H指数:3
相关作者:王多强刘华文鲁剑锋李瑞轩李玉华更多>>
相关机构:华中科技大学浙江师范大学更多>>
发文基金:国家自然科学基金国家高技术研究发展计划国家教育部博士点基金更多>>
相关领域:自动化与计算机技术天文地球交通运输工程更多>>

文献类型

  • 7篇期刊文章
  • 1篇会议论文

领域

  • 7篇自动化与计算...
  • 1篇天文地球
  • 1篇交通运输工程

主题

  • 2篇网络
  • 1篇电信
  • 1篇电信设备
  • 1篇电信设备制造...
  • 1篇对等
  • 1篇信任管理
  • 1篇信任模型
  • 1篇学术
  • 1篇学术研究
  • 1篇用户
  • 1篇用户反馈
  • 1篇语义
  • 1篇语义对等
  • 1篇语义分析
  • 1篇制造商
  • 1篇治安
  • 1篇治安法官
  • 1篇社会网
  • 1篇社会网络
  • 1篇设备制造商

机构

  • 2篇华中科技大学
  • 1篇武汉大学
  • 1篇浙江师范大学

作者

  • 1篇鲁剑锋
  • 1篇刘华文
  • 1篇彭智勇
  • 1篇毕威
  • 1篇王多强
  • 1篇宋伟
  • 1篇李栋才
  • 1篇李玉华
  • 1篇李瑞轩

传媒

  • 2篇Wuhan ...
  • 1篇武汉理工大学...
  • 1篇计算机科学
  • 1篇Journa...
  • 1篇Tsingh...
  • 1篇Intern...

年份

  • 1篇2012
  • 3篇2011
  • 3篇2010
  • 1篇2009
7 条 记 录,以下是 1-8
排序方式:
混合马尔科夫预测模型及其在反洗钱中的应用研究被引量:4
2011年
反洗钱中的一个重要问题是预测可疑账户未来可能发生的交易。马尔科夫模型在股票、商品价格、市场占有率等经济领域的预测中具有广泛的应用,但单一的马尔科夫模型的预测准确性有待提高。提出一种结合数据挖掘中聚类、关联规则和低序马尔科夫模型的混合马尔科夫模型,并在模型的建立过程中基于置信度进行剪枝以降低时间复杂度,最后将该模型用于预测反洗钱领域中账户之间的交易。实验表明,该模型具有较高的预测准确性,并在预测准确性和时间复杂度两者之间取得了较好的平衡。
李玉华李栋才毕威李瑞轩
关键词:聚类关联规则反洗钱
Disambiguating Authors by Pairwise Classification被引量:1
2010年
Name ambiguity is a critical problem in many applications, in particular in online bibliography sys-tems, such as DBLP, ACM, and CiteSeerx. Despite the many studies, this problem is still not resolved and is becoming even more serious, especially with the increasing popularity of Web 2.0. This paper addresses the problem in the academic researcher social network ArnetMiner using a supervised method for exploiting all side information including co-author, organization, paper citation, title similarity, author's homepage, web constraint, and user feedback. The method automatically determines the person number k. Tests on the researcher social network with up to 100 different names show that the method significantly outperforms the baseline method using an unsupervised attribute-augmented graph clustering algorithm.
林泉王波杜圆王雪至李玉华陈松灿
关键词:电信设备制造商消歧社会网络学术研究用户反馈
TSPN: Term-Based Semantic Peer-to-Peer Networks
2012年
In this paper, we propose Term-based Semantic Peer-to-Peer Networks (TSPN) to achieve semantic search. For each peer, TSPN builds a full text index of its documents. Through the analysis of resources, TSPN obtains series of terms, and distributes these terms into the network. Thus, TSPN can use query terms to locate appropriate peers to perform semantic search. Moreover, unlike the traditional structured P2P networks, TSPN uses the terms, not the peers, as the logical nodes of DHT. This can with-stand the impact of network churn. The experimental results show that TSPN has better performance compared with the existing P2P semantic searching algorithms.
GAO GuoqiangLI RuixuanLU Zhengding
关键词:对等语义分析
Caching Scheme Based on Power-Law Characteristic in Unstructured P2P Networks
2009年
In order to reduce the traffic load and improve the availability of the shared resources in unstructured P2P networks,a caching scheme combining alternative index and adaptive replication (AIAR) is presented. AIAR uses random walk mechanism to disperse the caching information of resources in the network based on its power-law characteristic,and dynamically adjusts replicas according to the visit frequency on resources and the degree information of peers. Subsequent experimental results show that the proposed AIAR scheme is beneficial to improve the search performance of success rate and respond speed. In addition,compared to some existing caching scheme,AIAR can perform much better in success rate,especially in a dynamic environment.
左翠华李瑞轩卢正鼎
关键词:P2P网络非结构化法律特征幂律
Trustworthy Assurance of Service Interoperation in Cloud Environment被引量:6
2011年
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Compared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.
Bing LiBu-Qing CaoKun-Mei WenRui-Xuan Li
关键词:信任模型信任管理服务提供者
可信数据库环境下面向服务的自适应密文数据查询方法
实现加密数据的高效安全查询是保证可信数据库安全性和实用性的关键.与目前加密数据查询采用的静态密文分段方法不同,论文基于加密数据的分布和用户查询类型、分布规律,提出了一种自适应加密索引AEI(Adaptive Encryp...
宋伟彭智勇程芳权李文海胡文斌任毅
文献传递
访问控制策略的分类方法研究被引量:5
2011年
访问控制是网络安全防范和保护的主要策略,回顾了几种访问控制策略的分类方法,提出了一种新的分类方法,将访问控制策略划分为被动和主动类型,分别介绍了几种有代表性的访问控制策略,对比分析了各自的特点及适用环境。
鲁剑锋刘华文王多强
关键词:网络安全
Construction of High Dependable Distributed Access Control Architecture Based on Quorum System被引量:1
2010年
Quorum system is a preferable model to construct distributed access control architecture, but not all quorum system can satisfy the requirements of distributed access control architecture. Aiming at the dependable problem of authorization server in distributed system and combining the requirements of access control, a set of criterions to select and evaluate quorum system is presented. The scheme and algorithm of constructing an authorization server system based on Paths quorum system are designed, and the integrated system performance under some servers attacked is fully analyzed. Role-based access control on the Web implemented by this scheme is introduced. Analysis shows that with certain node failure probability, the scheme not only has high dependability but also can satisfy the special requirements of distributed access control such as real-time, parallelism, and consistency of security policy.
XIONG TinggangLU ZhengdingZHANG JiahongMA Zhong
关键词:可靠性
共1页<1>
聚类工具0