Learn More
An algorithm of 3D model watermarking which has an effective resistance to the affine transform is designed. The algorithm uses high-capacity gray image as the watermark information, and chooses Nielson norm combining with redundancies of triangle meshes. Experimental results show that the algorithm can effectively resist attacks such as translation,(More)
Traditional outlier mining methods identify outliers from a global point of view. These methods are inefficient to find locally-biased data points (outliers) in low dimensional subspaces. Constrained concept lattices can be used as an effective formal tool for data analysis because constrained concept lattices have the characteristics of high constructing(More)
Association rule mining, in which generating frequent patterns is a key step, is an effective way of identifying inherent and unknown interrelationships between characteristics of celestial spectra data and its physicochemical properties. In this study, we first make use of the first-order predicate logic to represent knowledge derived from celestial(More)
In this paper, we present a thermal-aware file assignment technique called TIGER for reducing the cooling cost of storage clusters in data centers. We show that peak inlet temperatures of storage nodes depend on not only CPU utilization but also I/O activities, which rely on file assignments in a cluster. The TIGER scheme aims to lower peak inlet(More)
Decision tree is an effective way of classification rule extraction. For the incomplete decision system, an algorithm of constructing decision tree and classification rule extraction is presented based on the logical relationship between attributes which is described with generalized decision function, and conditional information entropy as heuristic. In(More)