Learn More
With the rapid growth of emerging applications like social network analysis, semantic Web analysis and bioinformatics network analysis, a variety of data to be processed continues to witness a quick increase. Effective management and analysis of large-scale data poses an interesting but critical challenge. Recently, big data has attracted a lot of attention(More)
Due to the inherent characteristics of resource-constrained sensors, communication overhead is always a major concern in wireless sensor networks (WSNs). Data aggregation is an essential technique to reduce the communication overhead and prolong network lifetime. Since data aggregation results are usually used to make critical decisions, the accuracy of(More)
With the increasing number of technology areas using Virtual Machine (VM) platforms, challenges exist in Virtual Machine migrating from one physical host to another. However, the complexity of these virtualized environments presents additional management challenges. Unfortunately, many traditional approaches may be either not effective well for reducing(More)
Human exposure to pollutants from e-waste is an important scientific issue for their health effects. In this study, organohalogen pollutants in human serum sample from an e-waste dismantling site (n=35) and a control site (n=21), both located in Tianjin, Northern China, were analyzed using GC-ECNI-MS. Geometric mean concentrations of tetra- through(More)
Radio Frequency Identification (RFID) technology has been widely used in inventory management in many scenarios, e.g., warehouses, retail stores, hospitals, etc. This paper investigates a challenging problem of complete identification of missing tags in large-scale RFID systems. Although this problem has attracted extensive attention from academy and(More)
Trademark image retrieval (TIR), a branch of content-based image retrieval (CBIR), is playing an important role in multimedia information retrieval. This paper proposes an effective solution for TIR by combining shape description and feature matching. We first present an effective shape description method which includes two shape descriptors. Second, we(More)
Selfish behaviors significantly affect the overall performance of mobile ad hoc networks (MANETs). Reputation systems have been proved to be an efficient way to block such behaviors in MANETs. Several reputation models based on subjective logic have been proposed to improve the reputation mechanism, in which an uncertainty value is introduced for reputation(More)
With the increasing amount of text data stored in relational databases, there is a demand for RDBMS to support keyword queries over text data. As a search result is often assembled from multiple relational tables, traditional IR-style ranking and query evaluation methods cannot be applied directly. In this paper, we study the effectiveness and the(More)
Due to the use of acoustic channels with limited available bandwidth, Underwater Sensor Networks (USNs) often suffer from significant performance restrictions such as low reliability, low energy-efficiency, and high end-to-end packet delay. The provisioning of reliable, energy-efficient, and low-delay communication in USNs has become a challenging research(More)