Learn More
Image annotation has been an active research topic in recent years due to its potentially large impact on both image understanding and Web image search. In this paper, we target at solving the automatic image annotation problem in a novel <i>search</i> and <i>mining</i> framework. Given an uncaptioned image, first in the search stage, we perform(More)
BACKGROUND Mitochondrial fusion protein mutations are a cause of inherited neuropathies such as Charcot-Marie-Tooth disease and dominant optic atrophy. Previously we reported that the fusion protein optic atrophy 1 (OPA1) is decreased in heart failure. METHODS AND RESULTS We investigated cardiac function, mitochondrial function, and mtDNA stability in a(More)
In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the(More)
Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data generated(More)
In this paper, we propose building a vertical image search engine called EnjoyPhoto that leverages rich metadata from various photo forum web sites to meet users' requirements for enjoying high-quality photos, which is virtually impossible in traditional image search engines. To solve the ranking problem when aggregating multiple photo forums, we propose a(More)
—Without direct path, information delivery in sparse delay tolerant networks (DTNs) typically relies on intermittent relays, making the transmission not only unreliable but also time consuming. To make the matter even worse, the source nodes may transmit some encrypted " junk " information, similar as the spam emails in current mail systems, to the(More)
A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption.: Certificate-based proxy decryption systems with revocability in the standard model. A comment on ' '(More)
In recent years, social media has risen to prominence in China, with sites like Sina Weibo and Renren each boasting hundreds of millions of users. Social media in China plays a profound role as a platform for breaking news and political commentary that is not available in the state-sanctioned news media. However, like all websites in China, Chinese social(More)
Recently, Uber has emerged as a leader in the "sharing economy". Uber is a "ride sharing" service that matches willing drivers with customers looking for rides. However, unlike other open marketplaces (e.g., AirBnB), Uber is a black-box: they do not provide data about supply or demand, and prices are set dynamically by an opaque "surge pricing" algorithm.(More)