151,705 Hits in 5.5 sec

Building efficient multi-threaded search nodes

Carolina Bonacic, Carlos García, Mauricio Marin, Manuel Prieto-Matias, Francisco Tirado
2010 Proceedings of the 19th ACM international conference on Information and knowledge management - CIKM '10  
The only potential source of read/write conflicts among threads are the accesses to the different application caches present in the search node.  ...  to a different core.  ...  These strategies have been devised for distributed memory processors. To our knowledge, no work has been done in the subject of efficient query processing on modern multi-core architectures.  ... 
doi:10.1145/1871437.1871595 dblp:conf/cikm/BonacicGMPT10 fatcat:h2n3pr6xt5c7dddrsgotkfdp2e

Node Attribute Completion in Knowledge Graphs with Multi-Relational Propagation [article]

Eda Bayram and Alberto Garcia-Duran and Robert West
2020 arXiv   pre-print
Our approach, denoted as MrAP, imputes the values of missing attributes by propagating information across the multi-relational structure of a knowledge graph.  ...  The propagation mechanism operates iteratively in a message passing scheme that collects the predictions at every iteration and updates the value of the node attributes.  ...  Second, they build a k-NN graph upon the embedding to propagate the known values of node attributes towards the missing ones.  ... 
arXiv:2011.05301v1 fatcat:ypnu4tstyrc6tfzi75ouivdlpu

A hybrid approach for content extraction with text density and visual importance of DOM nodes

Dandan Song, Fei Sun, Lejian Liao
2013 Knowledge and Information Systems  
It is a fast, accurate and general method for extracting content from diverse web pages. And with the employment of DOM nodes, the original structure of the web page can be preserved.  ...  Accordingly, Text Density and Visual Importance are defined for the Document Object Model (DOM) nodes of a web page. Furthermore, a content extraction method with these measured values is proposed.  ...  It is based on the observation that a content block of a web page belongs to an ancestor node in the structure of DOM; and as mentioned before, the text density of content nodes is much higher than that  ... 
doi:10.1007/s10115-013-0687-x fatcat:wbbrkpkpnzgipadz25ni2bgqzi

Impact of the knowledge of nodes' positions on spectrum sensing strategies in cognitive networks

Andrea Abrardo, Marco Martalò, Gianluigi Ferrari
2016 Physical Communication  
The sensing correlation among the CUEs is exploited to improve the reliability of the decision, taken by a secondary fusion center (FC), on the occupation status (by a node of the PWN) of each subchannel  ...  In this context, we compute the mutual information between the occupation status and the observations at the FC, with and without knowledge of the positions of the nodes in the network, showing a potential  ...  Both approaches indicate a significant performance improvement when knowledge of the nodes' positions is available at the secondary FC.  ... 
doi:10.1016/j.phycom.2015.12.004 fatcat:2dzlkddtafaq3m3bzwzpm2nroe

Knowledge Patterns [article]

Peter Clark, John Thompson, Bruce Porter
2020 arXiv   pre-print
From a modeling perspective, knowledge patterns provide an important insight into the structure of a formal ontology: rather than viewing a formal ontology simply as a list of terms and axioms, knowledge  ...  Knowledge patterns make both those abstract theories and their mappings to the domain of interest explicit, thus making modeling decisions clear, and avoiding some of the ontological confusion that can  ...  Using Patterns for Building a Knowledge-Base We encountered the limitations of inheritance and developed the approach of knowledge patterns while building KB-PHaSE, a prototype knowledge-based system for  ... 
arXiv:2005.04306v1 fatcat:4zzvb5buvfcarm4u7oasjx6ejy

Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

Chao Ding, Lijun Yang, Meng Wu
2017 Sensors  
To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge.  ...  Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost.  ...  The approach of randomized witness selection can evenly distribute overhead among nodes, which effectively prevent single point of failure.  ... 
doi:10.3390/s17010160 pmid:28098846 pmcid:PMC5298733 fatcat:j7b2z2dp6fd6tpj5wpsuubkmqi

Predicting and Identifying Missing Node Information in Social Networks

Ron Eyal, Avi Rosenfeld, Sigal Sina, Sarit Kraus
2013 ACM Transactions on Knowledge Discovery from Data  
, to enable scaling the MISC algorithm to large networks of more than 100,000 nodes.  ...  To date, this line of research typically focused on finding the connections that are missing between nodes, a challenge typically termed as the Link Prediction Problem.  ...  The method is based on a stochastic block model, where the nodes of the network are partitioned into different blocks, and the probability of two nodes being connected depends only on the blocks to which  ... 
doi:10.1145/2536775 fatcat:m35kzk7435enznarlyr7wgk7hy

Erasing Data from Blockchain Nodes [article]

Martin Florian, Sophie Beaucamp, Sebastian Henningsen, Björn Scheuermann
2019 arXiv   pre-print
Using only our basic proof-of-concept implementation, we are already able to safely comply with a significantly larger range of erasure requests than, to the best of our knowledge, any other full node  ...  Erasing nodes continue to operate in tune with the network even when erased transaction outputs become relevant for validating subsequent blocks.  ...  Although, to the best of our knowledge, no court has decided on the liability of full node operators for images stored on the blockchain yet, legal grounds for operating a Bitcoin full node are precarious  ... 
arXiv:1904.08901v1 fatcat:hoebo6kjljb6zjlbov4jd5n6e4

Incorporating expert knowledge in evolutionary search

Michael D. Schmidt, Hod Lipson
2009 Proceedings of the 11th Annual conference on Genetic and evolutionary computation - GECCO '09  
Symbolic regression [5] is a type of genetic program for searching the space of expressions computationally by minimizing various error metrics.  ...  We then simulated collecting expert knowledge for each problem by optimizing an approximated version of the exact solution.  ...  This research is supported by the U.S. National Science Foundation Graduate Research Fellowship Program, and U.S. National Science Foundation Grant CMMI 0547376.  ... 
doi:10.1145/1569901.1570048 dblp:conf/gecco/SchmidtL09a fatcat:iat7eij46najje4ycy43nwmbgi

"Super nodes" in Tor

Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang
2011 Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11  
We first confirm their existence by analyzing the life cycles of node IP addresses and node bandwidth contributions via two correlation approaches, on a set of self-collected data and a set of real data  ...  We then analyze the effect of super nodes on the anonymity of Tor, discuss attacks that exploit such knowledge, and verify our analysis with real data to show potential damages.  ...  In one extreme case, blocking all super nodes (half nodes of the system) makes the failure rate close to 100%.  ... 
doi:10.1145/2076732.2076763 dblp:conf/acsac/LiXDW11 fatcat:4gf3cjthvreshb7wkypqcctnlu

Node Immunization on Large Graphs: Theory and Algorithms

Chen Chen, Hanghang Tong, B. Aditya Prakash, Charalampos E. Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, Duen Horng Chau
2016 IEEE Transactions on Knowledge and Data Engineering  
This problem, referred to as the node immunization problem, is the core building block in many high-impact applications, ranging from public health, cybersecurity to viral marketing.  ...  In this setting, we typically want to determine the relative importance of a node (or a set of nodes) within the graph, for example, how valuable (as a bridge) a person or a group of persons is in a social  ...  [58] present an approach for selecting critical nodes for both simple and complex contagions, with the assumption that a node can contract a contagion from more than one neighbor.  ... 
doi:10.1109/tkde.2015.2465378 fatcat:dh3b3wrjnjaefgonowyz4jseya

Probabilistic partial knowledge handling

Radim Jiroušek
2008 International Journal of Approximate Reasoning  
(for compositional models) distributions as basic building blocks for model construction.  ...  We have chosen these two approaches because they represent the same class of distributions and because they are typical representatives of the approaches using conditional (for Bayesian networks) and unconditional  ...  Perfect sequence models For PSMs, basic partial knowledge serving as a building block for multidimensional models construction is an (unconditional) oligodimensional distribution.  ... 
doi:10.1016/j.ijar.2007.05.014 fatcat:b5754m25b5cbvegvif5ixzgsxe

Automated knowledge discovery in advanced knowledge management

Marko Grobelnik, Dunja Mladenić, John Davies
2005 Journal of Knowledge Management  
Design/methodology/approach Contribute to knowledge management by applying knowledge discovery approaches to enable computer search for the relevant knowledge whereas the humans give just broad directions  ...  The basic idea of knowledge discovery is to let the computer search for the knowledge whereas the humans give just broad directions about where and how to search.  ...  Acknowledgements This work was supported by the Slovenian Research Agency and the IST Programme of the European Community under SEKT Semantically Enabled Knowledge Technologies (IST-1-506826-IP) and PASCAL  ... 
doi:10.1108/13673270510622500 fatcat:l7sdmkplzzf6vgtsrekmp7hb7m

Responsible Knowledge Management in Energy Data Ecosystems

Valentina Janev, Maria-Esther Vidal, Dea Pujić, Dušan Popadić, Enrique Iglesias, Ahmad Sakor, Andrej Čampa
2022 Energies  
This approach aims to extend the analytics services portfolio of various energy stakeholders and achieve two-way flows of electricity and information for optimized generation, distribution, and electricity  ...  It proposes a new data- and knowledge-driven approach for management and processing.  ...  Instantiating an IDS Data Connector The IDS Connector is one of the central technological building blocks of IDS-based digital ecosystems that allow the participant (node) to exchange, share, and process  ... 
doi:10.3390/en15113973 fatcat:wru7yx3ypjat7bybyc3c4alzlu

Automatic clustering of grid nodes

Qiang Xu, J. Subhlok
2005 The 6th IEEE/ACM International Workshop on Grid Computing, 2005.  
This approach leads to an efficient, scalable and portable method of clustering grid nodes and building a distance map among clusters.  ...  This paper presents a method to hierarchically group compute nodes distributed across the internet into logical clusters, and determine the relative location of the clusters.  ...  ACKNOWLEDGMENTS We would like to thank our colleagues at University of Texas, Austin, Carnegie Mellon University, and Rice University, for providing access to computation nodes for experiments.  ... 
doi:10.1109/grid.2005.1542746 dblp:conf/grid/XuS05 fatcat:wx3zsuihhvf53ctwab63nzo47u
« Previous Showing results 1 — 15 out of 151,705 results