17 results on '"Li, Zhoujun"'
Search Results
2. Research of Automatic Topic Detection Based on Incremental Clustering
- Author
-
Chao Wenhan, Zhang Xiaoming, and Li Zhoujun
- Subjects
Computer science ,business.industry ,Process (engineering) ,Document clustering ,computer.software_genre ,Machine learning ,Identification (information) ,Discriminative model ,Bayesian information criterion ,Feature (computer vision) ,Data mining ,Artificial intelligence ,business ,Cluster analysis ,computer ,Software - Abstract
With the exponential growth of information on the Internet, it has become increasingly difficult to find and organize relevant material. Topic detection and tracking (TDT) is a research area addressing this problem. As one of the basic tasks of TDT, topic detection is the problem of grouping all stories, based on the topics they discuss. This paper proposes a new topic detection method (TPIC) based on an incremental clustering algorithm. The proposed topic detection strives to achieve a high accuracy and the capability of estimating the true number of topics in the document corpus. Term reweighing algorithm is used to accurately and efficiently cluster the given document corpus, and a self-refinement process of discriminative feature identification is proposed to improve the performance of clustering. Furthermore, topics' "aging" nature is used to precluster stories, and Bayesian information criterion (BIC) is used to estimate the true number of topics. Experimental results on linguistic data consortium (LDC) datasets TDT-4 show that the proposed model can improve both efficiency and accuracy
- Published
- 2012
3. Learning to Rank with Bayesian Evidence Framework
- Author
-
Li Zhoujun, Ma Dianfu, Zhang Yan, and Xiong Zenggang
- Subjects
General Computer Science ,Computer science ,business.industry ,General Mathematics ,Bayesian probability ,Pattern recognition ,Machine learning ,computer.software_genre ,Bayesian inference ,Ranking (information retrieval) ,Support vector machine ,Bayesian statistics ,Ranking SVM ,Learning to rank ,Artificial intelligence ,Likelihood function ,business ,computer - Abstract
The problem of ranking has recently gained attention in data learning. The goal ranking is to learn a real-valued ranking function that induces a ranking or ordering over an instance space. In this paper, we apply popular Bayesian techniques on ranking support vector machine. We propose a novel differentiable loss function called trigonometric loss function with the desirable characteristic of natural normalization in the likelihood function, and then follow standard Gaussian processes techniques to set up a Bayesian framework. In this framework, Bayesian inference is used to implement model adaptation, while keeping the merits of ranking SVM. Experimental results on data sets indicate the usefulness of this approach.
- Published
- 2011
4. PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation
- Author
-
Zhang Jun-Xian, Li Zhoujun, and Zheng Xian-Chen
- Subjects
Primitive data type ,Variable (computer science) ,Program analysis ,Computer science ,Programming language ,Dynamic program analysis ,Concolic testing ,State (computer science) ,Parallel computing ,Instrumentation (computer programming) ,Symbolic execution ,computer.software_genre ,computer - Abstract
Dynamic symbolic execution or concolic execution is a powerful method for program analysis and software testing by attaching symbolic execution to the concrete running of a program. This paper proposes an approach to handle aggregate types e.g., pointers, arrays, structures and their complex combinations for the dynamic symbolic execution of C programs. The main idea of the approach is splitting a complex type program variable into a series of primitive type variables. During the concrete execution of a program, a concolic execution engine is provided to observe the operations on every program variable at the level of primitive types, and then the symbolic state of the program is updated. The path constraints which must be satisfied to drive the program running along the current execution path are collected to generate new test data for other paths. Our approach guarantees that only primitive type variables can appear in the symbolic states and path constraints. Based on LLVM byte code instrumentation, we present a new tool, called PathWalker, which implements this approach. Experimental results reveal that PathWalker is effective to deal with complex types in C codes.
- Published
- 2015
5. Computationally sound analysis of Diffie-Hellman-based protocols and encryption cycles
- Author
-
Li Zhoujun and Zhang Fan
- Subjects
Diffie–Hellman key exchange ,Theoretical computer science ,Computer science ,Probabilistic encryption ,business.industry ,Sound analysis ,Formal methods ,Encryption ,business - Published
- 2012
6. Notice of Retraction Triphasic solving approach for scheduling problem
- Author
-
Li Zhoujun, A. Ahmed, and A. H. S. Bukhari
- Subjects
Rate-monotonic scheduling ,Mathematical optimization ,education.field_of_study ,Theoretical computer science ,Job shop scheduling ,Computer science ,business.industry ,Population ,Flow shop scheduling ,Dynamic priority scheduling ,Fair-share scheduling ,Scheduling (computing) ,Genetic algorithm scheduling ,Nurse scheduling problem ,Two-level scheduling ,Lottery scheduling ,Genetic algorithm ,Local search (optimization) ,education ,business - Abstract
Courses scheduling is indeed momentously obligatory event placement job in the presence of mutually interlinked conditions. The problem has been broadly noticed by the research community due to its complexity. In the research paper, a novel triphasic approach is applied. First phase is consisted of creating and initialize the population, however the phase is wholly concentrated over eliminating all the hard constraints from genome. Second phase is intended to move down the number of violations and spread up the events over layout. First two phases are employed by two distinguished Local Search algorithms. On the other hand, third phase which is comprised over Genetic Algorithm, eventually tries to converge the solution to best available fitness point of the search space. The research method is testified on genuine real world data set. Promising results validate the adopted methodology. The main advantages are observed, elimination of hard constraints on very first stage. Second, noticeably drop of computational time for GA by using preprocessed genome of partial solutions. Additionally, efficient deployments and convenience to end-users are prime objectives.
- Published
- 2011
7. Solving Course Timetabling Problem Using Interrelated Approach
- Author
-
Li Zhoujun and Aftab Ahmed
- Subjects
Operations research ,business.industry ,Computer science ,Initialization ,Machine learning ,computer.software_genre ,Scheduling (computing) ,Software deployment ,Genetic algorithm ,Local search (optimization) ,Artificial intelligence ,business ,Timetabling problem ,Curriculum ,computer - Abstract
University timetabling is very hectic resources allocation job against tough constraints. The problem is broadly recognized on account of its crucial significance for curriculum activities. Its intensive complexity has challenged the researchers from diverse disciplines for several decades. In the research paper, a novel interrelated approach is employed that primarily depends on Genetic Algorithm supported by Local Search algorithm. Local Search systematizes the events in each timetabling chromosome up to certain degree. Later on GA is likely to obtain more feasible solution available on the search space. The approach has been applied on real dataset and the research direction is validated by promising outcome. The bottom line is minimizing computational time for GA by initializing the set of partial solutions. In addition, exploitation of the resources usage and effective events deployment are key objectives.
- Published
- 2010
8. Notice of Retraction: A biphasic approach for university timetabling problem
- Author
-
Li Zhoujun and A. Ahmed
- Subjects
Mathematical optimization ,Notice ,Software deployment ,Iterative method ,Computer science ,Combinatorial mathematics ,Timetabling problem ,Logic programming ,Scheduling (computing) - Abstract
University Timetabling is a challenging problem has caught the eye of researchers for numerous decades due to its unavoidable significance along with NP-hard complexity. The research paper presents the approach consisted of two distinguishable phases. First one completely neutralizes the search space from hard constraints and consequently ends with a preliminary solution which feeds the successive processing step. Subsequently the second phase deals with the soft constraints initially scan throughout the layout to detect and mark the time slots with their associated penalties afterward the mechanism iteratively pushes the penalized events to the locations raised with minimum penalty cost. Key advantages of using this technique are to build an efficient deployment and maximum utilization of the resources.
- Published
- 2010
9. A novel rough set approach for classification
- Author
-
Li Zhoujun and Zhang Li-Juan
- Subjects
business.industry ,Computer science ,Dominance-based rough set approach ,Machine learning ,computer.software_genre ,Field (computer science) ,Electronic mail ,Set (abstract data type) ,Reduction (complexity) ,Information engineering ,Artificial intelligence ,Rough set ,Data mining ,Set theory ,business ,computer - Abstract
Rough set theory has been widely and successfully used in data mining, especially in classification field. But most existing rough set based classification approaches require computing optimal attribute reduction, which is usually intractable and many problems related to it have been shown to be NP-hard. Although approximate algorithms exist, they also tend to be computationally expensive. This paper presents a novel rough set method for classification, which does not require computing attribute reduction. It stepwise investigates condition attributes and outputs the classification rules induced by them, which is just like the strategy of "on the fly". The theoretical analysis and the empirical study show that the proposed method is effective and efficient. Index Terms—rough set, attribute reduction, data mining, classification
- Published
- 2006
10. A Survey of Classification of Data Streams
- Author
-
Yan Yuejin, Li Zhoujun, Chen Huowang, and Wang Tao
- Subjects
Stationary distribution ,Concept drift ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Data stream mining ,Data mining ,computer.software_genre ,computer ,Software - Published
- 2007
11. Automatically Constructing Counter-Examples of Security Protocols Based on the Extended Horn Logic Model
- Author
-
Chen Huowang, Li Zhoujun, Li Mengjun, and Zhou Ti
- Subjects
Horn clause ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Cryptographic protocol ,Computer security model ,Computer security ,computer.software_genre ,computer ,Formal verification ,Software ,Counterexample - Published
- 2007
12. Efficiently Mining of Maximal Frequent Item Sets Based on FP-Tree
- Author
-
Li Zhoujun, Chen Huowang, and Yan Yuejin
- Subjects
Tree (data structure) ,Projection (relational algebra) ,Apriori algorithm ,Computer science ,Process (computing) ,Subset and superset ,Data mining ,computer.software_genre ,computer ,Software - Abstract
During the process of mining maximal frequent item sets, when minimum support is little, superset checking is a kind of time-consuming and frequent operation in the mining algorithm. In this paper, a new algorithm FPMFI (frequent pattern tree for maximal frequent item sets) for mining maximal frequent item sets is proposed. It adopts a new superset checking method based on projection of the maximal frequent item sets, which efficiently reduces the cost of superset checking. In addition, FPMFI also compresses the conditional FP-Tree (frequent pattern tree) greatly by deleting the redundant information, which can reduce the cost of accessing the tree. It is proved by theoretical analysis that FPMFI has superiority and it is revealed by experimental comparison that the performance of FPMFI is superior to that of the similar algorithm based on FP-Tree more than one time.
- Published
- 2005
13. A Depth-First Search Algorithm for Mining Maximal Frequent Itemsets
- Author
-
Li Zhoujun, Yan Yuejin, and Chen Huowang
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Breadth-first search ,Bitmap ,Data mining ,computer.file_format ,Depth-first search ,computer.software_genre ,computer ,Software - Published
- 2005
14. A New Component-Oriented Programming Language with the First-Class Connector.
- Author
-
Lightfoot, David E., Szyperski, Clemens A., Chen, Bo, Li, ZhouJun, and Chen, HuoWang
- Abstract
The idea of a connector, which explicitly describes the interactions among components, is one of the important contributions of the research on software architecture. The importance of the connector as a first-class entity in software architecture has been increasingly recognized. In this paper we argue that such an important abstraction also deserves first-class support from programming languages. We present a new component-oriented programming language, SAJ (Software Architecture based Java), which integrates some architectural concepts such as the component, the port and particularly the connector into Java. The connector is treated as a first-class entity in SAJ as is the component so that software architecture can be made more explicit at implementation level and the simultaneous reuse of the component and the connector can be realized. The component model and the connector model underlying SAJ are also discussed in detail. We formalize our language giving both the type system and operational semantics and prove the type soundness property. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
15. Checking strong/Weak bisimulation equivalences and observation congruence for the π-calculus.
- Author
-
Goos, Gerhard, Hartmanis, Juris, Leeuwen, Jan, Larsen, Kim G., Skyum, Sven, Winskel, Glynn, Li, Zhoujun, and Chen, Huowang
- Abstract
With efficiency motivations the notion of symbolic transition graph for the π-calculus is proposed along the lines of [4,7]. The single/double ground/symbolic arrows are given to such graphs. Based on them the strong/weak ground/symbolic bisimulation equivalences and observation congruences are defined and are shown to agree with each other. The notions of symbolic observation graph and symbolic congruence graph are also introduced. Finally algorithms for checking strong/weak bisimulation equivalences and observation congruence are presented together with their correctness proofs. These results lift and refine the techniques and algorithms for bisimulation checking of regular pure-CCS and value-passing process to the finite control π-calculus. [ABSTRACT FROM AUTHOR]
- Published
- 1998
- Full Text
- View/download PDF
16. Modeling and Verifying Time Sensitive Security Protocols with Constraints.
- Author
-
Zhou, Ti, Li, Mengjun, Li, Zhoujun, and Chen, Huowang
- Subjects
COMPUTER network protocols ,COMPUTER network security ,CALCULUS ,MATHEMATICAL logic ,COMPUTER science - Abstract
Abstract: This paper researches the characteristic of time sensitive protocols and presents a method with simple operations to verify protocols with time stamps and avoid false attacks. Firstly, an extension of π calculus is given to model a time sensitive security protocol. And then, by appending linear arithmetic constraints to the Horn logic model, the extended Horn logic model of security protocols and the modified-version verification method with time constraints are represented. All operations and the strategy of verification are defined for our constraints system. Thirdly, a method is given to determine whether the constraints has a solution or not. Finally, as a result of an experiment, Denning-Sacco protocol with time stamps is verified. The experiment shows that our approach is an innovative and effective method on verifying time sensitive security protocols. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
17. A Novel Derivation Framework For Definite Logic Program.
- Author
-
Li, MengJun, Li, ZhouJun, Chen, HuoWang, and Zhou, Ti
- Subjects
MATHEMATICAL logic ,COMPUTER software termination ,COMPUTER science ,ELECTRONIC data processing ,MATHEMATICS - Abstract
Abstract: Is a closed atom derivable from a definite logic progam? This derivation problem is undecidable. Focused on this problem there exist two categories approaches: the accurate approach that does not guarantee termination, and the terminated abstract approaches. Both approaches have its advantages and disadvantages. We present a novel derivation framework for the definite logic program. A dynamic approach to characterizing termination of fixpoint is presented, then which is used to approximately predict termination of fixpoint in advance. If the fixpoint is predicted termination, we use the non-terminational approach to the derivation problem, otherwise,the terminated abstract approach is used. With this termination predicting approach, we combine the non-termination accurate approaches and the termination abstract approaches together for solving the derivation problem more efficiently. And the experiment results demonstrates the effectiveness of our approach. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.