supported by the National Social Science Fund of China(Grant No.22BTQ033).
Context-Sensitive Task(CST)is a complex task type in crowdsourc-ing,such as handwriting recognition,route plan,and audio transcription.The current result inference algorithms can perform well in simple crowd-sourcing ...
This work is supported by the CETC Joint Advanced Research Foundation(No.6141B08020101);Major Special Science and Technology Project of Hainan Province(No.ZDKJ2019008).
Mobile Edge Computing(MEC)has become the most possible network architecture to realize the vision of interconnection of all things.By offloading compute-intensive or latency-sensitive applications to nearby small cell...
This paper deals with a case study of a context-sensitive solution of the Jamestown Corridor, located along James City County and the City of Williamsburg in Virginia. The corridor is an important passageway to many t...
Points-to analysis is a static code analysis tech- nique that establishes the relationships between variables of references and allocated objects. A number of points-to analysis algorithms have been proposed for proce...
As service oriented architecture (SOA) matures, service consumption demand leads to an urgent requirement for service discovery. Unlike Web documents, services are intended to be executed to achieve objectives and/o...
The article studies the interrelation of Languages of Colored Petri Nets and Traditional formal languages. The author constructed the graph of Colored Petri Net, which generates L* Context-free language. This language...
supported by the Research Grants Council of the Hong Kong SAR,China,under Grant Nos. 419008 and 419109
Ranking is a main research issue in IR-styled keyword search over a set of documents. In this paper, we study a new keyword search problem, called context-sensitive document ranking, which is to rank documents with an...
For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called co...