scispace - formally typeset
Search or ask a question

Showing papers in "Tsinghua Science & Technology in 2014"


Journal ArticleDOI
TL;DR: This paper presents a comprehensive survey of the recent advances in activity recognition with smartphones' sensors, starting with the basic concepts such as sensors, activity types, etc and reviewing the core data mining techniques behind the main stream activity recognition algorithms.

335 citations


Journal ArticleDOI
TL;DR: The preprocessing operations and the state of the art methods of MRI-based brain tumor segmentation are introduced, the evaluation and validation of the results are discussed, and an objective assessment is presented.

279 citations


Journal ArticleDOI
TL;DR: In this paper, an attack tree based threat model is presented to illustrate the energy-theft behaviors in AMI and summarize the current AMI energytheft detection schemes into three categories, i.e., classification-based, state estimation-based and game theory-based ones.

257 citations


Journal ArticleDOI
TL;DR: This work is dedicated to Jianer Chen, one of the strongest problem solvers in the history of parameterized algorithmics, on the occasion of his 60th birthday.

60 citations


Journal ArticleDOI
TL;DR: Dache is proposed, a data-aware cache framework for big-data applications that is implemented by extending Hadoop and demonstrates that Dache significantly improves the completion time of MapReduce jobs.

54 citations


Journal ArticleDOI
TL;DR: A security level based protection policy is proposed for simplifying the security rule management for vCNSMS, a collaborative network security prototype system used in a multi-tenant data center.

54 citations


Journal ArticleDOI
TL;DR: This paper discusses the problems of mining sensor data in CPS and introduces IntruMine, a framework to discover intruders from untrustworthy sensor data that analyzes the trustworthiness of sensor data, detects the intruders' locations, and verifies the detections based on a graph model of the relationships between sensors and intruders.

36 citations


Journal ArticleDOI
TL;DR: Experimental results show that the DR-Cloud model can cooperate with cloud service providers with various parameters effectively, while its data scheduling strategies can achieve their optimization objectives efficiently and are widely applicable.

35 citations


Journal ArticleDOI
TL;DR: In this article, the authors classified the parameterized and kernelization complexity of the feedback vertex set problem on undirected graphs, and showed that the problem admits a polynomial kernel when parameterized by the vertex-deletion distance to a pseudo forest.

33 citations


Journal ArticleDOI
Wen-Liang Huang1, Zhen Chen2, Wenyu Dong2, Hang Li, Bin Cao2, Junwei Cao2 
TL;DR: This paper introduces China Unicom's big data platform, which is building an industry ecosystem based on Mobile Internet Big Data, and considers that a telecom operator centric ecosystem can be formed that is critical to reach prosperity in the modern communications business.

33 citations


Journal ArticleDOI
TL;DR: In this paper, the authors used the Elaboration Likelihood Model (ELM) and social presence theory to examine the microblogging reposting mechanism and found that users are able to perceive social presence when interacting with micro blogging messages.

Journal ArticleDOI
TL;DR: In this article, the authors present an integrated simulation environment to provide a unified platform for the investigation of smart grid applications involving power grid monitoring, communication, and control, which allows the network simulator to operate independently, importing its results to the power system simulation.

Journal ArticleDOI
TL;DR: The experimental results show that employing the proposed personalized recommendation algorithm based on the preference-feature would significantly improve the accuracy of evaluation predictions compared to two previous approaches.

Journal ArticleDOI
TL;DR: In this article, a tiny pressure sensor based on the piezoresistive effect was used to measure the intracranial pressure (ICP) and the test results yield sensitivities of 1.033×10-2 mV/kPaforthe childhood type detection and 1.257×10−2 mv/kPa for the adult detection with sensor chip sizes of 0.40×0.40 mm2 and 0.50×0.50 mm2, respectively.

Journal ArticleDOI
TL;DR: In this paper, a dynamic version of the DOMINATING SET problem is introduced and proved to be fixed-parameter tractable (FPT) in settings where problem instances evolve, and the main purpose of this paper is to exposit two very different but very general, motivational schemes in the art of parameterization.

Journal ArticleDOI
TL;DR: A comprehensive review of recent advances in methods for eQTL analysis in population-based studies, which presents traditional pairwise association methods and newly developed statistical learning methods including Lasso-based models.

Journal ArticleDOI
TL;DR: For each type of problem, typical examples together with recent results are outlined, the main techniques are analyzed, and some suggestions for future research in this field are provided.

Journal ArticleDOI
TL;DR: A new targeted fully homomorphic encryption scheme based on the discrete logarithm problem is presented and inspired by ElGamal and BGN cryptography is obtained by selecting a new group and adding an extra component to the ciphertext.

Journal ArticleDOI
TL;DR: A critical review and comparison of eight popular methods used for detecting gene-gene interactions among genetic loci, i.e., BOOST, TEAM, epiForest, EDCF, SNPHarvester, EpiMODE, MECPM, and MIC, which are used for investigating multi-SNPs interactions in genome-wide association studies.

Journal ArticleDOI
TL;DR: This paper proposes a novel power capping module in the Hadoop scheduler to mitigate power peaks and shows that the proposed solution can effectively smooth the power consumption curve and mitigate temporary power peaks for Hadoops clusters.

Journal ArticleDOI
TL;DR: A class of Generalized Low-Density Parity-Check (GLDPC) codes is designed for data transmission over a Partial-Band Jamming (PBJ) environment and employs A Posteriori Probability (APP) fast BCH transform for decoding the BCH check nodes at each decoding iteration.

Journal ArticleDOI
TL;DR: A common feature of p-Kemeny AGGregation and p-One-Sided Crossing Minimization is analyzed to provide new insights and findings of interest to both the graph drawing community and the social choice community.

Journal ArticleDOI
TL;DR: Experimental results show that the graph mining algorithm components in BPGM are efficient and have better performance than big cloud-based parallel data miner and BC-BSP.

Journal ArticleDOI
TL;DR: A series of observations in two real mobile social networks are presented and a method based on a dynamic factor-graph model for modeling and predicting users' activities is proposed, showing that the proposed ACTPred model can achieve better performance than baseline methods.

Journal ArticleDOI
TL;DR: This paper introduces a general framework to accelerate the learning-based view-based 3-D object matching in large scale data and demonstrates the effectiveness of the proposed framework.

Journal ArticleDOI
Xuejun Zhang1, Xiaolin Gui1, Feng Tian1, Si Yu1, Jian An1 
TL;DR: A privacy quantification model is proposed, which is based on Bayes conditional privacy, to specify a general adversarial model for most existing privacy metrics, and it is shown that this model permits interpretation and comparison of various popular LBS privacy metrics under a common perspective.

Journal ArticleDOI
TL;DR: A worst-input mutation approach for testing Web service vulnerability based on SOAP messages, which uses the farthest neighbor concept to guide generation of the test suite and results indicate that the proposed approach is both practical and effective.

Journal ArticleDOI
Tiwei Wei1, Jian Cai1, Qian Wang1, Yang Hu1, Lu Wang1, Ziyu Liu1, Zijian Wu1 
TL;DR: In this article, the effects of several sputter parameters (DC power, Ar pressure, deposition time, and substrate temperature) on thin-film coverage for TSV applications are investigated.

Journal ArticleDOI
TL;DR: An electricity services based dependability analysis model of PGCN is proposed, which includes methods of analyzing its dependability and procedures of designing the dependable strategies and the deterministic analysis method based on matrix analysis and stochastic analysis model based on stochastically Petri nets are discussed.

Journal ArticleDOI
TL;DR: A new algorithm to establish the data association between a camera and a 2-D LIght Detection And Ranging sensor (LIDAR) is proposed and the line-point correspondence is employed to construct geometric constraint on the homography matrix, enabling checkerboard to be not essential and any object with straight boundary can be an effective target.