Sciweavers

GRC
2008
IEEE
13 years 11 months ago
A Computational Model on Harmonizing Chinese Folksong with Piano Accompaniment
Research on auto-harmonizing a melody (e.g. Chinese folksong) with piano accompaniment is trying to build up a computer system which generates a 3voice music including piano left-...
Yin Feng, Chang-Le Zhou
GRC
2008
IEEE
13 years 11 months ago
MovStream: An Efficient Algorithm for Monitoring Clusters Evolving in Data Streams
Monitoring cluster evolution in data streams is a major research topic in data streams mining. Previous clustering methods for evolving data streams focus on global clustering res...
Liang Tang, Chang-jie Tang, Lei Duan, Chuan Li, Ye...
GRC
2008
IEEE
13 years 11 months ago
Granulation Operators on a Knowledge Base
Knowledge in knowledge bases have two categories: complete and incomplete. In this paper, through uniformly expressing these two kinds of knowledge, we first address four operator...
Yuhua Qian, Jiye Liang, Wei Wei
GRC
2008
IEEE
13 years 12 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
GRC
2008
IEEE
13 years 12 months ago
Fuzzy Preference Relation Rough Sets
Preference analysis is a class of important tasks in multi-criteria decision making. The classical rough set theory was generalized to deal with preference analysis by replacing e...
Qinghua Hu, Daren Yu, Congxin Wu
GRC
2008
IEEE
13 years 12 months ago
Adaptive and Iterative Least Squares Support Vector Regression based on Quadratic Renyi Entropy
An adaptive and iterative LSSVR algorithm based on quadratic Renyi entropy is presented in this paper. LS-SVM loses the sparseness of support vector which is one of the important ...
Jingqing Jiang, Chuyi Song, Haiyan Zhao, Chunguo W...
GRC
2008
IEEE
13 years 12 months ago
Towards Real-time Performance of Data Value Hiding for Frequent Data Updates
Hiding data values in privacy-preserving data mining (PPDM) protects information against unauthorized attacks while maintaining analytical data properties. The most popular models...
Jie Wang, Justin Zhan, Jun Zhang
GRC
2008
IEEE
13 years 12 months ago
Convergence of Ant Colony Optimization on First-order Deceptive Systems
Deceptive problems have been considered difficult for ant colony optimization (ACO) and it was believed that ACO will fail to converge to global optima of deceptive problems. Thi...
Yixin Chen, Haiying Sun
GRC
2008
IEEE
13 years 12 months ago
Granular Problem Solving and Software Engineering
Granulation is an important component of Granular Computing (GrC) as a problem solving paradigm. Specification and regulation of granulation are necessary in helping researchers a...
Haibin Zhu