Loading...
Search for: data-distribution
0.006 seconds

    Incremental evolving domain adaptation

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 28, Issue 8 , 2016 , Pages 2128-2141 ; 10414347 (ISSN) Bitarafan, A ; Soleymani Baghshah, M ; Gheisari, M ; Sharif University of Technology
    IEEE Computer Society 
    Abstract
    Almost all of the existing domain adaptation methods assume that all test data belong to a single stationary target distribution. However, in many real world applications, data arrive sequentially and the data distribution is continuously evolving. In this paper, we tackle the problem of adaptation to a continuously evolving target domain that has been recently introduced. We assume that the available data for the source domain are labeled but the examples of the target domain can be unlabeled and arrive sequentially. Moreover, the distribution of the target domain can evolve continuously over time. We propose the Evolving Domain Adaptation (EDA) method that first finds a new feature space... 

    DGSAN: Discrete generative self-adversarial network

    , Article Neurocomputing ; Volume 448 , 2021 , Pages 364-379 ; 09252312 (ISSN) Montahaei, E ; Alihosseini, D ; Soleymani Baghshah, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Although GAN-based methods have received many achievements in the last few years, they have not been entirely successful in generating discrete data. The most crucial challenge of these methods is the difficulty of passing the gradient from the discriminator to the generator when the generator outputs are discrete. Despite the fact that several attempts have been made to alleviate this problem, none of the existing GAN-based methods have improved the performance of text generation compared with the maximum likelihood approach in terms of both the quality and the diversity. In this paper, we proposed a new framework for generating discrete data by an adversarial approach in which there is no... 

    Joint distributed source and network coding for multiple wireless unicast sessions

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Etemadi Tajbakhsh, S ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Few works has been focused on the problem of joint distributed data compression and network coding. In this paper we give some examples showing the advantage of broadcast nature of wireless environment as a basis for joint codes design. Also we show that joint coding is possible in the case of multiple unicasts. The idea of this paper can be exploited in an opportunistic manner. Actually, the foundation of our idea is nothing but combining opportunistic network coding (COPE) and distributed source coding using syndromes (DISCUS) for wireless applications. © 2009 IEEE  

    AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Pisa ; Volume 7731 LNCS , 2013 , Pages 201-216 ; 03029743 (ISSN) ; 9783642358890 (ISBN) Hadavi, M. A ; Damiani, E ; Jalili, R ; Cimato, S ; Ganjei, Z ; Sharif University of Technology
    2013
    Abstract
    Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the "Database As a Service" model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir's secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly... 

    LOADER: A location-aware distributed virtual environment architecture

    , Article 2008 IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems, IEEE VECIMS 2008, Istanbul, 14 July 2008 through 16 July 2008 ; 2008 , Pages 97-101 ; 9781424419289 (ISBN) Hariri, B ; Shirmohammadi, S ; Pakravan, M. R ; Sharif University of Technology
    2008
    Abstract
    This article proposes a new architecture for distributed data management and update massage exchange in massively multiuser virtual environments. The key points in the design of such environments are scalability and QoS-aware message delivery. Therefore it requires robust distributed algorithms in a dynamic peer-to-peer system with frequent node arrivals and departures. Our proposed approach is mainly based on distributed hash tables (DHTs) in order to achieve a decentralized system where any participating node can efficiently retrieve the updates associated with a given object. Therefore, the responsibility of maintaining the mapping from names to values is distributed among the nodes in a... 

    A new algorithm for fault location on transmission lines

    , Article 2009 IEEE Power and Energy Society General Meeting, PES '09, Calgary, AB, 26 July 2009 through 30 July 2009 ; 2009 ; 9781424442416 (ISBN) Shiroei, M ; Daniar, S ; Akhbari, M ; Sharif University of Technology
    IEEE  2009
    Abstract
    In this paper, a new algorithm for fault detection/location on transmission line based on linear state estimation is presented. The proposed technique uses phasor measurements from PMU's. Fault location and voltage of fault point are added as the new state variables in a linear state estimator based on PMU data. In addition, by using the ability of bad data identification in the state estimation, a new scheme for fault location and identification of faulted transmission line is proposed. For test and validation of the proposed algorithm, simulation results on a six bus test case are presented. ©2009 IEEE