期刊文献+

内容中心网络中基于关键词的数据检索方案

Data Retrieval Scheme Based on Keywords in Content-centric Networks
下载PDF
导出
摘要 内容中心网络提高了用户访问被发布信息的灵活性,然而现有的数据检索方案大多不支持关键词检索,影响了检索效率,导致了较高的检索开销。为此,提出了基于独立搜索和融合(ISM)和基于集成关键词搜索(IKS)的两种数据检索方案。它们支持发布方将内容标识符嵌入到用于描述内容的独立关键词中,用户们可根据关键词来提交他们的搜索/兴趣。中间内容路由器可检索与关键词相匹配的内容标识符。然后,用户设备上的客户端程序将检索出来的所有内容标识符汇集起来,获得他们想到的内容标识符最终列表。此后,用户便可检索这些与他们的搜索/兴趣相匹配的数据内容。最后的仿真实验也验证了本文方案的有效性。 Content-centric networks have been proposed to improve the flexibility of published information for users.However,most of the existing data retrieval schemes cannot support the keyword retrieval,which has the effect on the retrieval efficiency,resulting in the higher retrieval overhead.To solve this problem,two data retrieval schemes based on the independent search and merge(ISM) scheme and the Integrated Keyword Search(IKS) are proposed,which allow publishers to insert content identifiers together with independent keywords that are used to describe the content.Users can submit their searches/ interests based on keywords.Intermediate content routers retrieve content identifiers that match different keywords.The client programs in users' devices then do an intersection of all retrieved content identifiers to obtain a final list of content identifiers that match their interests.After that,users can retrieve these matched data contents.Finally,the effectiveness of the scheme is verified by the simulation experiments.
机构地区 重庆市气象局
出处 《微型电脑应用》 2015年第9期75-78,6,共4页 Microcomputer Applications
关键词 内容中心网络 数据检索 关键词 内容标识符 兴趣 匹配 Content-centric Networks Data Retrieval
  • 相关文献

参考文献12

二级参考文献67

  • 1Ricci F. Mobile recommender systems[J]. Journal of Information Technology and Tourism, 2011, 12(3): 205-231.
  • 2Huang D J and Arasan'y. On measuring email-based social network trust[C]. Proceedings of the Global Telecommunications Conference (GLOBECOM), Miami, FL, 2010: 1-5.
  • 3Huang Zan, Li Xin, and Chen Hsin-chun. Link prediction approach to collaborative filtering [C]. Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries, Denver, CO, USA, 2005: 141-142.
  • 4Guha R, Kumar R, Raghavan P, et al .. Propagation of trust and distrust[C]. Proceedings International World Wide Web Conference, New York, USA, 2004: 403-412.
  • 5Avesani P, Massa P, and Tiella R. A trust-enhanced recommender system application: Moleskiing[C]. Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, NM, USA, 2005: 1589-1593.
  • 6Wang Li-cai, Meng Xiang-wu, and Zhang Yu-jie. A heuristic approach to social network-based and context-aware mobile services recommendation[J]. Journal of Convergence Information Technology, 2011, 6(10): 339-346.
  • 7Adomavicius G and Tuzhilin A. Towards the next generation of recommender systems: a survey of the state-of-the-art and possible extensions[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(6): 734-749.
  • 8Eagle N, Pentland A, and Lazer D. Inferring friendship network structure by using mobile phone data[J]. Proceedings of the National Academy of Sciences, 2009, 106(36): 15274.
  • 9Fernando D, Chavarriaga J, Pedro G, et al.. Movie recommendations based in explicit and implicit features extracted from the Filmtipset dataset[C]. Proceedings of the Workshop on Context-Aware Movie Recommendation, Barcelona, Spain, 2010: 45-52.
  • 10Benchettara N, Kanawati R, and Rouveirol C. Supervised machine learning applied to link prediction in bipartite social networks[C]. International Conference on Advances in Social Networks Analysis and Mining, Odense, 2010: 326-330.

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部