Learning entity and relation embeddings for knowledge resolution
Abstract Knowledge resolution is the task of clustering knowledge mentions, eg, entity and
relation mentions into several disjoint groups with each group representing a unique entity or …
relation mentions into several disjoint groups with each group representing a unique entity or …
Building an efficient put-intensive key-value store with skip-tree
Multi-component based Log-Structured Merge-tree (LSM-tree) has been becoming one of
the mainstream indexes. LSM-tree adopts component-by-component KV item flowing down …
the mainstream indexes. LSM-tree adopts component-by-component KV item flowing down …
A neighborhood-attention fine-grained entity typing for knowledge graph completion
Knowledge graph (KG) entity typing focuses on inferring possible entity type instances,
which is a significant subtask of knowledge graph completion (KGC). Existing entity typing …
which is a significant subtask of knowledge graph completion (KGC). Existing entity typing …
dCompaction: Delayed compaction for the LSM-tree
F Pan, Y Yue, J Xiong - International Journal of Parallel Programming, 2017 - Springer
Key-value (KV) stores have become a backbone of large-scale applications in today’s data
centers. Write-optimized data structures like the Log-Structured Merge-tree (LSM-tree) and …
centers. Write-optimized data structures like the Log-Structured Merge-tree (LSM-tree) and …
Improving encoder by auxiliary supervision tasks for table-to-text generation
Table-to-text generation aims at automatically generating natural text to help people
conveniently obtain salient information in tables. Although neural models for table-to-text have …
conveniently obtain salient information in tables. Although neural models for table-to-text have …
Pipelined compaction for the LSM-tree
Write-optimized data structures like Log-Structured Merge-tree (LSM-tree) and its variants
are widely used in key-value storage systems like Big Table and Cassandra. Due to deferral …
are widely used in key-value storage systems like Big Table and Cassandra. Due to deferral …
Tiger: Transferable interest graph embedding for domain-level zero-shot recommendation
Recommender systems play a significant role in online services and have attracted wide
attention from both academia and industry. In this paper, we focus on an important, practical, …
attention from both academia and industry. In this paper, we focus on an important, practical, …
Infinite kernel learning: generalization bounds and algorithms
Kernel learning is a fundamental problem both in recent research and application of kernel
methods. Existing kernel learning methods commonly use some measures of generalization …
methods. Existing kernel learning methods commonly use some measures of generalization …
DAC: A dynamic active and collaborative cache management scheme for solid state disks
H Sun, S Dai, J Huang, Y Yue, X Qin - Journal of Systems Architecture, 2023 - Elsevier
NAND Flash memory-based SSDs have been widely used in modern storage systems to
improve the performance and energy consumption. Existing caching management schemes …
improve the performance and energy consumption. Existing caching management schemes …
PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics
Cobalt Strike is the most prevalent attack tool abused by cyber-criminals to achieve command
and control on victim hosts over HTTPS traffics. It appears in many ransomware attacks …
and control on victim hosts over HTTPS traffics. It appears in many ransomware attacks …