Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tan Jianlong is active.

Publication


Featured researches published by Tan Jianlong.


Proceedings of the Data Mining and Intelligent Knowledge Management Workshop on | 2012

Theme word subspace method for text document categorization

Zhou Xiaofei; Guo Li; Tan Jianlong; Jiang Wenhan

In this paper, a text document categorization method called Theme Word Subspace (TWS) learning is presented, which utilizes theme words jointly express class-semantic information for document classification. In a class corpus, the theme words with high probability distribution in topic structure are extracted firstly, and then these words as important theme element span class subspaces to jointly represent semantic and distribution of the class. For document categorization processing, a text document is belonged to the nearest subspace whose theme words have the best representation for test document. In our TWS, L1, L2 norm are separately used for measuring the distances of a test document to subspaces. Experiments on a large Chinese text corpus, the proposed TWS learning methods exhibit comparable performances for text document category.


International Conference on Trustworthy Computing and Services | 2012

Research of New Words Identification in Social Network for Monitoring Public Opinion

Wang Xiaoyan; Xu Kai; Sha Ying; Tan Jianlong; Guo Li

With the rapid development of Internet, a large number of new words have emerged and widely been used in social network. Traditional segmentation algorithm can’t identify these new words efficiently, which will greatly affect the accuracy in extracting out these hot words and keywords. Moreover, it will affect the performance of the network public opinion monitoring system. In this paper, we use tweets collected from Twitter as the experimental data-set. By calculating frequency statistics of k-gram strings, we can find out new words as candidates, and then identify new words by their practical application frequency using Twitter’s search function. The experiment shows: this segmentation algorithm can effectively identify the new keywords and is more suitable for public opinion monitoring system.


International Conference on Trustworthy Computing and Services | 2012

Research of Security Relationship Based on Social Networks

Li Yang; Wang Xiaoyan; Sha Ying; Tan Jianlong

This paper introduces the security problems of social networks and the research topics of core nodes, relationship, structures of social network, and so on. This paper discusses the importance of “security relationship” in social networks, analyzes the relevance between security risks and events, and adopts the qualitative and quantitative mechanism based on grade partition, numerical measure, polymorphic data fusion, and the logical relevance. Based on Bayesian network, this paper proposes a kind of assessment model for the situation of security relationship in social networks so as to provide theoretical bases for the perception and prediction of security situation in social networks.


International Conference on Trustworthy Computing and Services | 2012

Finding δ-Closure Property of BitTorrent System and Applications Based on This Property

Wang Kun; Sha Ying; Tan Jianlong; Guo Li; Li Yang

In the Peer-to-peer (P2P) field, a basic problem is to build a model which can exactly represent the behaviors of peers. According to the protocols of BitTorrent (BT) system, participating peers are selected randomly when downloading some content. However, by using the connection model gathered during a one-month period, we found that the BT peers are subject to the δ-closure property, which is that the content in one δ-closure tends to spread inside this δ-closure. In this paper, we defined δ-closureaccording to the complex network theory. Then we tried to design algorithm to attain δ-closure. By gathered dataset, we verified the existing of δ-closure in BT system. Finally, we proposed possible applications based on this property.


international conference on networks | 2010

Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection

Xu Kefu; Guo Li; Tan Jianlong; Liu Ping

Network devices are increasingly using packet content for processing incoming or outgoing packets. Many pattern matching algorithms have been proposed to improve packet matching throughput. Most of them are, however, independent of traffic pattern and may end up with longer match time against actual traffic. We present novel algorithms that utilize traffic characteristics coupled with frequent elements pattern matching to obtain high throughput. The algorithms modified and expanded the current matching procedure and data structure of classical pattern matching algorithms. The presented pattern matching algorithms, using the traffic-aware frequent elements and the dynamic pattern matching algorithms to adaptive to the traffic, have performance advantage with the true dynamic network traffic.


Archive | 2014

LSH (Locality Sensitive Hashing)-based clustering and indexing method and LSH-based clustering and indexing system

Xie Hongtao; Wang Peng; Xu Kefu; Tan Jianlong


Archive | 2014

Data flow processing-oriented elastic expandable resource managing method and system

Zhang Peng; Xiong Cuiwen; Xu Kefu; Du Huaming; Tan Jianlong


Archive | 2014

Microblog hot topic detection method and device aiming at specific group

Tan Zhicong; Zhang Peng; Zhai Lidong; Du Yuejin; Tan Jianlong; Guo Li


Archive | 2013

Tuple tracking method and tuple tracking system for data flow processing

Zhang Peng; Du Huaming; Xu Kefu; Zhang Chuang; Tan Jianlong


Journal of Computer Applications | 2009

Parallel string matching algorithm based on compute unified device architecture

Tan Jianlong

Collaboration


Dive into the Tan Jianlong's collaboration.

Top Co-Authors

Avatar

Guo Li

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xu Kefu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Sha Ying

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wang Xiaoyan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhang Peng

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Li Yang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Liu Ping

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhang Chuang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xu Kai

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge