The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper introduces a "lazy" Data Mining technology, which models students' learning characteristics by considering real data instead of deriving ("guessing") their characteristics explicitly. In former work, the authors developed a modeling system for university learning processes, which aims at evaluating and refining university curricula to reach an optimal learning success...
Web services growth makes the composition process a hard task to solve. This numerous interacting elements can be adequately represented by a network. Discovery and composition can benefit from the knowledge of the network structure. In this paper, we investigate the topological properties of two models of syntactic and semantic Web services composition networks: dependency and interaction. Results...
This paper proposes a selective intra-field deinterlacing algorithm scheme by using a detailed edge direction classification method. It is base on a mixture of different well known approaches: i) M-ELA method to predict the edge and interpolate the missing pixels, ii) Sobel mask for obtaining more accurate edge detection, iii) using the ratio of vertical edge and horizontal edge, the approach selects...
Human beings are involved in a broad range of social relationships spanning from real life experiences to online media and social networks. This is leading people to act in a multilayered complex network whose relationships among different layers have still to be analyzed and understood in depth. In this paper, we focus on this problem by comparing and overlapping the online sociality (Facebook network)...
Current Security Information and Events Management (SIEM) solutions lack a data storage facility which is secure enough - i.e. stored events related to security incidents cannot be forged and are always available - that it can be used for forensic purposes. Forensic storage used by current SIEM solutions uses traditional RSA algorithm to sign the security events. In this paper we have analyzed the...
This paper presents unsupervised mask patterns generation for extracting action specific motion features. Cubic Higher-order Local Auto-Correlation (CHLAC) feature is robust to position changes of human actions in a video, and it is effective for action recognition. However, the mask patterns for extracting features are fixed. In other words, the mask patterns are independent of action classes. This...
QoS indicators are commonly used when selecting Web Services (WSs) between different providers. However, typical QoS parameters do not reflect the subjective `performance' perceived by the end-users of the service, commonly called the Quality of Experience (QoE) of the service. In this paper, we describe a novel approach for using the QoE as a criterion for WS selection, including an analysis of the...
This paper describes a novel color hardcopy watermarking embedding. The proposed color embedding provides high transparency by modulating the watermark into the value and saturation color components of the document. After the color document is printed and distributed, the message is decoded by scanning the document and applying the proposed post processing based on a Laplacian of Gaussian whitening...
Biometric based authentication can provide strong security for identifying the users. In addition, the security of biometric data is important, because most biometric data is not changeable in a lifetime. However, cancellable biometrics can stores a non-invertible transformed version of the biometric data. Namely, the biometric data is safely remained even if the storage is compromised. The cryptographic...
We present a methodology to investigate the structure of dynamic networks in terms of concentration of changes in the network. We handle dynamic networks as series of graphs on a fixed set of nodes and consider the changes occurring between two consecutive graphs in the series. We apply our methodology to various dynamic contact networks coming from different contexts and we show that changes in these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.