The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dynamism and ongoing changes that the electricity markets sector is constantly suffering, enhanced by the huge increase in competitiveness, create the need of using simulation platforms to support operators, regulators, and the involved players in understanding and dealing with this complex environment. This paper presents an enhanced electricity market simulator, based on multi-agent technology,...
Computer-based research on cancer detection utilizes various types of data including MRI images, proteins and DNA. In this work, we investigate Fourier-transform infrared (FT-IR) spectra obtained from colon tissues as an alternative method to detect cancer. Fourier-transform infrared (FT-IR) spectra reflect the chemical composition of a source medium and hence provide utility for a wide range of applications...
In recent years, the increasing electricity generation from fluctuating renewable energy sources has created quite different challenges faced by operators of conventional power plants in the short and long run. In the dynamic and complex environment of electricity markets, model-based analysis can provide valuable support for decision makers. In this paper, a detailed agent-based simulation model...
Due to the high costs of live research, performance simulation has become a widely accepted method of assessment for the quality of proposed solutions in this field. Additionally, being able to simulate the behavior of the future occupants of a residential building can be very useful since it can support both design-time and run-time decisions leading to reduced energy consumption through, e.g., the...
In the present paper we consider keyphrase extraction problem from scientific articles. Finding an appropriate solution is important for the organization of fast navigation in databases, indexing, clustering and classification of academic papers. The base collection includes keyphrases selected by the experts for each text (SemEval2010). It is shown that the use of abstracts instead of full texts...
Vector space models (VSMs) are mathematically well-defined frameworks that have been widely used in text processing. In these models, high-dimensional, often sparse vectors represent text units. In an application, the similarity of vectors -- and hence the text units that they represent -- is computed by a distance formula. The high dimensionality of vectors, however, is a barrier to the performance...
IT users are faced with various threats on a daily basis. Unfortunately, not all possible dangers are known to them, such that the users fall an easy victim to attacks. For this reason, IT specialists demand for higher IT security awareness. Although researchers and practitioners exercise ongoing efforts in this area, their work often lacks a concise definition of the term "security awareness"...
Wireless sensor networks (WSN) are entering the daily life of many. Like wireless LAN before, these are a new playground for developers, but also offer new ways for misuse of this technology. For the improvement of security and to get more valuable data about new attacks, a honeypot for WSNs is in development. This paper presents an effectiveness analysis of a honeypot for WSN and shows detection...
We experimentally compare the strength of different source code obfuscation techniques by measuring the performance of human analysts. We describe an experimental setup by which it is possible to compare different obfuscation techniques with each other. As techniques, we considered name overloading and opaque predicates, as well as the combination of both. While the results are interesting and show...
The European research project digital. me (di.me) developed the di.me userware, a social networking application which informs users' privacy by means of an adaptive trust metric. Information spread over different social networks is semantically aggregated and managed with intelligent user interfaces and semantic cores. Due to the nature of addressed collaborative scenarios, an elaboration and extension...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.