The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Representation of cooperating systems in recent products and collecting organized engineering knowledge in organizational intellectual property are currently actual issues on the long way of engineering model integration. Engineering model with those representations inherently includes components from various discipline areas in a single structure and recently uses requirements, functional, logical,...
We report on the second design cycle of Acropolis, a social computing platform that allows citizens to build and share their own narratives about long-running news stories. A key goal of this research project is to explore the following design opportunity: how can we re-design news stories in order to engage citizens in their reading and curation? In this paper, we describe an asymmetric collaboration...
In this paper we present a decision process to auto-adapt and improve human-machine interaction, simplifying the integration of algorithms and functionalities. The decision process is part of an innovative approach that integrates contextual information to orchestrate behaviours of an interactive system (i.e. perception and actuation features involved during interaction). Classical approaches focus...
In this paper, we are proposing a new formal framework for reasoning on authentication in security protocols based on analytic functions. We give sufficient conditions that, if satisfied, the protocol is declared correct with respect to authentication. We validate our approach on the Yahalom-Lowe protocol. First, we show that it satisfies these few conditions, thus, we conclude that it is correct...
Theory exploration has been investigated as the lemma generation methods which play important role in automation of theorem provers. In order to enlarge the scope of provable theorems in the exploration, in this paper we propose an approach of applying the rewriting induction technique in exploration of inductive theorems. Especially, we propose some heuristics for proof search in the rewriting induction...
Information overload is one of the most important problems in context of personalized document retrieval systems. In this paper we propose to use ontology-based user profile. Ontological structures are appropriate to represent relations between concepts in user profile. We present a method for determining user profile based on his current activities. Results obtained in experimental evaluation are...
DBpia is the largest digital-bibliography service provider in Korea. It provides several convenience functions for researchers. DBpia users (i.e., researchers) can search for papers via several search routes such as publications, publishers, authors, and keywords. Although the researchers can exploit the search functions, they may still have a number of search results as candidate papers to read....
This paper presents an approach, based on the multi-criteria method SMARTER, that can be useful to support decisions involving the selection of the best-fit agile software development methodology for small and medium enterprises. The kickoff of this study was a research regarding measurable criteria that should be considered in this type of decision aiming to answer the needs of specific projects...
We present a top-k algorithm for retrieving tuples according to the order provided by a ranking function that belongs to a subclass of non-monotonic functions. The ranking functions are defined with the values where the maximum score is achieved. We test the proposed algorithm on various real and artificial data with varying variable ranges and different nonmonotonic ranking functions.
Multi Criteria Decision Making methods have been developed to solve complex real-world decision problems. The Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is currently one of the most popular methods and has been shown to provide helpful outputs in various application areas. In recent years, a variety of extensions, including fuzzy extensions of TOPSIS have been proposed...
A social network comprises a collective of individuals who exert influence on each other via explicit communication/ control linkages. Applying social choice theory to networks requires the influence linkages to be explicitly embedded into the social choice model. Embedding is accomplished by replacing classical categorical preferences with conditional preferences that enable individuals to express...
In this paper, we propose an unsupervised machine learning method to automatically construct a product hierarchical concept model based on the online reviews of this product. Our method starts by representing each candidate noun using a feature context vector, which is simply a vector of all its co-occurring neighbors excluding itself. We then applied bisection clustering to hierarchically cluster...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.