The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the intelligent transportation system, the geometry for the street is an important factor in vehicle monitoring. It helps to point out areas of interest, reduce computing costs, increased accuracy in detecting and identifying objects and facilitate data collection. In this paper, a new robust method of extracting the geometric model of the road is presented. The method is based on vehicle motion...
Text compression based on graph representation model (referred to as “text graph”) is a fairly common approach. However, one of the difficult issues that this approach poses is how to identify nodes that have co-reference relationships in a text graph? This issue is a question that needs to be answered because previous studies have confirmed that it has a great influence on the quality of the summaries...
In order to see if process assessment drives processes learning, process assessments were performed in the capstone project of a Bachelor in Computer Science. Assessments use an ability model based on a small subset of ISO/IEC 15504 processes, its main Base Practices and Work Products. Students' point of view was also collected through an anonymous questionnaire. Self-assessment using a competency...
We present a model-based testing approach for reactive systems where both test inputs and expected results are generated from ‘restricted’ Event-B specifications. We show that it is possible to automatically build the restricted Event-B specifications from the original ones base on a knowledge base of the system under tests. The restricted models are to reduce the state space of the original Event-B...
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
Expert finding would be useful for a recommendation system which people want to find experts in a specific area. This paper proposes a model to identify focus research areas of computer science researchers thru their publications. We collect title, abstract and keywords of academic papers published in IEEE Xplore digital library of selected researchers from computer science departments of four universities...
We present a deterministic distributed algorithm that computes a (2δ-1)-edge-coloring, or even list-edge-coloring, in any n-node graph with maximum degree δ, in O(log^8 δ ⋅ log n) rounds. This answers one of the long-standing open questions of distributed graph algorithms} from the late 1980s, which asked for a polylogarithmic-time algorithm. See, e.g.,...
We examine the power of statistical zero knowledge proofs (captured by the complexity class SZK) and their variants. First, we give the strongest known relativized evidence that SZK contains hard problems, by exhibiting an oracle relative to which SZK (indeed, even NISZK) is not contained in the class UPP, containing those problems solvable by randomized algorithms with unbounded error. This answers...
We prove a general time-space lower bound that applies for a large class of learning problems and shows that for every problem in that class, any learning algorithm requires either a memory of quadratic size or an exponential number of samples. As a special case, this gives a new proof for the time-space lower bound for parity learning [R16]. Our result is stated in terms of the norm of the matrix...
Interactive coding, pioneered by Schulman (FOCS 92, STOC 93), is concerned with making communication protocols resilient to adversarial noise. The canonical model allows the adversary to alter a small constant fraction of symbols, chosen at the adversarys discretion, as they pass through the communication channel. Braverman, Gelles, Mao, and Ostrovsky (2015) proposed a far-reaching generalization...
To help users gain awareness of tools and features available in applications, recommender systems can automatically suggest useful tools. Such systems aim to present recommendations just like users would recommend tools to one another, but little is known about the nature of these user-to-user recommendations. This paper explores user-to-user recommendations through a study of 13 pairs of software...
Because of the present deep impact of information technology on society, school subjects that deal with topics of computer science or digital literacy gain importance nowadays. Some countries start to teach related topics in primary education and even in kindergarten. The underlying curricula, educational standards and/or competency models have already been developed and established and differ in...
Technical solution skills — though important — are not enough for effective, multicultural teamwork. Despite broad consensus on the vital function of communication- and social skills, they tend to be underrepresented in the training of software-engineers and project managers. This is partly because such skills are less explicit than technical methods, tools, and artefacts. To address this deficiency,...
To bridge the gap between humans and machines in image understanding and describing, we need further insight into how people describe a perceived scene. In this paper, we study the agreement between bottom-up saliency-based visual attention and object referrals in scene description constructs. We investigate the properties of human-written descriptions and machine-generated ones. We then propose a...
By means of the association of Psychology, Pedagogy and Computer Science concepts, it has been possible to develop several models, methods and tools to provide personalized education and adaptive support to different student's profiles. This knowledge area is associated with Adaptive Learning. In this context, this paper aims to present the state of the art regarding the definition of the student's...
For university students, a syllabus gives fundamental information about a course, and is important for choosing a course. However, it is not an easy task for students to grasp the topics actually covered by a course syllabus because they have only little knowledge about topic words in the syllabus before they learn the course. We have been studying on a machine learning method of systematically analyzing...
Knowledge is seen as one of the main resources for organizations providing knowledge-intensive services. Therefore, sharing and reusing are the main goals of the modern knowledge management (KM) approach, driven by information and communication technologies (ICT). However, one must ask for the details in order to provide the means and tools to design and deploy an environment able to fulfil these...
This study introduces an electronic market model for secondary book markets in which each market participant can put up books for sale, and simultaneously place requests for book purchase. The model allows participants to declare a budget limit so that for each participant, the difference between the cost of purchased books and the revenue obtained from sold books stays within the declared budget...
Dragonfly network is widely used in modern high-performance computing systems. On this network, however, interference caused by network sharing can lead to significant network congestion and degraded performance. In this work, we present a comparative analysis of intra-application interference on applications with nearest neighbor communication, considering various placement strategies. Our results...
This paper gives a brief introduction to the use of Model-Based Design and the CONSENS modeling method in Embedded Hardware Design and illustrates the benefits.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.