The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research clues can be expressed as coherent chains of keywords grouped by theme. Capturing clues to research from the vast and expanding medical literature is valuable. Yet, it is difficult to automatically create clear visualizations of research clues despite the presence of many competing summarization tools. In this paper, we propose a linear classifier based on a spiral, which we call a regional...
In this paper, two methods to improve the secrecy of cooperative transmissions using unshared jamming are investigated in which only the source and destination nodes know the jamming signals. The jamming signals are based on unique cipher keys obtained on the high layers. In the first proposed method (SJ protocol), a source combines its secrecy signal with its jamming signal using the power allocation...
Biological molecules (e.g. DNAs, RNs, proteins, etc.) do not function in isolation themselves but in a sophisticated manner of various interactions between them to carry out every biological processes in living cells. Data about these interactions are exponentially increased thanks to advanced technologies. Analyzing biological interaction networks is essential to get insights into how biological...
Networks naturally capture a host of real-world interactions, from social interactions and email communication to brain activity. However, graphs are not always directly observed, especially in scientific domains, such as neuroscience, where monitored brain activity is often captured as time series. How can we efficiently infer networks from time series data (e.g., model the functional organization...
Given a stream of heterogeneous edges, comprising different types of nodes and edges, which arrive in an interleaved fashion to multiple different graphs evolving simultaneously, how can we spot the anomalous graphs in real-time using only constant memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. In this...
Given a time-evolving network, how can we detect communities over periods of high internal and low external interactions? To address this question we generalize traditional local community detection in graphs to the setting of dynamic networks. Adopting existing static-network approaches in an “aggregated” graph of all temporal interactions is not appropriate for the problem as dynamic communities...
Undergraduate programs in software engineering are relatively new. The first ABET accredited programs received accreditation in 2001. There are currently 31 ABET accredited software engineering programs worldwide with additional programs being added each year. In this session, panelists will discuss their experience starting new programs, developing curriculum, and navigating accreditation issues.
The Agile Software Factory (ASF) was created in the Department of Computer Science at Bowling Green State University nearly ten years ago to promote the use of agile methods, improve student education through service-learning opportunities, and to facilitate community engagement by handling the many software requests that regularly arrive in the department. In pursuit of these goals, the ASF has had...
[Background] A high-functioning team is a decisive factor for a successful software development project. However building such a team is not easy. Among many issues and obstacles encountered by teams, social loafing is a common but difficult one to tackle. [Aim] We intend to construct an approach to effectively prevent social loafing behaviors in software development teams. [Method] We built one social...
With the rapid development of information technology, campus card has become an important part of the construction of digital campus. Based on the campus card to build a user behavior analysis system, which can help the school to master the student school of learning, consumption and rest behavior. This article discusses the specific behavior of campus card consumption and the data mining and analysis...
Digital watermarking is a technique that is widely used to protect rightful ownership of digital images. In this paper, we proposed a hybrid watermarking scheme for stereo images copyright protection. According to the property of stereo images, similar block pairs are located by using a certain key. Then, each block pair is transformed into DCT domain and DCT coefficients are extracted from the anti-diagonal...
Attribute-specific models are quite effective in the detection of web attacks. Nevertheless, none of existing attribute-specific models can be applied directly to modern web applications, which are dominant today and which use RESTful URLs. The barrier is that paths and parameters are mixed in URLs so that detection systems cannot identify which programs and attributes are which. To remove this barrier,...
In this paper, we revisit multi-party Diffie-Hellman key exchange (DHKE) protocols by using multi-linear mappings and Weil pairings over elliptic curves. We show how to construct a 4-linear Weil pairing and illustrate the approach by examples. Finally, we present several necessary conditions to find a distortion map for a 5-party DHKE protocol.
Many definitions of fuzzy rough sets exist. Most of them are defined on fuzzy approximation spaces. In this paper, we firstly introduce the notion of picture fuzzy approximation space and functional and set approaches are used. Some new picture fuzzy rough sets are proposed. Presented new basic propositions should be useful for knowledge discovery in the picture fuzzy information systems.
In this paper, we propose intuitionistic linguistic vector (ILV) as a tuple of intuitionistic linguistic numbers (ILNs). ILV can describe information which involves multiple linguistic terms according to different intuitionistic fuzzy values. Similarity measures for ILNs and ILVs are also given. The novel concepts are used to construct a classification algorithm (Intuitionistic Fuzzy Linguistic Vector...
We present a model-based testing approach for reactive systems where both test inputs and expected results are generated from ‘restricted’ Event-B specifications. We show that it is possible to automatically build the restricted Event-B specifications from the original ones base on a knowledge base of the system under tests. The restricted models are to reduce the state space of the original Event-B...
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
This paper considers the multi-unit resource allocation problem with a few distinct (indivisible and non-shareable) goods (or items, objects), each has a certain amount of copies. Every agent expresses her preference over multisets of goods by mean of utility function. The goal is to distribute goods among agents in such a way that maximizes either utilitarian social welfare or egalitarian social...
In multi-proxy multi-signature schemes, an original group of signers can authorize another group of proxy signers under the agreement of all singers both in the original group and proxy group. The paper proposes a new multi-proxy multi-signature based on elliptic curve cryptography. This new scheme is secure against the insider attack that is a powerful attack on the multi-signature schemes.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.