The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Static Graphs consist of a fixed sequence of nodes and edges which does not change over time, hence lack in providing the information regarding evolution of the network. In contrast, Dynamic Graphs to a greater extent relate to real-life events and so provide complete information about the network evolution. That is why many researchers [1, 2, 3, 5, 6, 7, 8, 9 and 10] have developed interest in mining...
The Game of the Amazons is a two-player abstract territory game. It has attracted attention in game research because of its simple rules and its complexity of play. A number of Amazons-playing programs have emerged in recent years. Different search algorithms are used in Amazons programs. Minimax is one of the most commonly used Amazons search algorithms. It is usually optimized with augmentations,...
Cache compression seeks the benefits of a larger cache with the area and power of a smaller cache. Ideally, a compressed cache increases effective capacity by tightly compacting compressed blocks, has low tag and metadata overheads, and allows fast lookups. Previous compressed cache designs, however, fail to achieve all these goals. In this paper, we propose the Skewed Compressed Cache (SCC), a new...
This paper studies the problem of identifying the minimum number of entities (agents), referred to as information gatherers, that are able to infer all the states in a dynamical social network. The information gatherers can be, for instance, service providers and the remaining agents the clients, each comprising several dynamic states associated with the services and personal information. The problem...
Motivated by the concept of reverse signed domination, we introduce the reverse minus domination problem on graphs and study the problem from the algorithmic point of view. For strongly chordal graphs and distance-hereditary graphs, we show that the reverse minus domination problem can be solved in polynomial time. We also show that the problem is linear-time solvable for trees. For chordal graphs...
This paper analyses the effectiveness of random passwords used in South Indian languages in terms of their entropy value with an objective of recommending passwords with mandatory minimum length to enhance the security aspects in relation to their predictability.
Attack graphs are instrumental to analyze security vulnerabilities in networks. They provide decision support to security analysts via identification of critical exploitation scenarios. However, they may suffer from scalability issues due to network size and potential vulnerabilities, and become difficult to analyze. In this paper, we propose a heuristic method to find a cost-effective solution to...
This paper explores whether engaging embedded electronic systems students in the creation of, as opposed to simply the use of, lab equipment improves their motivation to practice, and thereby their ability to acquire, discipline-specific skills. The specific piece of laboratory equipment considered is the Microchip In Circuit Debugger, inclusive of header, for PIC16F mid-range micro-controllers. A...
This paper explores intrinsic characteristics of solid state device(SSD) by modifying the system schedulers as core. Based on obtained characteristics, we design a new block I/O scheduler. Different from mechanical hard disk device(HDD), SSDs have many widely cognitive features, such as none-mechanical, inherent parallelism, high read and write speeds and so on. Considering the current system schedulers...
This paper introduces Convers[t]ation, an electronic panel on which informal reports of sexual harassment in public spaces are submitted. The Convers[t]ation panel was developed as the result of a cross-cultural collaborative project conducted in Bangalore, India1 and Amsterdam, The Netherlands2. The need to bridge the gap in data regarding crimes against women was identified as a primary concern...
Deployment of cloud applications relies upon the inter-dependencies between software components. Modeling languages like UML can be employed to handle the complexities of deploying cloud applications. UML devotes a special model called deployment diagram to represent the physical view of deployment. A recurring issue in deployment is not considering the dependency between artifacts based on the dependencies...
In this paper, we propose a new design for a low complexity floating-point complex multiplier for DSP applications. The design uses a three-term dot-product unit that reduces the overlapped portion found in a previous two-term fused dot-product unit. Comparisons with a primitive fused adder-subtract unit, a dot-product unit and combinations of these primitive units have also been performed. The synthesis...
Text categorization refers to the task of designing methods to automatically classify text documents into different groups. With wide applications in intelligent information processing, it has attracted much recent research attention. The classical support vector machines (SVM) algorithm has obtained significant success on this task. Inspired by the achievements of SVM, a family of related kernel...
Nesting is a fundamental and very commonly used programming construct. In many cases, the wise use of nesting contributes significantly to a programming team's elegantly designing a solution to a difficult problem. However, the ease with which nesting constructs may be created and the essentially unlimited depth and breadth to which they may exist also enable a programming team to create structures...
Numerous requirements engineering methods have been proposed to improve the quality of requirements documents and to increase customer satisfaction with the final product. However, the choosing between various techniques may be confusing and puzzling. Therefore, this paper aims to present an empirical study to assess requirement analysis techniques, highlight their key features, strength and limitations...
This paper describes properties of graphical presentation of pseudorandom number generator. Numerous more-or-less rigorous tests for randomness are available in the literature, and some of them are presented here. It is shown that both graphical and analytical tests give almost equal results, but graphical tests are simpler and closer to human perception. Because of that properties, visual tests combined...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
Cardiotocography (CTG) is the most frequently used electronic fetal monitoring technique, both in the antepartum and intrapartum periods. A few systems for computer analysis of CTG tracings have been developed, but there is still a large room for improvement in their capacity to diagnose fetal hypoxia/acidosis. Research on fetal heart rate (FHR) analysis has shown that several factors are not commonly...
This paper introduces the present development and situation of computer games, especially in connect6. Through the regulations of computer games in connect6, it is described that main technologies and principles are existing in the connnect6 game. According to the algorithm and application of other mature computer games, the five steps of connect6 method and skill is improved to be advanced and modified...
Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.