Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Automatic Chinese Term Extraction is an important issue in Natural Language Processing. This paper has proposed an improved method based on C/NC-value to extract Chinese term. We delete the linguistic part in C/NC-value method, and add two improved statistical parameters: mutual information and log-likelihood ratio, to calculate the statistical features of the candidate string. The results of the...
Neural networks are often selected as tool for software effort prediction because of their capability to approximate any continuous function with arbitrary accuracy. A major drawback of neural networks is the complex mapping between inputs and output, which is not easily understood by a user. This paper describes a rule extraction technique that derives a set of comprehensible IF-THEN rules from a...
This paper asks which of White's (2009) three disciplines and relative valuation orders does the Singapore blogosphere adhere to. Analysing not just the hyperlink connections but the textual discourse; and in doing so attempts to highlight certain limitations of using automated data mining and analysis software. Using the Singapore blogosphere, described by Lin, Sundaram, Chi, Tatemura, and Tseng,...
Frequent closed itemsets is a smaller, representative of the frequent itemsets. Some existed algorithms for mining frequent closed itemsets based on FP-Tree improvement or incremental mining the database with objects, thus, mining frequent closed itemsets inefficient in the database of increasing attribute. This paper, based on Iceberg concept lattice model, presents a frequent closed itemsets mining...
Information on Internet is so huge,and increases quickly. A huge information pool is coming up on the Internet. And much important information can be found on the Internet. Internet is really an important source of information. So extract the key words from the pages on Internet is so important. A page description model based on undirection graph is proposed and then a entity ranking algorithm named...
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Events give important information about the behavior of a system in a summarized form. In the past, events have played an important role in breaking the functional requirements of the system in the ??event partitioning approach??. Our previous work has shown that events can be a starting point in object-oriented analysis of requirements. Every event triggers a use case in the system, hence should...
Proximity ranking according to end-to-end network distances (e.g., Round-Trip Time, RTT) can reveal detailed proximity information, which is important in network management and performance diagnosis in distributed systems. However, to the best of our knowledge, there has been no similar work on this subject in the P2P computing field. We present a distributed rating method iRank, that enables proximity...
The language class presented here is introduced by Subramanian et al. and includes the class inferred by Makinen's algorithm. We present a modification of the work of Subramanian et al. in order to remove some limitations in the original algorithm.
In the last years, the area of Multicriteria Decision Analysis (MCDA) has brought about new methods to cope with classification problems, among which those based on the concept of prototypes. These refer to specific alternatives (samples) of the training dataset that are good representatives of the groups they fit in. In this paper, experiments are conducted over two prototype selection (PS) techniques...
Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise may be running a number of multiple business processes in parallel, which may require different services to fulfill the functionality. To provide better search, query, composition,...
This paper presents an imitation mechanism and a study of its behavior in spatial grid-based configurations. The imitation mechanism replicates external signals without associating with objects, as in higher-level imitation; it is therefore a model of proto-imitation where agents imitate unconditionally the agents they happen to interact with. We study the mechanism in 2D space to understand how it...
Service process usually needs to be tailored for reuse because of change of context. In this paper, we present a mining approach to mining process change sequences based on different context using partial derivatives of the factors affecting the change context, thus finding the best feasible sequence.
Mashup tools are becoming increasingly important enabling users to compose services and processes on the Web. Most existing tools focus on Web-based interfaces, usability, and visual languages for creating mashups. A major challenge that has received limited attention is context-awareness and adaptivity of service mashups. In this paper we focus on two main aspects: First, a service capability model...
This paper describes a hybrid system that applies maximum entropy (MaxEnt) model with hidden Markov model (HMM) and some linguistic rules to recognize name entities in Oriya language. The main advantage of our system is, we are using both HMM and MaxEnt model successively with some manually developed linguistic rules. First we are using MaxEnt to identify name entities in Oria corpus, then tagging...
A method is proposed to annotate editorials and news articles for sentences that most accurately represent the opinion of the speaker towards the issue. The speaker's point of view or level of discernment of the issue is whittled out. A list of informative and related keywords is extracted from the document based on their frequency of occurrence. Subsequently, pronominal anaphora is resolved at the...
The introduction of multi-core architectures generates a higher demand for parallelism in order to fully exploit the potential of modern computers. It is of vital importance that a compiler can allocate parallel workload in a cost-aware manner in order to achieve optimal performance on a multi-core architecture. This paper presents an adaptive OpenMP-based mechanism capable of generating a reasonable...
Counter-example guided abstraction refinement (CEGAR) techniques have been primarily used to scale the capacity of formal property verification. This paper explores the utility of CEGAR for verifying an emerging style of formal specifications, called AuxSM+properties, which consists of auxiliary state machines (AuxSMs) and formal properties based on the AuxSMs. A core challenge in formally verifying...
Monitoring activities of daily living is one of the key functionalities expected from a Smart Living environment providing independent living services for elderly people. Simple state-change sensors have been considered to be a promising sensing technique to observe the environment and consequently provide the data required to form the basis to infer high-level behaviours. From a data analysis point...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.