The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Levy Walk (or Levy flight) is a concept fromBiomathematics to describe the hunting–behaviour of manypredatory species. It is a very efficient way to find prey in avery short time frame. We now want to use this concept ina clustering–context to – if you so will – "hunt" for clusters. We describe how we convert this concept into an efficient wayto find cluster centres by linking the data...
In connected health services automatic discovery of recurring patterns and correlations, or insights, provides many interesting opportunities for the personalization of the services. In this paper the focus is on insight mining for a health coaching service. The basic idea in the proposed method is to generate a large number of insight candidates which have been pre-validated with domain experts and...
Different method calls may have different contributions to the precision of the final application when abstracted into the call strings. The existing call string based pointer analysis algorithms do not consider such contribution difference and hence often can not achieve best cost-effectiveness. To solve the problem, this paper firstly proposes a contribution-based call stack abstraction method which...
The goal of Information Extraction is to automatically generate structured pieces of information from the relevant information contained in text documents. Machine Learning techniques have been applied to reduce the cost of Information Extraction system adaptation. However, elements of human supervision strongly bias the learning process. Unsupervised learning approaches can avoid these biases. In...
The extended finite state machine (EFSM) is an extension of the finite state machine, which creates input and output parameters, context variables, operations and predicates. It is applied widely in the fields of software engineering since there are many tools that support software development activities based on the EFSM models. However, the theoretical foundation of EFSM is not yet well-developed...
Service process usually needs to be tailored for reuse because of change of context. In this paper, we present a mining approach to mining process change sequences based on different context using partial derivatives of the factors affecting the change context, thus finding the best feasible sequence.
Mining frequent closed itemsets provides complete and condensed information for frequent pattern mining. Online mining of frequent closed itemsets over streaming data is one of the most important issues in mining data streams. In this paper, we first present a general methodology to identify closed itemsets over data streams, using concept lattice theory. Using this methodology, we then proposed a...
Random key graphs form a class of random graphs naturally associated with the random key predistribution scheme of Eschenauer and Gligor. We compute the clustering coefficients of random key graphs, and then compare them with Erdos-Renyi graphs in the many node regime when the expected average degrees are asymptotically equivalent. On the parameter range of practical relevance in wireless sensor networks,...
Global asymptotic stabilization for a class of nonlinear systems is addressed. The dynamics of these systems are composed of a linear part to which is added some nonlinearities which satisfy two different sector bound conditions depending wether the state is closed or distant from the origin. The approach described here is based on the uniting of control Lyapunov functions as introduced in. The stabilization...
We discuss a conceptually new extension of our previous works in which we proposed a concept of a consensus reaching support system based on a new, gradual notion of consensus devised in the framework of fuzzy preference relations and a fuzzy majority. Here, first of all, we propose the use of action rules as a tool to generate some advice as to the further running of discussion in the group. Moreover,...
In this paper we study a class of subsets of self-affine carpets which are indexed by fibre-coding, but their limiting frequencies have nonlinear relation. We obtain their Hausdorff dimension spectrum and give the necessary and sufficient conditions of these fractal sets to be s-set.
Divide-and-conquer is essential to address state explosion in model checking. Traditionally, an over-approximate context is required when verifying each individual component in a system. This may cause state explosion for the intermediate results as well as inefficiency for abstraction refinement. This paper presents an opposite approach, a coordinated reachability analysis method, that constructs...
We present a system to extract definitions from a term using the Web. Definitions are organized according to a typology and its context. The structural and functional design is described; emphasizing its relevant components: the extractor of definitional context to candidates using the Yahoo!'s BOSS API; the extractor of definitional contexts and a clustering module based on textual energy as a measure...
The role of context for better decision-making has been a topic of significant research effort over the years. Context-aware systems are able to adapt their operations to the current context without explicit user intervention and thus aim at increasing usability and effectiveness by taking environmental context into account. These systems exploit information about the context of use, such as the location,...
The theory of arrays is ubiquitous in the context of software and hardware verification and symbolic analysis. The basic array theory was introduced by McCarthy and allows to symbolically representing array updates. In this paper we present combinatory array logic, CAL, using a small, but powerful core of combinators, and reduce it to the theory of uninterpreted functions. CAL allows expressing properties...
In this paper, we address the problem of self-adaptation in internet-scale service-oriented systems. Services need to adapt by selecting the best neighboring services solely based on local, limited information. In such complex systems, the global significance of the various selection parameters dynamically changes. We introduce a novel metric measuring the distribution and potential impact of service...
Many researches focus on semantic analysis in opinion mining and get effective results. However, dealing with context dependent opinions is still a challenge. Existing methods have used linguistic rules to cope with this problem, however, when the opinion is irrelevant to its adjacent sentences, the linguistic rules will not work. These special opinions, in this paper, called context indistinct-dependent...
One of the most important problems in artificial intelligence, namely pattern classification, is essentially equivalent to finding hyper-surfaces separating the different classes of data in a high-dimensional space. A method called raycasting is commonly used in computer game programming to locate and describe surfaces in a 2-dimesional map. A viewer, situated at some point on this map, casts rays...
Interest points have been used as local features with success in many computer vision applications such as image/video retrieval and object recognition. However, a major issue when using this approach is a large number of interest points detected from each image and created a dense feature space. This influences the processing speed in any runtime application. Selecting the most important features...
Since the end of the seventies, the utilization of multi-agents simulations has spread out. A typical use of these simulations concerns the modeling of human behavior. In this application case, a key point to ensure the simulation realism is the definition of the agent behavior. Unfortunately, designing such behavior is often complex. In order to help the definition of human behavior, we propose an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.