The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We introduce a Gentzen-type sequent calculus PL for a modified extension of Arieli, Avron and Zamansky's ideal paraconsistent four-valued logic 4CC. The calculus PL, which is also regarded as a paradefinite four-valued logic, is formalized based on the idea of connexive logic. Theorems for syntactically and semantically embedding PL into a Gentzen-type sequent calculus LK for classical logic and vice...
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based detection methods. We measure the success of this potential attack against Hotmail, Gmail and Yahoo mail. While the attack is bothersome both in terms of...
Congestion is a major problem for the data-processing Ethernet Networks, because it causes data loss and application failure in consequence. To this end, this kind of network needs to be suitably controlled in order to guarantee good performances. IEEE 802.1Qau standard is in progress to find an efficient congestion control mechanism, which may ensure a properly use of the available resources and...
An increasing number of attacks use advanced tactics, techniques and methods to compromise target systems and environments. Such multi-step attacks are often able to bypass existing prevention and detection systems, such as Intrusion Detection Systems (IDSs), firewalls and anti-virus solutions. These security systems either use an anomaly-based or a signature-based detection approach. For systems...
This article reviews the state of archival science where basic concepts have been subject to a long stream of criticisms without satisfactory resolution of the issues identified. It establishes a ground for progress by articulating criteria for evaluating archival concepts and proposes a path forward by enriching archival science with concepts and methods from systemic functional linguistics and graph...
The study of compound-target binding profiles has been a central theme in cheminformatics. For data repositories that only provide positive binding profiles, a popular assumption is all unreported profiles are negative. In this paper, we caution audience not to take such assumption for granted. Under a problem setting where binding profiles are used as features to train predictive models, we present...
The MOOCs (Massive Open Online Courses) represent a category in the frame of TEL (Technology Enhanced Learning) particularly fashionable today since they allow the largest number of learners to access specific teachings. However, the principle of proposing very sequential and linear pedagogical paths is not attractive enough. In fact, the low success rate shows that it is necessary to maintain the...
Sepedi (Southern Bantu, S30) does not have grammaticalized focus prosody due to which focused constituents are unambiguously marked by prosodic prominence in one way or another. Nevertheless, prosodic traces of emphasis might still exist. The paper reports on a study that investigates acoustic traces of emphasis in Sepedi and their role for processing. An auditory analysis of sentences uttered in...
Lexical resources on Arabic tend to focus on the standard version of the language (Modern Standard Arabic, MSA), mostly used in written and formal sources. However, the diffusion of informal genres has increasingly made it necessary the production of wider resources, encompassing the features of spoken varieties commonly found in written texts. The Lahajat project addresses this need by providing...
Time series forecasting is a challenging task, where the non-stationary characteristics of the data portrays a hard setting for predictive tasks. A common issue is the imbalanced distribution of the target variable, where some intervals are very important to the user but severely underrepresented. Standard regression tools focus on the average behaviour of the data. However, the objective is the opposite...
People often under or over-estimate their performance on interactive learning experiences with virtual agents, especially when it comes to interpersonal skills such as empathy. To generate more accurate self-assessment of performance, we propose the use of in-action reflective learning opportunities during interactive learning experiences with virtual agents. We conducted a user study in which third-year...
Ordinal input variables are common in many supervised and unsupervised machine learning problems. We focus on ordinal classification problems, where the target variable is also categorical and ordinal. In order to represent categorical input variables for measuring distances or applying continuous mapping functions, they have to be transformed to numeric values. This paper evaluates five different...
The proposed patterns for a specific domain were widely used for the concept of reusing of the resolved problems to similar ones. The verification criteria for proposed patterns evaluation are one of the important factors that affect the patterns quality. This research proposed patterns verification method and criteria based on quality attributes in order to improve patterns validity. The method was...
In floating-point arithmetic, a desirable property of computations is to be accurate, since in many industrial context small or large perturbations due to round-off errors may cause considerable damages. To cope with this matter of fact, we have developed a tool which corrects these errors by automatically transforming programs in a source to source manner. Our transformation, relying on static analysis...
Non-rigid point set registration is a fundamental problem for many computer vision technologies. In this paper, we proposed a new non-rigid point set registration method based on coherent spatial mapping (CSM) and local geometrical constraint. Our central idea is to express each point as a weighted sum of several nearest neighbors and the same relation holds after the transformation. The registration...
A random sampling function Sample: U → {0, 1} for a key universe U is a distinguisher with probability. If for any given assignment of values v(x) to the keys x ε U, including at least one non-zero v(x) ≠ 0, the sampled sum ∑{v(x)|x ε U ^. Sample(x) = 1} is non-zero with probability at least Α...
In recent years rank aggregation has received significant attention from the machine learning community. The goal of such a problem is to combine the (partially revealed) preferences over objects of a large population into a single, relatively consistent ordering of those objects. However, in many cases, we might not want a single ranking and instead opt for individual rankings. We study a version...
When optimizing multi-modal spaces, effective search techniques must carefully balance two conflicting tasks: exploration and exploitation. The first refers to the process of identifying promising areas in the search space. The second refers to the process of actually finding the local optima in these areas. This balance becomes increasingly important in stochastic search, where the only knowledge...
A common approach in research projects is to plan the evaluation and in particular the validation phase In the last months of the project. When done late in the project, validation cannot provide valuable inputs to the development of the research idea, because there is no space to bring about changes, and very often ends up as confirmatory tests. Software validation can and should occur since creating...
We witness that digital government has received much attention, and that provision of online information and services has increased tremendously during the last decade. In this regard, the Scandinavian countries have great ambitions and aims about being international leaders in the provision of online information and services. User satisfaction is allocated as one on the main contributors to success,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.