The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a novel method for predicting gene functional interactions. We study the effectiveness of various raw and derived features from neural word embedding learned from biomedical literature. Our evaluation results demonstrate that the information captured in neural word embedding is very useful and our learned classification models are capable of predicting gene functional interactions...
The main purpose of this paper is to review the literatures on the adoption of Cloud Computing by SMEs in order to learn the current state of Cloud Computing studies and identify gaps for future research. Twenty-two articles were reviewed and analyzed from various journals and conference proceedings that were published on Cloud Computing adoption, acceptance, and diffusion. Findings revealed that...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with respect to user and data privacy. The goal of an adversary in such context is not to bypass the authentication but to learn information either on biometric data or on users that are in the system. We elaborate our analysis on a general system model involving four logical entities (sensor, server, database,...
Software-as-a-Service applications commonly consolidate multiple businesses into the same database to reduce costs. This practice makes it harder to implement several essential features of enterprise applications. The first is support for master data, which should be shared rather than replicated for each tenant. The second is application modification and extension, which applies both to the database...
Model-driven approaches have shown that the systematic use of models and model transformations can facilitate the development process of distributed applications. Abstract models can be used to (automatically) generate more detailed models, to simulate and execute application's behavior in early stages, to validate it against requirements, or to generate executable code. These models also document...
This paper presents annotation specification as attribute-value pair for representing and capturing strategic information for solving decision problems in the context of Economic Intelligence (also referred to as competitive intelligence). The aim of using this approach is to facilitate information reuse for similar problems. While most of available annotation tools allow annotator to add annotation...
The problem of biometric menagerie, first pointed out by Doddington et al. (1998), is one that plagues all biometric systems. They observe that only a handful of clients (enrolled users in the gallery) actually contribute disproportionately to recognition errors. While prior literature attempting to reduce this effect focuses on either client-specific score normalization or client-specific decision...
Query term suggestion that interactively expands the queries is an indispensable technique to help users formulate high-quality queries and has attracted much attention in the community of web search. Existing methods usually suggest terms based on statistics in documents as well as query logs and external dictionaries, and they neglect the fact that the topic information is very crucial because it...
In this paper we discuss the use of compression algorithms for author identification. We present the basic background about compression algorithms and introduce the prediction by partial matching algorithm, which has been used in our experiments. To better compare the results produced by the PPM algorithm, we present some experiments using stylometric features used very often by forensic examiners...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.