The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of technologies to support educational processes, is a point that has been working for several years with the purpose of strengthening teaching and learning processes. The personalization of educational environments is one of its main characteristics, however it has not been completely achieved to difficulties both in modeling and implementation. In addition, it is fundamental to offer accessible...
There arises the need in many wireless network applications to infer and track different models of interest. Some nodes in the network are informed, where they observe the different models and send information to the uninformed ones. Each uninformed node responds to one informed node and joins its group. In this work, we suggest an adaptive and distributed clustering and partitioning approach that...
The stochastic dual coordinate-ascent (S-DCA) technique is a useful alternative to the traditional stochastic gradient-descent algorithm for solving large-scale optimization problems due to its scalability to large data sets and strong theoretical guarantees. However, the available S-DCA formulation is limited to finite sample sizes and relies on performing multiple passes over the same data. This...
The work presented in this paper explores the issues of recognizing children's speech using acoustic models trained on adults' speech data. In such conditions, on account of large acoustic mismatch between training and test data, a high degradation in the recognition performance is noted. In our earlier work, a binary weighting of cepstral features as well as of acoustic model parameters was explored...
In real life, a tester can only afford to apply one test case prioritization technique to one test suite against a service-oriented workflow application once in the regression testing of the application, even if it results in an adverse scenario such that the actual performance in the test session is far below the average. It is unclear whether the factors of test case prioritization techniques known...
With the advances of networking and cloud computing technologies, many web services are often implemented as cloud services by different service providers, and some SPs compose those services to create an end-to-end network service. In this service-oriented network virtualization environment, two important but somehow contradictory technical challenges are 1) how to select an optimal service path...
Many web services represent their artifacts in the semi-structural format. Such artifacts may or may not be structurally complex. Many existing test case prioritization techniques however treat test cases of different complexity generically. In this paper, we exploit the insights on the structural similarity of XML-based artifacts between test cases, and propose a family of test case prioritization...
Over the last decade remote laboratories have emerged as valuable educational resources, providing the potential for improved educational outcomes, student flexibility, richer laboratory experiences, and cross-institutional resource sharing. While there has been increasing attention given to the pedagogy that underpins the use of remote labs, the focus on the design of the lessons that take advantage...
Any system (whether in the area of finance, manufacturing, administration, etc.) that operates in a dynamic environment needs to be adaptive to changes; it should also anticipate possible adverse events to remain competitive. In our previous research in this area we experimented with one particular approach: Mapping of Task ID for Centroid-Based Adaptation with Random Immigrants (McBAR) to address...
In the research of composite service execution, runtime QoS ensuring of composite service is an important problem in composite service adaptation. This paper gives an introduction to the design and implementation of composite service adaptive execution supported environment monitoring system, analyzes the crucial problem of the system, builds up an experiment environment to test the monitoring system...
Correct and effective instruction pre-fetch strategy is key technique to avoid instruction misses. Unfortunately, branch direction correctness and the accuracy of instruction pre-fetch is not very good, and the utilization ratio of memory bandwidth is relative low, all of these mentioned reasons are the main factors leading to instruction miss. This paper proposes an adaptive and selective instruction...
Services discovery, selection, composition, verification, and adaptation are important in service-oriented computing. Existing researches often study techniques to maximize the benefits of individual services. However, following the power laws, a small fraction of quality services offers their executions to support a significant portion of all service requests. We argue that locating and maintaining...
“Memory Wall” has already become the chief barrier for processor performance promotion. Cache pollution caused by speculative execution of memory instructions in predictive path may impact the performance of processor seriously. This paper proposes an adaptive storage frame to filter pollution data from predictive path based on confidence estimation mechanism for multi-core architecture, called CSDA...
Knowledge work in modern organizations is increasingly performed collaboratively by distributed teams. Such collaboration involves dynamically changing situations. Making the collaboration environment fit the needs of these situations is supported by system-initiated adaptation based on the user and team context. Adaptation in the collaboration environment may confuse the users, because they cannot...
A Case-Based Reasoning (CBR) based approach is proposed to interpret explicit and implicit service request from users. Based on the proposed approach, a service request can be extracted and mapped to a set of predefined goal models. Goal models are elicited from the user??s requirements and used to represent the system capabilities to satisfy user??s service requests. The approach can reuse previous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.