The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Multiple Institution Database for Investigating Engineering Longitudinal Development (MIDFIELD) is expanding from 14 to about 100 institutions across the USA. This special session aims to introduce participants to MIDFIELD, explore how to conduct research with such a resource, and explain how participants can access MIDFIELD.
Projects, in Process-Aware Information Systems (PAIS) for medical scientific research, have as requirements all sorts of data coming from many interdependent processes. More concretely, in autopsy study, data are collected from two main interdependent processes: 1) material collection and processing; and 2) interview. These processes are the groundwork to optimize the association between biological...
Data storage in cloud should come along with high safety and confidentiality. It is accountability of cloud service provider to guarantee the availability and security of client data. There exist various alternatives for storage services but confidentiality and complexity solutions for database as a service are still not satisfactory. Proposed system gives alternative solution for database as a service...
Creating and maintaining an accurate description of data assets and the relationships between assets is a critical aspect of making data findable, accessible, interoperable, and reusable (FAIR). Typically, such metadata are created and maintained in a data catalog by a curator as part of data publication. However, allowing metadata to be created and maintained by data producers as the data is generated...
Considering the factors of environmental adaptability, laying cost and system complexity, the signal fingerprint positioning based on RFID systems has become a better choice of the positioning technology. Online and offline signal matching technology is very important stage for the signal fingerprint positioning. In this paper, we propose a signal matching algorithm in order to further improve the...
Developing new ideas and algorithms or comparing new findings in the field of requirements engineering and management implies a dataset to work with. Collecting the required data is time consuming, tedious, and may involve unforeseen difficulties. The need for datasets often forces re-searchers to collect data themselves in order to evaluate their findings. However, comparing results with other publications...
The purpose of this research study is to investigate the problems of design and requirements to diagnostic automated systems based on image processing. To realize the research purpose, the authors designed a conceptual model, a use case diagram, and a prototype of automated system object model.
Learning lessons from projects is becoming increasingly critical to organizations and has peaked academics' and practitioners' interests. Although for many reasons in practice, the process of learning today to avoid making the same mistake tomorrow does not necessarily take place throughout the project's lifecycle. This paper is based on research aimed at examining the measurable impact of systematic...
Organizations enhance the velocity of simple operations that read and write a small amount of data from big data by extending a SQL system with a key-value store (KVS). The resulting system is suitable for workloads that issue simple operations and exhibit a high read to write ratio, e.g., interactive social networking actions. A popular distributed in-memory KVS is memcached in use by organizations...
We consider the problem of signal segmentation in the setup of supervised learning. The supervision lies here in the existence of labelled change points in a historical database of similar signals. Typical segmentation techniques rely on a penalized least square procedure where the smoothing parameter is fixed arbitrarily. We introduce the alpin (Adaptive Linear Penalty INference) algorithm to tune...
The paper is devoted to presentation of Unified Process Metamodel as a tool to describe both structural and behavioral aspects of processes identified in a real world. The complexity of the description of the reality urges the use of sophisticated tool for modeling. Therefore Association-Oriented Database Metamodel was used to prepare database model that comply with the needs of proposed system. Since...
With the maturity of virtual reality (VR) technology, people have been able to acquire virtual reality experience lightly. To discover more appropriate encoder for panoramic video encoding with the aim of ameliorating the quality of virtual reality video experience, this paper conducts the experiments of subjective and objective quality assessment of panoramic videos. First, sixteen standard panoramic...
The High Efficiency Video Coding (HEVC) standard significantly saves coding bit-rate over the proceeding H.264 standard, but at the expense of extremely high encoding complexity. In fact, the coding tree unit (CTU) partition consumes a large proportion of HEVC encoding complexity, due to the brute-force search for rate-distortion optimization (RDO). Therefore, we propose in this paper a complexity...
Nowadays the CNN is widely used in practical applications for image classification task. However the design of the CNN model is very professional work and which is very difficult for ordinary users. Besides, even for experts of CNN, to select an optimal model for specific task may still need a lot of time (to train many different models). In order to solve this problem, we proposed an automated CNN...
Learning from examples, either alone or combined with problem solving has been proven to be beneficial for learning in Intelligent Tutoring System. However, it is generally unknown how much example-based assistance should be provided. We previously found that erroneous examples prepared students better for problem solving in comparison to worked examples when the order of learning activities is fixed...
This paper addresses the problem of Approximate Nearest Neighbor (ANN) search in pattern recognition where feature vectors in a database are encoded as compact codes in order to speed-up the similarity search in large-scale databases. Considering the ANN problem from an information-theoretic perspective, we interpret it as an encoding, which maps the original feature vectors to a less entropic sparse...
Shah, Rashmi and Ramchandran recently considered a model for Private Information Retrieval (PIR) where a user wishes to retrieve one of several Ä-bit messages from a set of n non-colluding servers. Their security model is information-theoretic. Their paper is the first to consider a model for PIR in which the database is not necessarily replicated, so allowing distributed storage techniques to be...
The question of whether there is a logic that captures polynomial time is one of the main open problems in descriptive complexity theory and database theory. In 2010 Grohe showed that fixed point logic with counting captures polynomial time on all classes of graphs with excluded minors. We now consider classes of graphs with excluded induced subgraphs. For such graph classes, an effective graph decomposition,...
Two main techniques have been used so far to solve the #P-hard problem #SAT. The first one, used in practice, is based on an extension of DPLL for model counting called exhaustive DPLL. The second approach, more theoretical, exploits the structure of the input to compute the number of satisfying assignments by usually using a dynamic programming scheme on a decomposition of the formula. In this paper,...
Functional transductions realized by two-way transducers (equivalently, by streaming transducers and by MSO transductions) are the natural and standard notion of “regular” mappings from words to words. It was shown recently (LICS'13) that it is decidable if such a transduction can be implemented by some one-way transducer, but the given algorithm has non-elementary complexity. We provide an algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.