The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Early design-space evaluation of computer-systems is usually performed using performance models such as detailed simulators, RTL-based models etc. Unfortunately, it is very challenging (often impossible) to run many emerging applications on detailed performance models owing to their complex application software-stacks, significantly long run times, system dependencies and the limited speed/potential...
Model-based software development promises improvements in terms of quality and cost by raising the abstraction level of the development from code to models, but also requires mature techniques and tools. Although Eclipse Modelling Framework (EMF) introduces a default persistence mechanism for models, namely XMI, its usage is often limited as model size increases. To overcome this limitation, during...
Early design space evaluation of computer systems is usually performed using performance models (e.g., detailed simulators, RTL-based models, etc.). However, it is very challenging (often impossible) to run many emerging applications on detailed performance models owing to their complex software-stacks and long run times. To overcome such challenges in benchmarking these complex applications, we propose...
Modeling and simulation in the aviation community is characterized by specialized models built to solve specific problems. Some models are statistically-based, relying on averages and distribution functions using Monte-Carlo techniques to answer policy questions. Others are physics-based, relying on differential equations describing such phenomena as the physics of flight, communication errors and...
We present a progressive method of applying easy-to-hard grouping technique that applies increasingly sophisticated feature descriptors and classifiers on reducing number of image samples from each of the iteratively generated clusters. The primary goal of the proposed approach is to design a cost effective face clustering method to deploy on low-power devices like Mobile phones, while handling various...
This paper presents local structure tensor (LST) based methods for extracting the anisotropy and orientation information characterizing a textured image sample. A Log-Euclidean (LE) multivariate Gaussian model is proposed for representing the marginal distribution of the LST field of a texture. An extended model is considered as well for describing its spatial dependencies. The potential of these...
Saliency models provide heatmaps highlighting the probability of each pixel to attract human gaze. To define image's important regions, features maps are extracted. The rarity, surprise or contrast are computed leading to conspicuity maps, showing important regions of each feature map. The final saliency map is obtained by merging these maps. The fusion process is usually a linear combination of the...
We are currently witnessing an explosion of advances in database technology, that cover all phases of database application design: non-functional requirements, conceptual modeling, logical modeling, deployment, physical design and exploitation. Researchers and engineers cooperate to integrate these advances in the database design. Their proposed solutions have to be confronted with similar studies...
Tool-based code review is growing in popularity and has become a standard part of the development process at Mi-crosoft. Adoption of these tools makes it possible to mine data from code reviews and provide access to it. In this paper, we pre-sent an experience report for CodeFlow Analytics, a system that collects code review data, generates metrics from this data, and provides a number of ways for...
In this paper, we present a novel approach for recognition of human faces using Markov Random Fields (MRF) and Bayesian models. We examine the relationship between feature vectors in a close proximity system. The feature vectors are coefficients of the 2D Gabor Wavelet Transform (DWGT). The MRF is implemented to match the constraint configurations between the feature vectors. The MRFs posterior probability...
Recent development and innovations in advanced 3D scanning mechanism has boosted the modelling of 3D objects for several domain related applications. Here we propose a framework for 3D Object retrieval process. Hence for the fruitful retrieval from the warehouse efficient searching techniques are required. In this paper, combination of different methods which are rotation estimation, feature extraction,...
Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing...
Determining quality of a conceptual model has always been a challenge for researchers. Various quality attributes and their measures have been proposed in the research. These measures are usually qualitative and lack quantitative aspect which makes it difficult to discuss quality objectively. In our research, we have studied the existing quantitative metrics and have found that many of these metrics...
The elasticity characteristic of cloud computing enables clients to acquire and release resources on demand. This characteristic reduces clients' cost by making them pay for the resources they actually have used. On the other hand, clients are obligated to maintain Service Level Agreement (SLA) with their users. One approach to deal with this cost-performance trade-off is employing an auto-scaling...
Software systems are evolving continuously in order to fulfill the ever-changing business needs. This endless modification, however, decreases the internal quality of the system over time. This phenomena is called software erosion, which results in higher development, testing, and operational costs. The SourceAudit tool presented in this paper helps managing the technical risks of software deterioration...
The paper considers an approach to computer attack modeling and security evaluation which is suggested to realize in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of malefactors' behavior, building a common attack graph, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing security...
This paper presents a novel full-reference Stereo Image Quality Assessment (SIQA) measure based on well understood characteristics of the human visual system (HVS), namely contrast sensitivity and frequency and directional selectivity. Additionally, the proposed metric takes into account the stereo interplay between the two views, where one view may affect our perception of the overall quality of...
Automatic estimation of 3D shape similarity from video is a very important factor for human action analysis, but also a challenging task due to variations in body topology and the high dimensionality of the pose configuration space. We consider the problem of 3D shape similarity in 3D video sequence for different actors and motions. Most current approaches use conventional global features as a shape...
Playlist generation may be defined as the generation of a list of musical items or songs based on a pre-existing set of songs selected by the user. A common approach would be to suggest a number of songs based on the currently playing song. An exhaustive algorithm would involve computation of similarity of musical attributes of all of the songs with respect of the reference song. This paper introduces...
The paper suggests a framework for attack modeling and security evaluation in Security Information and Event Management (SIEM) systems. It is supposed that the common approach to attack modeling and security evaluation is based on modeling of a malefactor's behavior, generating a common attack graph, calculating different security metrics and providing risk analysis procedures. Key elements of suggested...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.