Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the physical world, cause and effect are inseparable: ambient conditions trigger humans to perform actions, thereby driving status changes of objects. In video, these actions and statuses may be hidden due to ambiguity, occlusion, or because they are otherwise unobservable, but humans nevertheless perceive them. In this paper, we extend the Causal And-Or Graph (C-AOG) to a sequential model representing...
In order to notify users about potentially unsafe situations and to track mistakes or efficiency performing activities, it is important to monitor the quality of performing an activity and identify the missing/wrong steps. However, the state-of-the-art activity recognition frameworks ignore such details and impose constraints on sensor values, the types of detected activities (no parallel/interleaved/joint...
Searching useful information without fault from the Web becomes an increasingly difficult task, since the volume of Web data rapidly grows. With the growth rate, unexpected faults of Web service composition may occur in different levels at runtime. These faults are to be identified from Web Log files. The common causes of faults in Web services execution are rectified by fault diagnosis technique...
With the help of assertion based verification, engineers nowadays can check a digital design against its specification more easily and precisely. What's more, assertion descriptions can be synthesized into hardware, which makes post-fab on-line monitor possible. But most of the paper does not consider waveform capture and off-line replay features that can help engineers further analyze captured waveforms...
Teaching Internet information resources are slowly conquering the system of education, which gives them their methodical adjustments. The use of information technologies aims at developing students' self-study work and at the ability to think logically, at the formation of creative ability, which is a condition for the formation of communicative competence and readiness for intercultural communication...
The paper is devoted to solving the problem of developing new and improving existing methods of NFV technological solutions analysis on the earlier stages of developing process. A method of analysis functional and non functional requirements of NFV infrastructure realization is proposed. The proposed method bases on mathematical modelling approach. E-network is use as tool for NFV behavioural modelling...
This paper presents an analysis using hierarchical grouping method (ward grouping) and the non-hierarchical grouping method (k-means) to analyze the participation levels in activities and interactions in a virtual forum. Data came from a MOOC and it was on grammatical rules of Brazilian Portuguese. About 5100 participants integrated the course. It lasted about three months and the activities developed...
SystemC Transaction-level modeling (TLM) provides high-level component-based models for SoCs, for which assertion-Based-Verification (ABV) allows property checking early in the design cycle. We introduce the notion of loose-ordering to specify when components interact with each other and we propose a set of patterns to capture this notion in assertions. This new notion can already be expressed in...
In many situations after a stroke or an accident the patient needs to execute for a period of time rehabilitation exercises. In most of the cases the patient needs to be helped by specialized personnel in kinetoterapy and rehabilitation techniques. The process is long and the costs are high, if the impact of the stroke or of the accident was not so strong, or after a period of time after the patient...
This paper describes work in progress on the design and implementation of an SQL-like language for performing complex queries on event streams. This language aims at providing a simple, intuitive and fully non-procedural syntax, while still preserving backwards compatibility with traditional SQL. The syntax and informal semantics of the language are introduced, multiple examples of scenarios taken...
Divide and conquer is already a proven strategy to handle the complexity of state-of-the-art SoCs. For any minor or major revision of an SoC, difficult decisions about its architecture have to be made at very early stages of the design cycle. System prototyping on FPGAs is an essential step in the SoC design flow for the verification of the hardware architecture. In this paper, we present a graph-grammar-based...
To keep a DSL clean, readable and reusable in different contexts, it is useful to define a separate tagging language. A tag model logically adds information to the tagged DSL model while technically keeping the artifacts separated. Using a generic tagging language leads to promiscuous tag models, whereas defining a target DSL-specific tag language has a high initial overhead. This paper presents a...
The paper deals with the research comparing open-answer and multiple-choice test results monitoring learners' knowledge of English tenses. The research sample consisted of 295 participants. The research was held at the Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic. The results proved slightly higher test scores in the multiple-choice test but the difference in...
Network resources monitoring and management is critical to ensure security and load balance of network and information system, especially in the increasingly extensively used cloud computing and distributed parallel architecture. This paper presents a distributed network resources monitoring solution based on multi-agent and matrix grammar. A distributed multi-agent architecture for network resources...
Nowadays, many influential security-related facts are reported multiple times by different sources and in different languages. Therefore, in the recent years, the research on advancing event extraction technology shifted from classical single-document extraction toward cross-document information aggregation and fact validation. However, relatively little work has been reported on cross-lingual information...
Software log file analysis helps immensely in software testing and troubleshooting. The first step in automated log file analysis is extracting log data. This requires decoding the log file syntax and interpreting data semantics. The expected output of this phase is an organization of the extracted data for further processing. Log data extractors can be developed using popular programming languages...
Presentation skill is essential both for academic and business purposes, but its training, particularly in Asian countries, still heavily depends on experiences. This paper reconsiders presentation skill and discusses system requirements of a presentation learning support system, which is based on our prototypical multimedia learner corpus of basic presentation. Then we developed a prototype of comprehensive...
The aim of this work is to put forth some basic methodological aspects that are being followed in the demanding task of the development of a telemedical platform for the efficient control and management of chronic elderly patients. Among the main methodological concepts proposed there is: an integrated market-oriented approach, a user-centered design, an evaluation-driven development and a work plan...
SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions resulting in unauthorized database access. We provide a novel technique to identify the possibilities of such attacks. The central theme of our technique is based on automatically developing a model...
Parametric properties provide an effective and natural means to describe object-oriented system behaviors, where the parameters are typed by classes and bound to object instances at runtime. Efficient monitoring of parametric properties, in spite of increasingly growing interest due to applications such as testing and security, imposes a highly non-trivial challenge on monitoring approaches due to...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.