The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Graphs or networks are a natural way to analyze inter-related set of entities. When these entities are associated with a diverse number of features, each denoting a specific perspective, then the representation can be simplified by forming a network of layers (one for each feature) or multiplexes. Vertices with high centrality values in the multiplexes represent the most influential vertices. However,...
We present the results of an experiment to assess the validity of prior polarities available in sentiment lexicons. We designed a ranking task that was elicited through pairwise comparisons and compared the results to those predicted by two popular sentiment lexicons. We find that the experiment results show a moderate level of agreement between the lexicons and human judgments.
Due to the increasing popularity of cooking-recipe sharing sites and the success of complex network science, attention has recently been devoted to developing an effective networkbased method of analyzing the characteristics of ingredient combinations used in recipes. Unlike previous approaches dealing with static properties, we aim at analyzing the dynamical changes in ingredient pairs jointly used...
The deployment of modular virtual network functions (VNFs) in software defined infrastructures (SDI) enables cloud and network providers to deploy integrated network services across different resource domains. It leads to a large interleaving between network configuration through software defined network controllers and VNF deployment within this network. Most of the configuration management tools...
Network clustering is an essential approach to finding latent clusters in real-world networks. As the scale of real-world networks becomes increasingly larger, the existing network clustering algorithms fail to discover meaningful clusters efficiently. In this paper, we propose a framework called AnySCAN, which applies anytime theory to the structural clustering algorithm for networks (SCAN). Moreover,...
Prioritizing genes according to their association with a disease allows researchers to explore genes in more informed ways. Although some useful algorithms have been developed, they are based on single gene importance, gene interaction networks, or gene modules with little consideration of relative gene importance in the context of modules. In this paper, we propose to prioritize genes considering...
Our research group at Nagoya Institute of Technology is developing “MMDAgent” as a voice interaction toolkit. Using MMDAgent, system developers can create various speech dialogue contents. When developers create voice interaction contents, it is important to consider user needs. Therefore, an approach is necessary to elicit preference information of the user. In this paper, we propose a method to...
In this study, improved antlion optimization algo-rithm (IALO) is presented. The antlion optimization algorithm (ALO) is an heuristic optimization algorithm based on modeling random walks of ants and hunting ants by antlions. The random walk model of ALO and the IALO revealed by improvements in the selection method have been tested with benchmark functions with different characteristics from the literature...
More email is opened on mobile devices today than on other platforms [1]. At the same time, enterprises are constantly investing in approaches to improve employee productivity. In this paper, we consider the problem of automated information suggestions to assist in reply construction. The basic premise of the work is that a significant portion of the information content of a reply is likely to be...
Content-Centric Networking (CCN) is a recently proposed Internet paradigm that focuses on scalable, secure and efficient content distribution. The main abstraction is named and addressable content. A consumer requests desired named content by generating a so-called interest, which is then routed by the network towards an in-network cached copy, or the authoritative producer, of that content. Since...
Live performances are increasingly appreciated using popular commercial audiovisual transmission systems, such as live viewing systems. A reality enhancement method for live viewing had been proposed. This paper describes an applause sound extraction method for automation of applause sound transmission and a simulation experiment using the sound source recorded live at the venue to assess the applause...
This paper presents a recursive oblique projector using the Gram-Schmidt process. The recursive construction of oblique projectors allows a receiver to prevail interference and noise environment in direct-sequence code-division multiple-access (DS/CDMA) system. When the number of the interfering users in the system increases or decreases, the oblique projector is recursively updated by the proposed...
In this work, we examine an access scope, a concept in authorization management broadly applied for the specification of access constraints in web service integrations. By analyzing a typical use-case of cross-organizational cloud service automation, we show the suboptimal capabilities of static, coarse-grained and inflexible scopes that negatively impact security and management of service integrations...
We investigate the problem of computing Completely Independent Spanning Trees (CIST) under a practical approach. We aim to show that despite CISTs are very challenging to exhibit in some networks, they present a real interest in ad-hoc networks and can be computed to enhance the network robustness. We propose an original ILP formulation for CISTs and we show through simulation results on representative...
This paper describes a novel initiative whose main goal is not only to encourage young students to pursue careers in science, technology, engineering, and mathematics (STEM); Although this is typically seen as the core of any STEM project, we aim at involving local administrations in the project, thus allowing to more easily disseminate and promote STEM areas among students' families and teachers...
It is well accepted that we learn hard lessons when implementing and re-evaluating systems, yet it is also acknowledged that science faces a crisis in reproducibility. Experimental computer science is far from immune, although it should be easier for CS than other sciences, given the emphasis on experimental artifacts, such as source code, data sets, workflows, parameters, etc. The data management...
Similarity-based recommender systems can be used to pre-compute distance between item pairs, and then to quickly recommend similar items to users. The content-based approach to similarity uses the item's description, which in movies could mean genre, director or cast. These similarity methods are often built with unsupervised learning, which means the notion of similarity is defined by those who write...
A new hybrid preference framework of the Graph Model for Conflict Resolution (GMCR) is proposed to facilitate modeling and analysis of conflicts involving two decision makers (DMs) with fuzzy levels of preference. The new preference structure, a hybrid of models of three-level strength of preference and fuzzy preference, provides a more flexible technique to express DMs' relative preferences among...
The purpose of this paper is to describe a special session intended to help instructors better understand the difference between fixed versus growth mindset and how instructional approaches can implicitly or explicitly promote one or the other. Originating with Carol Dweck, individuals with a fixed mindset believe that a specific ability or intelligence is innate and fixed. In contrast, individuals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.