Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The U.S. Department of Energy (DOE) Office of Science (SC) operates approximately four dozen large-scale science user facilities (SUFs), each of which generates a tremendous amount of scientific data from experiments, observations and computations. To better understand the data needs and challenges, DOE has run many workshops in recent years to identify and articulate data-centric challenges and opportunities...
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation,...
Information-centric networking (ICN), a strong candidate for future internet architecture, consists of two kinds of packets, interest and data packets, both of which carry the name of data content to be requested (or delivered). The data packet is associated with a public key signature so that the data receiver can verify the data packet's correctness, integrity and provenance. Certificate-based signature...
This paper presents a recursive oblique projector using the Gram-Schmidt process. The recursive construction of oblique projectors allows a receiver to prevail interference and noise environment in direct-sequence code-division multiple-access (DS/CDMA) system. When the number of the interfering users in the system increases or decreases, the oblique projector is recursively updated by the proposed...
The paper addresses a fast implementation algorithm about distributed fusion with CPHD filter. An implementation method of distributed fusion based on maximum probability association (MPA), called MPA-DF, is presented. Though the performance of MPA-DF is a little worse than traditional Generalization Covariance Intersection (GCI) distributed fusion method, called GCI-DF, the former needs lower computational...
The efficient siphon computation is the key to the development of siphon-based deadlock control strategies with good performance. This work studies the computation of minimal siphons in a class of Petri nets called S4PR. Firstly, we propose a function with polynomial complexity to determine whether a resource subset can generate a minimal siphon. Next, using the technique of problem partitioning,...
Grasshopper is an Android application which teaches users JavaScript through a series of coding puzzles. Grasshopper is able to make two types of real-time decisions based on the user's current performance: selecting an appropriate piece of feedback when the student is in the middle of solving a puzzle; and selecting the most appropriate next puzzle when the student is done with the current puzzle...
Research into computational jigsaw puzzle solving, an emerging theoretical problem with numerous applications, has focused in recent years on puzzles that constitute square pieces only. In this paper we wish to extend the scientific scope of appearance-based puzzle solving and consider ’’brick wall” jigsaw puzzles – rectangular pieces who may have different sizes, and could be placed next to each...
Considering the factors of environmental adaptability, laying cost and system complexity, the signal fingerprint positioning based on RFID systems has become a better choice of the positioning technology. Online and offline signal matching technology is very important stage for the signal fingerprint positioning. In this paper, we propose a signal matching algorithm in order to further improve the...
The organizational environment is defined by a complex and dynamic interaction of elements that act together to achieve goals. Organizational modeling helps stakeholders to better understand this complexity and analyze details in order to help the identification of changes that are necessary to keep the organization aligned with its strategic goals. However, it is still hard to map the many organizational...
Respecify is a new web-based requirements authoring tool using constrained natural language (CNL) to guide the authoring process and drive the creation of alternative views that elucidate the complexity of specifications, thus reducing the occurrence of certain types of requirements quality defects. This tool demo motivates Respecify's existence, its key features, and evaluates its current use in...
Next generation cellular networks (5G) have to deal with deployment of massive machine-type-communication (MTC) devices as the internet of things (IoT) becomes pervasive. To cater to such demand, 3GPP has finalized specifications for enhanced machine type communication (eMTC) and narrowband IoT (NB-IoT) as part of LTE Release 131. To avoid resource congestion to legacy users, eMTC communication can...
Visual Simultaneous Localization and Mapping (VSLAM) requires feature detection on visual data. In indoor scenes that include architectures such as plain walls and doors, there are no or less corners detected, in such cases tracking will be lost. To overcome this situation we track different types of features that help in feature extraction even in textureless scenes. Line features are used to get...
We present the Showdown AI Competition, a game-based AI competition built around a clone of the popular game Pokemon. This is a game of turn-based team battle, where the objective is to defeat an opponent team using clever combinations of creatures and their abilities. The gameplay is reminiscent of computer role-playing game battles and collectible card games. The game has characteristics, such as...
This paper presents a measure intended to quantify the relative strategic depth of games as experienced by human players. The measure is based on the complexity (number and specificity of rules) of a hierarchical knowledge base that is extracted from playtraces. As a proof-of-concept, we compute the proposed measure for three arcade-style games and compare the results to the strategic depth reportedly...
Modern board, card, and video games are challenging domains for AI research due to their complex game mechanics and large state and action spaces. For instance, in Hearthstone — a popular collectible card (CC) (video) game developed by Blizzard Entertainment — two players first construct their own card decks from over 1,000 different cards and then draw and play cards to cast spells, select weapons,...
The structural properties of services have a major role in achieving the SOA capabilities. It is important to validate the service design artifacts. Several metrics are proposed to quantify SOA service design. An enterprise has to focus on service design aspects to achieve the IT-based capabilities in the initial stages of SOA adoption. The existing SOA maturity models provide minimal guidance on...
Generalized frequency division multiplexing (GFDM) is proposed as a candidate waveform to tackle new challenges posed on the physical layer for the fifth generation of wireless communication systems. In this paper, we propose a highly efficient algorithm for GFDM data detection on the basis of orthogonal approximate message passing (OAMP). We further combine with the conjugate gradient method and...
Different from representation learning models using deep learning to project original feature space into lower density ones, we propose a feature space learning (FSL) model based on a semi-supervised clustering framework. There are three main contributions in our approach: (1) Inspired by Zipf's law and word bursts, the feature space learning processes not only select trusted unlabeled samples and...
Learning from examples, either alone or combined with problem solving has been proven to be beneficial for learning in Intelligent Tutoring System. However, it is generally unknown how much example-based assistance should be provided. We previously found that erroneous examples prepared students better for problem solving in comparison to worked examples when the order of learning activities is fixed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.