The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Technical Debt (TD) refers to the long-term consequences of shortcuts taken during different phases of software development life cycle. Lack of attention to monitoring and managing testing and development debt can contribute to unexpectedly large cost overruns and severe quality issues in software development projects. This paper describes a case study conducted with an industry partner to explore...
Context: Conducting a Grounded Theory study is rigorous, demanding, and challenging. Misperceptions exist within the software engineering community. Objective: The purpose of this paper is to describe one extended participant observation Grounded Theory study for aiding new empirical researchers wanting to run similar research studies. Method: Following Constructivist Grounded Theory, we conducted...
Episodic memory which can store and recall episodes has been modeled by various research. Those models focus on encoding and retrieving the same sequence of events of episodes. In this paper, we propose context preference-based deep adaptive resonance theory (CPD-ART). CPD-ART uses a new approach in encoding and retrieving a temporal sequence of events considering subjects, preference criteria such...
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based detection methods. We measure the success of this potential attack against Hotmail, Gmail and Yahoo mail. While the attack is bothersome both in terms of...
Context: Designing new architectures is a challenging task. A common and also effective approach for this task is to apply architectural design experience. Problem: If, however, architectural design experience is not available, two major problems arise: (i) how can we identify architecturally significant requirements (ASRs) and (ii) how can we identify architectural design decisions (ADDs) which address...
Demanding for efficient compression and storage of DNA sequences has been rising with the rapid growth of DNA sequencing technologies. Existing reference-based algorithms map all patterns to regions found in the reference sequence, which lead to redundancy of incomplete similarity. This paper proposes an efficient reference-based method for DNA sequence compression that integrates FM-index and complementary...
Software development has always inherently required multitasking: developers switch between coding, reviewing, testing, designing, and meeting with colleagues. The advent of software ecosystems like GitHub has enabled something new: the ability to easily switch between projects. Developers also have social incentives to contribute to many projects; prolific contributors gain social recognition and...
Segmentation is one of the most important low-level tasks in image processing as it enables many higher level computer vision tasks like object recognition and tracking. Segmentation can also be exploited for image compression using recent graph-based algorithms, provided that the corresponding contours can be represented efficiently. Transmission of borders is also key to distributed computer vision...
Recent MPEG video compression standards are still block-based: blocks of pixels are sequentially coded using spatial or temporal prediction schemes. For each block, a vector of coding parameters has to be selected. In order to limit the complexity of this decision, independence between blocks is assumed, and coding parameters are locally optimized to maximize the coding efficiency. Few studies have...
Graph-based models have recently attracted attention for their potential to enhance transform coding image compression thanks to their capability to efficiently represent discontinuities. Graph transform gets closer to the optimal KLT by using weights that represent inter-pixel correlations but the extra cost to provide such weights can overwhelm the gain, especially in the case of natural images...
The Internet of Things (IoT) connects smart objects so they can share information in a network to provide context-sensitive services. The amount of shared information will increase, likely dramatically, as more and more smart objects join the network and disseminate their contextual information. In this paper, we explain how smart IoT devices can share a large amount of context information using much...
This paper proposes a new class of grammar-based lossless source code. Grammar-based code is a class of universal data compression algorithm using a context-free grammar. A Semi-Chomsky Normal Form (semi-CNF) of context free grammar, which is a modified form of the context free grammar (CNF), is newly introduced. The proposed algorithm encodes a given sequence to a binary codeword in three step....
In this paper we define the average coding rate of a variable-to-fixed length (VF) lossless source code as the expectation of the pointwise coding rate, which is called average pointwise coding rate. It has been shown that the Tunstall code is asymptotically optimal under the criterion optimizing the average pointwise coding rate. In this paper, we propose a new VF code attaining optimal average pointwise...
Context: To be more flexible, companies call more and more for an independence between development tools and processes. To enable this form of decoupling we need to understand the interrelation of processes and development tools. However, knowledge about that field is rare.Goal: The goal of this study is to better understand how technologies in use might impact the processes and team interaction.Method:...
The PPM (Prediction by Partial Matching) methods are applied before the lossless compression algorithms, as a preprocessing procedure for the text in order to use efficiently the redundancy. This paper presents 4 compression algorithms preceded by 3 different PPM methods. The compression ratio is studied in relation with the file size, its content, and the context order (the prediction degree). Some...
Detecting spelling errors and correcting those errors automatically is a great research challenge. Developing a precise spell checker for Bangla language which detects spelling errors and provides suggestions for correcting those errors, is quite difficult because of the complex rules of Bangla spelling. In this paper, a clustering-based spell checking technique is proposed for Bangla language that...
In this paper, we propose an improved Elman neural network model which contains a new feedback mechanism composed of a special external feedback we proposed and inherent internal feedback. In order to guarantee the generalization ability of the established model, we adopt Genetic Algorithm to optimize initial connection weights and number of hidden layer nodes at the same time. This kind of improved...
This paper reports value creation stories from an assessment of ten years in the life of an online masters program. The program is a hybrid particular discipline masters program delivered 20% face-to-face and 80% online. The program achieved a high degree of success, with a course completion rate of 93% and a graduation rate of 84%. The program is based in a community of practice model (CoP) and the...
Bag of visual words (BoVW) remains a very competitive representation in the domain of scene classification. In this framework, extracting SIFT descriptors on a dense grid of pixels has shown to lead to a better performance. However, due to the nature of SIFT as an edge-based descriptor, computing SIFT on homogeneous regions might result in non-stable region descriptors. The suggested solution in the...
Traditional Braille is a 6-dot code that can represent maximum 64 unique symbols with each braille cell. This is grossly insufficient to represent even ordinary English text (comprising 26 small letters, 26 capital letters, 10 digits, and 14 basic punctuations) — let alone math and science symbols. Thus a braille user has to enter 2 (and sometime 3 or 4) braille cells to enter one character or symbol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.