The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Account sharing is a significant problem for online recommender systems to generate accurate personalized recommendations. To solve this problem, one not only has to identify whether an account is shared, but also needs to recognize the different users sharing that account. However, to generate relevant, personalized recommendations, the particular user under a shared account has to be correctly identified...
It remains unclear when it is the right time to introduce software quality into the computing curriculum. Introductory students often cannot afford to also worry about software quality, while advanced students may have been groomed into undisciplined development practices already. To answer these questions satisfactorily, educators need strong quantitative evidence about the pervasiveness of software...
Given the soaring amount of data being generated daily, graph mining tasks are becoming increasingly challenging, leading to tremendous demand for summarization techniques. Feature selection is a representative approach that simplifies a dataset by choosing features that are relevant to a specific task, such as classification, prediction, and anomaly detection. Although it can be viewed as a way to...
Due to shortened product innovation cycles, high variant products, demand fluctuation, equipment life cycles, and technology life cycles, regular changes in manufacturing systems are necessary. As elements of a factory are connected via a complex network of relations and flows, single changes can have an impact on the entire manufacturing system. In order to enable a successful change management,...
Earlier research has identified network analysis techniques, methods, and models used to analyze structural aspects of an enterprise architecture (EA) modeled as a network or graph. However, there is still no common set of conceptual elements for such research that could allow one to identify the information requirements needed to perform this type of analysis. In the present research, we organize...
Paper presents some specific technics developed to improve the modeling of Multiunit Probabilistic Safety Analyses (MUPSA) level 1. PSA has the goal to calculate risk metrics, as for instance Core Damage Frequency (CDF) for the reactor core. On the other side, extended targets for PSA, by considering more hazards at a time and effect of those on more than one nuclear reactors at a site, make the evaluation...
When using formal verification on critical software, an important question involves whether we have we specified enough properties for a given implementation model. To address this question, coverage metrics for property-based formal verification have been proposed. Existing metrics are usually based on mutation, where the implementation model is repeatedly modified and re-analyzed to determine whether...
This paper presents a DC/AC compact model for double-gate (DG) tunnel field-effect transistors (TFET) which is based on a unified analytical modeling framework. The closed-form model shows a good agreement with both, TCAD simulations and measurements on test structures. A Verilog-A implementation allows for a quick performance evaluation of the DC performance of logic cells. Results of a complementary...
Machine learning has become one of the go-to methods for solving problems in the field of networking. This development is driven by data availability in large-scale networks and the commodification of machine learning frameworks. While this makes it easier for researchers to implement and deploy machine learning solutions on networks quickly, there are a number of vital factors to account for when...
Based on the perspective of ensuring business continuity through communication and cooperation between the members, the vulnerability of facility management organization under the interference of emergency was studied. The model and simulation of organization network of facility management based on knowing, emotion, consulting and collaboration relationship was put forward. With the case study, there...
Reducing carbon dioxide emissions is an important issue for the environment. The amine-based carbon capture system is a complex system with high energy consumption, and the system needs to be operated flexibly in a wide range. Therefore, advanced control technology is required and an appropriate model is a necessary condition for controller design. To this end, this paper investigates the nonlinearity...
The performance model of an application can provide understanding about its runtime behavior on particular hardware. Such information can be analyzed by developers for performance tuning. However, model building and analyzing is frequently ignored during software development until performance problems arise because they require significant expertise and can involve many time-consuming application...
Self-organization and adaptability are critical properties of complex adaptive systems (CAS), and their analysis provides insight into the design of these systems, consequently leading to real-world advancements. However, these properties are difficult to analyze in real-world scenarios due to performance constraints, metric design, and limitations in existing modeling tools. Several metrics have...
Software Quality model is a well-accepted way for assessing high-level quality characteristics (e.g., maintainability) by aggregation from low-level metrics. Aggregation method in a software quality model denotes how to aggregate low-level metrics to high-level quality characteristics. Most of the existing quality models adopt the weighted linear aggregation method. The main drawback of weighted linear...
Effort-aware just-in-time (JIT) defect prediction aims at finding more defective software changes with limited code inspection cost. Traditionally, supervised models have been used; however, they require sufficient labelled training data, which is difficult to obtain, especially for new projects. Recently, Yang et al. proposed an unsupervised model (LT) and applied it to projects with rich historical...
Complex networks have become a large area of study due to their pervasiveness in today's society and our dependence on them. While network science enables engineers and scientists to improve resilience of networks, due to lack of realistic data, simplistic assumptions may result in incorrect conclusions. Network service providers optimize their designs and plan for future capacities based on realistic...
Wireless communication networks are very crucial for any operations of all sectors of modern society such as commercial mobile communication or military communication. High-altitude electromagnetic pulse (HEMP) leads severe threats to the survivability and robustness of communication network. Due to the high complexity and hard proven properties of large-scale networks, network-level HEMP effect evaluation...
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and...
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.