The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Representation learning algorithm in medical area maps high dimensional real world medical concepts to low dimensional vector space, encodes rich medical knowledge, and has brought improvement to various machine learning applications in medical area. However, previous representation learning models in medical area failed to consider the multi-sense characteristic of medical concept. Moreover, the...
This paper presents a system architecture that designs a querying refinement method. The method employs the general principles of facet analysis in a particular paradigm, as well as the notion of ‘focus’, which is a sort of context for a user query. The method provides the user with contextual information about the query, which is computed by using the user documents provided that the documents are...
Context: Code smells are symptoms in the source code that represent poor design choices. Professional developers often perceive several types of code smells as indicators of actual design problems. However, the identification of code smells involves multiple steps that are subjective in nature, requiring the engagement of humans. Human factors are likely to play a key role in the precise identification...
This project develops a Big Data table that allows researchers to query across and among multiple data sources integrated by location. The big table created in this way uses location as the fundamental linkage between data sets. This is the power of geospatial analysis and forms the foundation for the development and interaction with the Health Context Table. The approach utilizes a dense point file...
This paper evaluates the efficiency and performance impact of a dual-core lockstep as a method for fault-tolerance running on top of FreeRTOS applications. The method was implemented on a dual-core ARM Cortez-A9 processor embedded into the Zynq-7000 APSoC. Fault injection experiments show that the method can mitigate up to 63% on the FreeRTOS applications. This result is very near to the mitigation...
The software-defined networking (SDN) paradigm promises greater control and understanding of enterprise network activities, particularly for management applications that need awareness of network-wide behavior. However, the current focus on switch-based SDNs raises concerns about data-plane scalability, especially when using fine-grained flows. Further, these switch-centric approaches lack visibility...
Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking...
Software Transactional Memory (STM) allows encapsulating shared-data accesses within transactions, executed with atomicity and isolation guarantees. The assessment of the consistency of a running transaction is performed by the STM layer at specific points of its execution, such as when a read or write access to a shared object occurs, or upon a commit attempt. However, performance and energy efficiency...
Bugs cannot always be avoided and can have various consequences on the reliability of softwares. Techniques for finding and undestanding bugs are therefore needed for developers to be able to fix them. Existing techniques for finding and getting insight on bugs have limitations. Static analysis cannot detect every bugs, Interactive Debugging can be tedious, Runtime Verification usually does not have...
A kernel or mini-app is a self-contained small application that retains certain characteristics of the original application [7]. Working on a kernel or mini-app in the place of the original application can dramatically reduce the resources and effort required for performing software tasks such as performance optimization and porting to new platforms. However, using kernel as a proxy is based on the...
Choosing how to write natural language scenarios is challenging, because stakeholders may over-generalize their descriptions or overlook or be unaware of alternate scenarios. In security, for example, this can result in weak security constraints that are too general, or missing constraints. Another challenge is that analysts are unclear on where to stop generating new scenarios. In this paper, we...
Goal models help elicit, specify, analyze, and validate requirements as they capture hierarchical representations of system requirements, possible solutions, stakeholder objectives, and their relationships. In the early requirements phase, goal models aid requirements engineers in understanding the goals of stakeholders and exploring solution alternatives based on their impact on these goals. Despite...
Context-aware applications adapt their behavior based on collected contexts. However, contexts can be inaccurate due to sensing noise, which might cause applications to misbehave. One promising approach is to check contexts against consistency constraints at runtime, so as to detect context inconsistencies for applications and resolve them in time. The checking is typically immediate upon each collected...
CH-AVATAR is a context-aware platform for tourists and visitors of Cultural Heritage sites. Cultural Heritage objects (CH objects) become “alive” within the platform. They tell their stories and interact with tourists. The platform employs BLE beacons and the visitor's smartphone or tablet to create an interactive and adaptive Cultural Heritage experience for its end users. The paper makes a generic...
The success of breakthrough projects and programs depends on two groups of factors: (i) the competence of organisations in managing of this projects and programs; (ii) "Entrepreneurial spirit (energy)" that is formed by the leadership of the organisation successful completion of the breakthrough projects. The success of the breakthrough project, as a management category, has contradictions...
Modern semiconductor chips offer a FPGA, A Hard Microcontroller and a programmable Analog circuitry all integrated on a single chip, which gives the system designer a full featured, easy-to-use design and development platform where all the units are programmable and under full control of the designer, Combining this state of the art silicon chip with a Real Time Operating Systems (RTOS) gives an Engineer...
Word2Vec is a popular set of machine learning algorithms that use a neural network to generate dense vector representations of words. These vectors have proven to be useful in a variety of machine learning tasks. In this work, we propose new methods to increase the speed of the Word2Vec skip gram with hierarchical softmax architecture on multi-core shared memory CPU systems, and on modern NVIDIA GPUs...
This article describes approaches to building a set of nodes and blocks that are sufficient to create the matching processor for the parallel dataflow computing system. Investigations of various sets of nodes and blocks of the matching processor have been carried out. As a result, some regularities were revealed characteristic for hardware-software solutions that implement the dataflow computing model...
With the advent of the era of pervasive computing, human dependence on sensors is growing. Such sensor-aware contexts usually possess the characteristics of large-magnitude and uncertainty, so networked devices or systems driven by these contexts cannot get distinct and precise related context information yet, and then lead unable to provide users with satisfied desirable services. In order to solve...
It is known that the representation and utilization of real-world dynamic knowledge are increasingly important to open and dynamic computing environments, but traditional semantic web ontology and current existing context-aware systems are still unsuitable to process real-world dynamic knowledge. To solve this problem, by virtue of the advantage of Pragmatic Web in dynamic knowledge expressing and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.