Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The exploration of a data set consists in grouping similar data. The classical statistical methods often fail when there is is no minimal assumption on the clusters. Our approach is based on the links between data, but the pairwise comparison between data and the importance of the links depend heavily on context where data lies. We propose to analyze a dataset through methods of the social choice...
This paper addresses the image retrieval problem of finding images in a large dataset that contain similar scenes or objects to a given query image. Often, this task is performed with the popular Bag-of-Words (BoW)-Model which quantizes local features such as SIFT for speeding up the retrieval by using an inverted file indexing scheme. We focus on the limits of the model for very large-scale datasets...
The assessment of travel time reliability for segments and routes is a rapidly advancing frontier. The increasing availability of probe data is making it possible to monitor reliability in real-time based on individual vehicle data as opposed to ex-post-facto based on averages. This paper examines metrics that can be used to monitor reliability based on probe data. The merits of traditional metrics...
Serious games are becoming an increasingly used alternative in technical/professional/academic fields. However, scenario development poses a challenging problem since it is an expensive task, only devoted to computer specialists (game developers, programmers…). The ultimate goal of our work is to propose a new scenario-building approach capable of ensuring a high degree of deployment and reusability...
Itinerary planning is consequential process and time consuming process for travelling agencies which need to be done conscientiously to gratify the user requisites. The satisfaction level of users can be incremented by getting the itinerary in the customized manner by amassing the details from the users itself. There will be more encumbrance of processing the huge search space will occur where the...
Several popular period estimation techniques use union-of-subspaces models to represent periodic signals. The main idea behind these techniques is to compare the components of the signal along a set of subspaces representing different periods. Such techniques were shown to offer important advantages over traditional methods, such as those based on DFT. So far, most of these subspace techniques have...
Frama-C is an extensible modular framework for analysis of C programs that offers different analyzers in the form of collaborating plugins. Currently, Frama-C does not support the proof of functional properties of concurrent code. We present Conc2Seq, a new code transformation based tool realized as a Frama-C plugin and dedicated to the verification of concurrent C programs. Assuming the program under...
Economic losses in the power transformer parks are a consequence of a careless administration of assets. In this work, the parameters considered during the power transformer risk evaluation are presented. Asset management involves a deep analysis and strategies to prevent major failures or malfunctions. A comparison of the procedures to asses risk index of the power transformers is presented. At the...
This paper proposes a topic model-based recommendation system that predicts a user's rating score of a searched media unit for media re-creation service. The purpose of the proposed recommender is to perform a context-aware recommendation of suitable media units for a user's purpose and context. For this purpose, it uses a topic vector based on the metadata of the media to compare the similarity of...
Recommender agents are widely used in online markets, social networks and search engines. The recent online news recommendation systems such as Google News and Yahoo! News produce real-time decisions for ranking and displaying highlighted stories from massive news and users access per day. The more relevant highlighted items are suggested to users, the more interesting and better feedback from users...
Nowadays, the ubiquity of mobile devices (such as smartphones and tablets) has encouraged the development of context-aware and personalized computation to filter the query results and provide recommendations based on different situations of a user. On the other hand, global positioning system (GPS) technology along with microelectromechanical system (MEMS) sensors enables location sensing on mobile...
When using Information Retrieval (IR) systems, users often present search queries made of ad-hoc keywords. It is then up to the information retrieval systems (IRS) to obtain a precise representation of the user's information need and the context (preferences) of the information. To address this problem, we investigate optimization of IRS to individual information needs in order of relevance. The goal...
Authors of malicious software, or malware, have a plethora of options when deciding how to protect their code from network defenders and malware analysts. For many static analyses, malware authors do not even need sophisticated obfuscation techniques to bypass detection, simply compiling with different flags or with a different compiler will suffice. We propose a new static analysis called CARDINAL...
In the context of swift development of P2P e-commerce, it is critical to defending both customers and sellers from being victimized by probable deception stemming from uncertainties, vagueness and ambiguities that characterize the interactions amongst unfamiliar dealers. Accordingly, credit standing concerning each business partaker plays a decisive part in preventing fraud in P2P transactions and...
Code smells are symptoms of poor design and implementation choices. Previous studies empirically assessed the impact of smells on code quality and clearly indicate their negative impact on maintainability, including a higher bug-proneness of components affected by code smells. In this paper we capture previous findings on bug-proneness to build a specialized bug prediction model for smelly classes...
This paper presents a novel version of ExATO, a term extractor originally designed to extract relevant terms from corpora in Portuguese. In this new version not only corpora in Portuguese can be handled, but also texts in English are accepted. This extension is likely to offer the same quality pattern already achieved for Portuguese. In this paper, we draw the analysis of results in parallel corpora...
Specific requirements and characteristics of primary storage make designing desirable deduplication schemes a sophisticated task. In this paper, we propose DIODE, a Dynamic Inline-Offline DEduplication scheme that provides salient read/write performance and space-saving simultaneously for primary storage systems. DIODE orchestrates inline and offline processes in a dynamic manner. We propose two innovative...
The adoption of Integrated Modular Avionics (IMA) architecture is a technological trend in the avionics industry due to its capability of supporting space and temporal partitioning, which is mandatory for systems with mixed criticality. However, combining partition allocation and schedule design for applications sharing hardware, software, and communication resources of the same computing platform...
We address input design for piecewise affine systems so as to satisfy a reachability specification, and, simultaneously, detect the inputs that are actually relevant (influential inputs). This can be useful for system verification, when one has to check if some undesired/unsafe behavior coded via a reachability specification can actually occur and then possibly take appropriate corrective actions...
In hardware video encoders, the throughput of the entropy coding stage can limit the support of high-quality and high-resolution videos. This paper presents an FPGA-oriented optimization method which increases the clock frequency of the probability modeling stage of the multi-symbol Context Adaptive Binary Arithmetic Coder (CABAC). The method leverages the unary code to represent probability states...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.