The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The sparse matrix is a key data structure in various domains such as high-performance computing, machine learning, and graph analytics. To maximize performance of sparse matrix operations, it is especially important to optimize across the operations and not just within individual operations. While a straightforward per-operation mapping to library routines misses optimization opportunities, manually...
This work explores the Internet of Cultural Things (IoCT) and applications in the context of smart cities and learning cities. Ambient culture is advanced as an emergent form of the IoCT and applications in the context of 21st century everyday interactions in urban spaces. The constructs of awareness, learning, openness, and engagement enable formulation and operationalization of a framework for ambient...
With millions of users worldwide, online dating platforms strive to assert themselves as powerful tools to find dates and form romantic relationships. However, significant differences exist in male and female use of this mate-matching technology with respect to motivation, preferences, self-presentation, interaction and outcomes. While existing research has routinely reported on gender differences...
One of the problems in the computer security system is port scanning attack. There are several detection systems have been developed to find out the occurrence of port scanning attack, one of them is anomaly detection method. A mechanism on how to implement the detection process in a more simple and effective way is a real serious challenge. In this paper, we design a simple implementation of anomaly...
Recommender system has been demonstrated as one of the most useful tools to assist users' decision makings. Several recommendation algorithms have been developed and implemented by both commercial and open-source recommendation libraries. Context-aware recommender system (CARS) emerged as a novel research direction during the past decade and many contextual recommendation algorithms have been proposed...
Recent evolutions that identify the people's genders automatically and smartly are significantly developing. In many applications of video monitoring, control systems and smart communication systems need to identify people's gender. Identification based on the walking pattern in the video images has been interesting for scientists. This topic can be categorized in two general groups: appearance based...
Programming support for multi-threaded applications on embedded microcontroller platforms has attracted a considerable amount of research attention in the recent years. This paper is focused on this problem, and presents <monospace>UnStacked C</monospace>, a source-to-source transformation that can translate multithreaded programs written in C into stackless continuations. The transformation...
The U.S. Department of Education (DoE) asserts that one way to improve student achievement is to consider competency-based learning. The DoE describes competency-based learning as “a structure that creates flexibility, allows students to progress as they demonstrate mastery of academic content, regardless of time, place, or pace of learning.” Competency-based learning focuses on outcomes and skill-sets...
Students frequently spend too little time understanding the problem in their design projects and jump to solutions without considering alternatives. This leads to inefficient use of time and suboptimal results in the final design. Instead of re-inventing the wheel, students need to explore and understand the work of others applied to similar situations, using strong information gathering, application,...
The number of networked “smart devices” available in everyday environments is rapidly increasing; however, most adopt mutually incompatible networks, protocols, and application programming interfaces. In previous work, we introduced a variety of adaptive middleware techniques that enables a user's commodity mobile device (e.g., a smartphone) to serve as an adaptive gateway between mutually incompatible...
In this paper, we propose a novel recognition method for fuzzy Oracle-bone inscriptions. Accurate recognition of fuzzy characters is a difficult problem due to their complex shapes. Our strategy is proposed based on statistical analysis of context and method of combining the Hopfield network. First, according to the oracle inscriptions context statistics information, a candidate font library for the...
Hybrid Diversity-aware Collective Adaptive Systems (HDA-CAS) is a new generation of socio-technical systems where both humans and machine peers complement each other and operate collectively to achieve their goals. These systems are characterized by the fundamental properties of hybridity and collectiveness, hiding from users the complexities associated with managing the collaboration and coordination...
A number of techniques have been developed that support method call completion. However, there has been little research on the problem of method parameter completion. In this paper, we first present a study that helps us to understand how developers complete method parameters. Based on our observations, we developed a recommendation technique, called Parc, that collects parameter usage context using...
Reuse is essential in modern software engineering, but limited in the context of MDE by the poor availability of reusable models. On the other hand, reusable code artifacts such as frameworks and libraries are abundant. This paper presents an approach to raise reusable code artifacts to the modelling level by modelling their API using concern-oriented techniques, thus enabling their use in the context...
Graphical User Interfaces (GUI) play an essential role in operating industrial facilities and machines. Depending on the range and variability of a manufacturer's product portfolio a huge library of GUI software may exist. This poses quite a challenge when it comes to testing or re-engineering. Static analysis helps to unveil valuable, inherent knowledge and prepare it for further analysis and processing...
As scientific discovery becomes increasingly data-driven, software platforms are needed to efficiently organize and disseminate data from disparate sources. This is certainly the case in the field of materials science. For example, Materials Project has generated computational data on over 60,000 chemical compounds and has made that data available through a web portal and REST interface. However,...
Use-cases are a well-known technique for capturing functional requirements. Their advantage is the understand ability for a wide range of stakeholders. With a growing number of use-cases and their continuous refactoring, inconsistencies inevitably sneak in. This problem has been targeted in the Formal Verification of Annotated Textual Use-Cases (FOAM) tool that runs lightweight formal verification...
The Grid and Cloud User Support Environment (gUSE) enables users convenient and easy access to grid and cloud infrastructures by providing a general purpose, workflow-oriented graphical user interface to create and run workflows on various Distributed Computing Infrastructures (DCIs). Its arrangements for creating and modifying existing workflows are, however, non-intuitive and cumbersome due to the...
The VERCE project has pioneered an e-Infrastructure to support researchers using established simulation codes on high-performance computers in conjunction with multiple sources of observational data. This is accessed and organised via the VERCE science gateway that makes it convenient for seismologists to use these resources from any location via the Internet. Their data handling is made flexible...
We consider security threats in software installation processes, posed by transitively trusted dependencies between packages from distinct repositories. To analyse them, we present SecureNDC, a Coq implemented calculus using an explicit trust function to bridge repository access and software package installation rights. Thereby, we resolve a version of the minimum install problem under trust conditions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.