The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of dementia patients has increased in recent years. The burden on caregivers has also increased. Nevertheless, no established treatment for dementia exists. Controlling dementia progression is an important goal of dementia treatment. The reminiscence method is one means of suppressing dementia progression. In the reminiscence method, a caregiver talks with a dementia patient. However, an...
We propose a model that adapts to CNN trained by non-rotated images even for rotated images by evaluating the feature map obtained from the convolution part of CNN. The additional network for rotation angle estimation is able to correct the rotation angle using the feature map in the MNIST data-set. It is possible to cope with the rotation without changing the original network by adding a network...
In email systems, one of the most widely used attacks is email spoofing, in which the source address of the email message is forged to make the recipient of the email believe that the email was sent from a legitimate source. Several research works have been presented in the past to address email spoofing attack. Further, in recent years, the technique of memory forensics has evolved significantly...
Static test compaction procedures that modify tests perform the modification so as to increase the number of faults that some of the tests detect, thus making other tests unnecessary. Tests that become unnecessary are removed from the test set without reducing the fault coverage. This paper describes a static test compaction procedure of this type for transition faults that has the following additional...
IDS(Intrusion Detection System) is widely used. However, IDS has a problem that it is difficult to manage its operation because of occurring a large number of alerts. As a general usage of IDS, it is known that a certain threshold value is set and only the alerts exceeding it are reported. Generally, the threshold values are determined based on the subjectivity of administrator. Therefore, we have...
Estimating collective state is an important component of many distributed systems, but has inherent challenges in balancing the availability of estimates against their accuracy. In this paper, we analyze the error bounds and dynamics of a commonly used family of self-stabilizing state estimation algorithms based on spanning trees. We find that in the worst case transients can duplicate values leading...
With the high-speed railway put into operation, the types of trains in the existed line is reduced, train intervals will also be shortened. We analyze the impact of high-speed rail's operations on the basis of the calculation method of the interval passing capacity in existed line, for example in three major areas : the difference of train running time in the section, the proportion of trains dispatched...
Crowd-based requirements engineering (CrowdRE) is promising to derive requirements by gathering and analyzing information from the crowd. Setting up CrowdRE in practice seems challenging, although first solutions to support CrowdRE exist. In this paper, we report on a German software company's experience on crowd involvement by using feedback communication channels and a monitoring solution for user-event...
Feedback communication channels allow end-users to express their needs, which can be considered in software development and evolution. Although feedback gathering and analysis have been identified as an important topic and several researchers have started their investigation, information is scarce on how software companies currently elicit end-user feedback. In this study, we explore the experiences...
This paper addresses a fundamental dilemma in the design of self-governing socio-technical systems which allow potentially unrestricted self-modification of a set of conventional rules. On one hand, the system must be sufficiently unrestricted (resilient, flexible), to enable a group of people with a shared set of congruent values to achieve their joint purpose(s) in collective actions situations...
The requirements elicitation process often starts with an interview between a customer and a requirements analyst. During these interviews, ambiguities in the dialogic discourse may reveal the presence of tacit knowledge that needs to be made explicit. It is therefore important to understand the nature of ambiguities in interviews and to provide analysts with cognitive tools to identify and alleviate...
Interconnected stream processing components of distributed compute topologies suffer from a variety of problems on shared-nothing clusters. A wide array of issues remain hard to identify on the underlying data processing systems due to the irregular characteristics of incoming data. Moreover, bottlenecks and data anomalies propagate unexpectedly through system boundaries. Developers and system administrators...
Keeping requirements and acceptance test documents aligned and up-to-date plays an important role in the success of software projects. In practice, these documents are not always aligned with each other, nor with the actual system behavior. A previous study showed that even when requirements are updated, acceptance tests might stay outdated, which often leads to quality problems and unintended costs...
In this paper we propose CAStlE, a MDE approach to enhance Collective Adaptive System (CAS) specification. In particular, we introduce a domain-specific language (DSL) made-up of three main views: one devoted to adaptive systems design; one addressing ensembles definition; and one tackling the collective adaptation. These three separate aspects are woven seamlessly by the DSL to constitute a complete...
Using research-based teaching-learning methodologies in Computer Science programs is a challenge. Achieving the balance between the required technical knowledge and scientific rigor in young professionals is difficult in the University. The goal of this paper is to help baccalaureate level teachers and students employ a research-based teaching-learning methodology through the introduction of research...
In this paper, a novel approach to identifying superpixels in the cluttered environment is proposed. In our proposed method, the temporal cue and depth maps obtained from depth sensors are combined with the popular method SLIC for superpixels using a new formulation of distance-minimizing clustering. Under cluttered environment, this proposed method can, compared with color-based approaches, better...
Millions of surveillance cameras operate at 24×7 generating huge amount of visual data for processing. However, retrieval of important activities from such a large data can be time consuming. Thus, researchers are working on finding solutions to present hours of visual data in a compressed, but meaningful way. Video synopsis is one of the ways to represent activities using relatively shorter duration...
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.