The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper explores freehand physical interaction in egocentric Mixed Reality by performing a usability study on the use of hand posture estimation sensors. We report on precision, interactivity and usability metrics in a task-based user study, exploring the importance of additional visual cues when interacting. A total of 750 interactions were recorded from 30 participants performing 5 different...
Segment Routing (SR) can be used as a traffic engineering strategy to counteract increasing loads on networks like Internet Service Provider (ISP) backbones. Many SR approaches, however, optimize traffic flows that were measured in the past. This paper introduces a new tunnel training architecture. It aims to show that the results of these strategies can still be beneficial for routing new traffic...
The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially susceptible to denial-of-service (DoS) attacks. Due to the wireless communication medium, it is difficult to prevent attacks such as jamming. Hence, mechanisms to detect attacks during operation are required. The current generation of intrusion detection systems are still rather heavyweight, as some form...
Memory leaks are one of the primary causes of software aging. Despite of recent countermeasures in C/C++ such as smart pointers, leak-related defects remain a troublesome issue in C/C++ code, especially in legacy applications.We propose an approach for automatic detection of memory leaks in C/C++ programs based on characterizing memory allocation sites via the age distribution of the non-disposed...
Face verification approaches aim at determining whether two given faces are from the same person. This scenario has several applications, such as information security, forensics, surveillance and smart cards. Several works extract features independently from each face image, i.e., any sort of relation between the two faces is not modeled a priori to either training or classification stages. In this...
A thermal image is obtained by a camera that is sensitive to the thermal variation of the environment. This sensitivity in most cases affects the quality of the image obtained. Therefore, it is very important to improve the quality of thermal images in terms of contrast and details. There are different contrast enhancement techniques which introduce minor distortions, preserving the proper brightness...
Semantic similarity of texts is one of the important areas of Natural Language Processing, and there are several approaches to measure similarity: statistical, WordNet based, and hybrid. For all of these approaches, a lexical knowledge is used such as corpus or semantic network. WordNet is one of the most preferred and mature lexical knowledge base. In this study, we have focused on measuring semantic...
Due to shortened product innovation cycles, high variant products, demand fluctuation, equipment life cycles, and technology life cycles, regular changes in manufacturing systems are necessary. As elements of a factory are connected via a complex network of relations and flows, single changes can have an impact on the entire manufacturing system. In order to enable a successful change management,...
Some companies are willing to execute their business processes (BP) in the cloud for enjoying its benefits. However, they are also reluctant because of the new security risks that using cloud resources introduces. Security risk includes many dimensions, but this work focus on preserving the privacy of the logic of a BP deployed in a multi-cloud context by preventing a coalition of malicious clouds...
Mobile phones equipped with a monocular camera and an inertial measurement unit (IMU) are ideal platforms for augmented reality (AR) applications, but the lack of direct metric distance measurement and the existence of aggressive motions pose significant challenges on the localization of the AR device. In this work, we propose a tightly-coupled, optimization-based, monocular visual-inertial state...
Relevance plays a key role in determining how ranking features are weighed in rank algorithms. In particular, the Search Engine Result Page (SERP) presents documents from the algorithmic relevance perspective. User relevance, however, is situational and describes the searcher's perception of the contextual document which is interpreted at rank time. Therefore, without it the monotonic decreasing click...
More email is opened on mobile devices today than on other platforms [1]. At the same time, enterprises are constantly investing in approaches to improve employee productivity. In this paper, we consider the problem of automated information suggestions to assist in reply construction. The basic premise of the work is that a significant portion of the information content of a reply is likely to be...
In the last two decades, a great amount of effort has been put in researching automated debugging techniques to support developers in the debugging process. However, in a widely cited user study published in 2011, Parnin and Orso found that research in automated debugging techniques made assumptions that do not hold in practice, and suggested four research directions to remedy this: absolute evaluation...
The use of static analysis is clearly recommended in automotive safety standard ISO26262 to reduce software runtime errors. A comparative study of top performance tools is provided by analyzing production code of AUTOSAR application software components for an Instrument Panel Cluster. A quantitative analysis based on an alert classification model and performance metrics has been carried out. The goal...
The paper considers the task of improving the efficiency of voice control of robots on the basis of adaptive procedures. This problem is considered in the context of noise resistance processing of speech signals for voice recognition subsystems. A solution to this problem is found in classes of adaptive algorithms for filtering voice signals based on sequential filtering. This model allows to improve...
We give a nearly linear-time randomized approximation scheme for the Held-Karp bound [22] for Metric-TSP. Formally, given an undirected edge-weighted graph G = (V,E) on m edges and ε 0, the algorithm outputs in O(m log^4 n/ε^2) time, with high probability, a (1 + ε)-approximation to the Held-Karp bound on the Metric-TSP instance induced by the shortest path metric...
Estimating the difficulty of tasks is imperative for project planning, task assignment, and cost calculation. However, little is known about how and for what purpose software practitioners estimate task difficulty in their day-to-day work. In this paper, we interviewed 15 professionals to understand their needs and perceptions when estimating task difficulty. We find that practitioners do estimate...
This paper proposes a scheme for observing cooperative Unmanned Surface Vehicles (USV), using a rotorcraft Unmanned Aerial Vehicle (UAV) with camera movements (tilt and yaw) prioritized over UAV movements. Most of the current researches consider a fixed-wing type UAV for surveillance of multiple moving targets (MMT), whose functionality is limited to just UAV movements. Experiments in simulation are...
Earlier research has identified network analysis techniques, methods, and models used to analyze structural aspects of an enterprise architecture (EA) modeled as a network or graph. However, there is still no common set of conceptual elements for such research that could allow one to identify the information requirements needed to perform this type of analysis. In the present research, we organize...
In this study, crabs mating optimization (CRAB) algorithm that is one of the heuristic algorithms, has been developed and a monogamous crab mating optimization (MCO) algorithm has been proposed. In development, the main goal is to develop an algorithm that runs faster than the CRAB algorithm, to ensure obtaining good results like the CRAB algorithm. The developed MCO algorithm is compared with the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.