The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we identify interactions of stopwords-noisewords- in text corpora as a fundamental feature to effect author classification. It is convenient to view such interactions as graphs wherein nodes are stopwords and the interaction between a pair of stopwords are represented as edge-weights. We define the interaction in terms of the distances between pairs of stopwords in text documents. Given...
Various kinds of teaching modes and methods need to be used in English teaching. The interactive approach to language teaching has provided a new space for English language teaching in colleges and universities. Nash equilibrium focuses on the combination of the dominant strategies or actions of all players. It is an effective way to improve the effectiveness of English teaching in universities by...
This paper considers the question of saving energy in the disk drive making advantage of diverse devices in a hybrid storage system employing flash and disk drives. The flash and disk offer different power characteristics, being flash much less power consuming than the disk drive. We propose a technique that uses a flash device as a cache for a single disk device. We examine various options for managing...
Clusters and applications continue to grow in size while their mean time between failure (MTBF) is getting smaller. Checkpoint/restart is becoming increasingly important for large scale parallel jobs. However, the performance of the checkpoint/restart mechanism does not scale well with increasing job size due to constraints within the file system. Furthermore, with the advent of multi-core architecture,...
The integrity and authentication of an academic transcript is vital to the prestige of an educational organisation as well as its graduates. It is important to the organisation issuing the transcript and any future educational organisation that uses the transcript to ascertain the merit of a proposed enrolment or academic employment. The business case for this research is undertaken within the boundaries...
Component-based software development is necessity current of software engineering and industrialization and components achieve interaction by interfaces. At present the main interface definition languages are designed initially for closure environment to satisfy the requirement of C/S application, only describe static syntax level information of component interaction which can not meet the need of...
Transactional memory (TM) has received a lot of attention as a programming API for concurrent programs on emerging multicore architectures. If the transactional programming model is to realize its promise of simplifying the problem of writing correct and scalable concurrent programs, debuggers will have to change. In this paper, we introduce tm_db, an open-source library to provide debuggers with...
Although the benefits are well-known and undisputed, sharing architectural knowledge is not something architects automatically do. In an attempt to better understand what architects really do and what kind of support they need for sharing knowledge, we have conducted large-scale survey research. The results of our study indicate that architects can be characterized as rather lonesome decision makers...
In information retrieval (IR) systems, there are a query and a collection of documents compared with this query and ranked according to a particular similarity measure. Since texts with the same content can be written by different authors, the writing styles of the documents change as well accordingly. This observation brings the idea of investigating text by means of style. In this paper, we analyze...
Vygotsky's (1987) premise is that students write to learn, and that this learning stretches across the curriculum. The lecturer in the field of engineering has therefore to evaluate teaching and learning through writing tasks as they are traditionally known, and ask why assessment focuses on students' weaknesses - why does assessment instead not meet the student at his point of strength, and lead...
Bulk memory copying and initialization is one of the most ubiquitous operations performed in current computer systems by both user applications and Operating Systems. While many current systems rely on a loop of loads and stores, there are proposals to introduce a single instruction to perform bulk memory copying. While such an instruction can improve performance due to generating fewer TLB and cache...
Unit tests are a valuable part of the testing phase but they can be repetitious and difficult to maintain. This paper argues that a generalised unit test can concisely express a functional requirement that would otherwise be expressed using several similar unit tests. Initial ideas are presented for how large sets of existing unit tests can be used to inform the design of language constructs for writing...
As the capacity of flash memory increases and price drops, flash memory will compete more successfully with disk drives. It is thus not inconceivable to consider running a full database system on the flash-only computing platforms or running an embedded database system on the lightweight computing devices. In this paper, the characteristics of flash memory and the key points of designing a flash-based...
In this paper, we experiment the capabilities of continuous density Hidden Markov Model (CHMM) to model the offline diagram sketch signals such as the electrical circuit diagram and the flowchart diagram . We attempt to imitate the online signals by extracting the offline diagram data as the time-varying coordinate sequence based on the Gradient Sharpening and Freeman code, considering that is generated...
Flash memories have advanced features such as non-volatility, fast access speed, and low power consumption that they are adopted in various ubiquitous portable devices. However, the speed of writing on flash memory is relatively slower than that of reading, and extensive research efforts are devoted to overcome these restrictions, mostly in the field of flash translation layers (FTLs). This paper...
This paper describes the workflow authorization model for workflow management system, which integrates RTBAC and multilevel security model, and presents authorization model for a multilevel security workflow in the multilevel secure environments. The model adds the presentation of security level and task dependence and reforms the authorization rule for the improved model. At last, analyses the model,...
As an inherently language-dependent feature, the expansion of numbers to their full written-out forms can also be accomplished with language-independent code for multilingual TTS systems. In this paper we present a number expansion system that works with little data and language-independent code, while still able to expand numerics in dozens of languages. The paper also describes a way to determine...
In this paper, we discuss a new language model that considers the characteristics of the agglutinative languages. We used Mongolian (a Cyrillic language system used in Mongolia) as an example from which to build the language model. We developed a Multi-class N-gram language model based on similar word clustering that focuses on the variable suffixes of a word in Mongolian. By applying our proposed...
We present a new approach to handling the demanding I/O workload incurred during checkpoint writes encountered in High Performance Computing. Prior efforts to improve performance have been bound by issues such as hard drive limitations, and the network. Our research surpasses this limitation by providing a method to: (1) write checkpoint data to a high-speed, non-volatile buffer, and (2) asynchronously...
These days VLSC (very large-scale conversation) is a particular type of online conversation, that is large scale, public, text-based, many-to-many and persistent. The nature of VLSC allows the accumulation of thousands of conversation in a fraction of time, and it often grows out of userspsila readable capacity. Therefore, extracting dominant public opinion on VLSC is usually impossible without causing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.